Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/1082161.1082192dlproceedingsArticle/Chapter ViewAbstractPublication Pagesaus-cscConference Proceedingsconference-collections
Article
Free access

Flexible exclusion control for composite objects

Published: 01 January 2005 Publication History

Abstract

We present a simple approach for implementing flexible locking strategies in a system of components, which may themselves be composite objects. The approach is flexible in that a developer can defer the distribution of locks in the system until deployment: the choice of lock type and granularity may therefore depend on the operating environment. We only consider exclusion control; this includes mutexes, read-write locks and read-write sets, but does not cover state-dependent locking or transaction-based approaches. In general we express exclusion requirements as sets of conflict pairs on component interfaces; elsewhere (Potter, Shanneb and Yu 2004) we have demonstrated the effectiveness of a general-purpose exclusion lock that can provide any required exclusion. We presume knowledge of the dependency between the interface of a composite object and its internal components.This work extends and simplifies the work on exclusion algebra for composite objects (Noble, Holmes and Potter 2000). Our major contribution is to distinguish between the control required internally and that provided externally. This clarifies the role of the so-called upward and downward mappings of the earlier work. We also offer a succinct mathematical basis for our model.

References

[1]
Birtwistle, G., Dahl, O., Myhrhaug, B. and Nygaard, K. (1979): Simula Begin. Studentlitterature.]]
[2]
Booch, G. (1990): Software Components with Ada: Structures, Tools, and Subsystems. Benjamin/Cummings.]]
[3]
Brinch-Hansen, P. (1973): Operating Systems Principles. Prentice-Hall.]]
[4]
Briot, J., Guerraoui, R., and Lohr, K. (1998): Concurrency and Distribution in Object-Oriented Programming. ACM Computing Surveys, 30(3):291--329.]]
[5]
Boyapati, C. and Rinard, M. (2001): A parameterized type system for race-free Java programs. In Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA).]]
[6]
Clarke, D., Potter, J., and Noble, J. (1998): Ownership types for flexible alias protection. In Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA).]]
[7]
Clarke, D., Potter, J., and Noble, J. (2001): Simple ownership types for object containment, In Proceedings of the 15th European Conference on Object-Oriented Programming (ECOOP). 53--76.]]
[8]
Clarke, D., and Drossopoulou, S. (2002): Ownership, encapsulation and the disjointness of type and effect, In Proceedings of the 17th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications (OOPSLA). 292--310.]]
[9]
Gamma, E., Helm, R., Johnson, R., and Vlissides, J. (1994): Design Patterns. Addison-Wesley.]]
[10]
Hoare, C. A. R. (1974): Monitors: an operating system structuring concept. Communications of the ACM, 17(10):549--557, Oct.]]
[11]
JSR-166: Concurrency Utilities, Java Concurrency Process. www.jcp.org. Accessed 1 Sept. 2004.]]
[12]
Lea, D. (1999): Concurrent Programming in Java: Design Principles and Patterns, (2nd Edition) Addison-Wesley.]]
[13]
Noble, J., Holmes, D. and Potter, J. (2000): Exclusion for Composite Objects, Proceedings of ACM Conference on Object-Oriented Programming, Systems, and Languages. OOPSLA, Minneapolis, USA.]]
[14]
Philippsen, M. (2002): A Survey of Concurrent Object-Oriented Languages, Concurrency: Practice and Experience. 12, 917--980.]]
[15]
Potter, J., Shanneb, A., and Yu, E., (2004): Exclusion Control for Java and C#: Experimenting with Granularity of Locks.CSJP'04 at the ACM PODC 2004.]]
[16]
Rez, Theo Harder. (1995): Concurrency Control Issues in Nested Transactions with Enhanced Lock Modes for KBMSs, DEXA'95, 6th International Conference and Workshop on Database and Expert Systems Applications.]]
[17]
Suh-Yin, Lee. and Ruey-Long, Liou. (1996): A Multi-Granularity Locking Model for Concurrency Control in Object-Oriented Database Systems. IEEE Trans. Knowl. Data Eng. 8(1): 144--156.]]

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image DL Hosted proceedings
ACSC '05: Proceedings of the Twenty-eighth Australasian conference on Computer Science - Volume 38
January 2005
365 pages
ISBN:1920682201

Publisher

Australian Computer Society, Inc.

Australia

Publication History

Published: 01 January 2005

Author Tags

  1. component-based systems
  2. composite objects
  3. concurrency control
  4. concurrent objects
  5. locking granularity

Qualifiers

  • Article

Conference

ACSC '05
ACSC '05: Computer Science
01 01 2005
Newcastle, Australia

Acceptance Rates

Overall Acceptance Rate 136 of 379 submissions, 36%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 138
    Total Downloads
  • Downloads (Last 12 months)26
  • Downloads (Last 6 weeks)9
Reflects downloads up to 23 Nov 2024

Other Metrics

Citations

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media