Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJuly 2019
Optimal Memory-Anonymous Symmetric Deadlock-Free Mutual Exclusion
PODC '19: Proceedings of the 2019 ACM Symposium on Principles of Distributed ComputingPages 157–166https://doi.org/10.1145/3293611.3331594The notion of an anonymous shared memory, introduced by Taubenfeld in PODC 2017, considers that processes use different names for the same memory location. As an example, a location name A used by a process p and a location name B ≠ A used by another ...
Less is more: multiparty session types revisited
Proceedings of the ACM on Programming Languages (PACMPL), Volume 3, Issue POPLArticle No.: 30, Pages 1–29https://doi.org/10.1145/3290343Multiparty Session Types (MPST) are a typing discipline ensuring that a message-passing process implements a multiparty session protocol, without errors. In this paper, we propose a new, generalised MPST theory.
Our contribution is fourfold. (1) We ...
- research-articleDecember 2014
Topological Characterization of Hamming and Dragonfly Networks and Its Implications on Routing
ACM Transactions on Architecture and Code Optimization (TACO), Volume 11, Issue 4Article No.: 39, Pages 1–25https://doi.org/10.1145/2677038Current High-Performance Computing (HPC) and data center networks rely on large-radix routers. Hamming graphs (Cartesian products of complete graphs) and dragonflies (two-level direct networks with nodes organized in groups) are some direct topologies ...
- posterMay 2014
Highly adaptive and congestion-aware routing for 3D NoCs
GLSVLSI '14: Proceedings of the 24th edition of the great lakes symposium on VLSIPages 97–98https://doi.org/10.1145/2591513.2591581In this paper, we propose a novel highly adaptive and congestion aware routing algorithm 3D meshes which is equally applicable to 2D meshes as well. The proposed algorithm allows cyclic dependencies in channel dependency graph (CDG) providing higher ...
- ArticleJuly 2013
Distributed Explicit State Model Checking of Deadlock Freedom
CAV 2013: Proceedings of the 25th International Conference on Computer Aided Verification - Volume 8044Pages 235–241This paper presents a practical method and associated tool for verifying deadlock freedom properties in guarded command systems. Such properties are expressed in CTL as AGEF ï ź q where q is a set of quiescent states. We require the user to provide ...
- ArticleSeptember 2011
Looking for efficient implementations of concurrent objects
PaCT'11: Proceedings of the 11th international conference on Parallel computing technologiesPages 74–87As introduced by Taubenfeld, a contention-sensitive implementation of a concurrent object is an implementation such that the overhead introduced by locking is eliminated in the common cases, i.e., when there is no contention or when the operations ...
- research-articleMay 2011
Rigorous Component-Based System Design Using the BIP Framework
- Ananda Basu,
- Bensalem Bensalem,
- Marius Bozga,
- Jacques Combaz,
- Mohamad Jaber,
- Thanh-Hung Nguyen,
- Joseph Sifakis
Rigorous system design requires the use of a single powerful component framework allowing the representation of the designed system at different detail levels, from application software to its implementation. A single framework allows the maintenance of ...
- ArticleOctober 2010
A CSP approach to control in event-B
Event-B has emerged as one of the dominant state-based formal techniques used for modelling control-intensive applications. Due to the blocking semantics of events, their ordering is controlled by their guards. In this paper we explore how process ...
- ArticleJuly 2009
Using Architectural Constraints for Deadlock-Freedom of Component Systems with Multiway Cooperation
TASE '09: Proceedings of the 2009 Third IEEE International Symposium on Theoretical Aspects of Software EngineeringPages 225–232https://doi.org/10.1109/TASE.2009.18We present a compositional analysis of deadlock-freedom in component systems with multiway cooperation. We require the systems to satisfy architectural constraints which make sure that the communication structure between the components is given by a ...
- research-articleOctober 2008
Compositional analysis of deadlock-freedom for tree-like component architectures
EMSOFT '08: Proceedings of the 8th ACM international conference on Embedded softwarePages 199–206https://doi.org/10.1145/1450058.1450085We study architectural constraints for component systems in order to be able to guarantee safety-properties. Representing safety-properties, we investigate deadlock-freedom. We present a compositional and hence polynomial time condition for deadlock-...
- ArticleJuly 2003
Design of a viable fault-tolerant routing strategy for optical-based grids
ISPA'03: Proceedings of the 2003 international conference on Parallel and distributed processing and applicationsPages 112–126This paper proposes and analyses a cost-effective fault-tolerant routing strategy for optical-based grid networks. We present the design of a fully adaptive, fault-tolerant routing strategy for multi-hop grid networks based on wavelength-division ...
- research-articleJanuary 1999
Multidestination Message Passing in Wormhole k-ary n-cube Networks with Base Routing Conformed Paths
IEEE Transactions on Parallel and Distributed Systems (TPDS), Volume 10, Issue 1Pages 76–96https://doi.org/10.1109/71.744844This paper proposes multidestination message passing on wormhole k-ary n-cube networks using a new base-routing-conformed-path (BRCP) model. This model allows both unicast (single-destination) and multidestination messages to co-exist in a given network ...
- ArticleOctober 1996
Novel algorithms for multicast communication in self-routing MIN-based ATM switches
We discuss the multicast communication in the self-routing multistage interconnection network (MIN) for constructing the internal architecture of asynchronous transfer mode (ATM) switches. Many applications of ATM switches require multicast ...
- ArticleMay 1995
Designing an asynchronous pipeline token ring interface
We describe the design of a speed-independent interface based on a pipeline token-ring architecture. The original goal was to build a reliable communication medium, able to tolerate up to two faults in any segment of the ring, to be used in an on-board ...
- research-articleAugust 1981
Deadlock-Free Packet Switching Networks
Deadlock states have been observed in existing computer networks, emphasizing the need for carefully designed flow control procedures (controllers) to avoid deadlocks. Such a deadlock-free controller is readily found if we allow it global information ...