Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
9657397 | Science of Computer Programming | 2005 | 22 Pages |
Abstract
With our approach we can defer the distribution of locks in the system until deployment: the placement of locks and choice of lock type for a component can depend on its operating environment. A Galois connection between the outward mapping of exclusion requirements, and the inward mapping of potential concurrency, limits how many locks are worth considering. In this paper we only deal with exclusion control, including mutexes, read-write locks and read-write sets, and do not cover state-dependent locking or transaction-based approaches.
Related Topics
Physical Sciences and Engineering
Computer Science
Computational Theory and Mathematics
Authors
Abdelsalam Shanneb, John Potter, James Noble,