Affiliation:
1. Fairleigh Dickinson University, Teaneck, NJ
Abstract
Deadlock has been widely studied in many fields of computer science, notably in communications, database, and operating systems. Perhaps because (at least one state called) deadlock is tractable, there exists extensive literature on the subject. Deadlock was apparently decisively defined over thirty years ago, with its characteristics and handlers. Yet, much of the literature remains inconsistent in its treatment of this anomaly.A more precise definition is clearly needed to distinguish between the different states that are termed deadlock. A classification of dead states is required to distinguish the causes and appropriate handlers for each. We introduce a model to structure our research.
Publisher
Association for Computing Machinery (ACM)
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Incorporating Service Degradations into a Security Plan;2014 IEEE International Conference on Software Science, Technology and Engineering;2014-06
2. Computer security with service degradations;ACM SIGSOFT Software Engineering Notes;2013-11-11
3. Deadlock checking by a behavioral effect system for lock handling;The Journal of Logic and Algebraic Programming;2012-04
4. Priority inversion with fungible resources;ACM SIGAda Ada Letters;2012-02-22
5. Defining defects, errors, and service degradations;ACM SIGSOFT Software Engineering Notes;2009-02-28