Academic literature on the topic 'Deadlock'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Deadlock.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Deadlock"
FLATEBO, MITCHELL, and AJOY KUMAR DATTA. "DISTRIBUTED DEADLOCK DETECTION ALGORITHMS." Parallel Processing Letters 02, no. 01 (March 1992): 21–30. http://dx.doi.org/10.1142/s0129626492000143.
Full textHuang, Yi Sheng, and Ter Chan Row. "A Channelized Deadlock Prevention Policy for Flexible Manufacturing Systems Using Petri Net Models." Advanced Materials Research 284-286 (July 2011): 1498–501. http://dx.doi.org/10.4028/www.scientific.net/amr.284-286.1498.
Full textAskari, Mohsen, and Rozita Jamili Oskouei. "An Improved Multi-Cycle Deadlock Detection and Resolution Algorithm for Distributed Systems." Computer Engineering and Applications Journal 3, no. 3 (September 30, 2014): 111–20. http://dx.doi.org/10.18495/comengapp.v3i3.89.
Full textTunç, Hünkar Can, Umang Mathur, Andreas Pavlogiannis, and Mahesh Viswanathan. "Sound Dynamic Deadlock Prediction in Linear Time." Proceedings of the ACM on Programming Languages 7, PLDI (June 6, 2023): 1733–58. http://dx.doi.org/10.1145/3591291.
Full textMurdalov, Deni Ruslanovich. "Vertical deadlock in public corporations." Юридические исследования, no. 6 (June 2020): 56–64. http://dx.doi.org/10.25136/2409-7136.2020.6.33454.
Full textPan, Yen-Liang. "One Computational Innovation Transition-Based Recovery Policy for Flexible Manufacturing Systems Using Petri nets." Applied Sciences 10, no. 7 (March 29, 2020): 2332. http://dx.doi.org/10.3390/app10072332.
Full textMANI, NARIMAN, VAHID GAROUSI, and BEHROUZ H. FAR. "SEARCH-BASED TESTING OF MULTI-AGENT MANUFACTURING SYSTEMS FOR DEADLOCKS BASED ON MODELS." International Journal on Artificial Intelligence Tools 19, no. 04 (August 2010): 417–37. http://dx.doi.org/10.1142/s0218213010000261.
Full textMarsteintredet, Leiv. "Executive-Legislative Deadlocks in the Dominican Republic." Latin American Politics and Society 50, no. 02 (2008): 131–60. http://dx.doi.org/10.1111/j.1548-2456.2008.00015.x.
Full textKHONSARI, A., H. SARBAZI-AZAD, and M. OULD-KHAOUA. "A Performance Model of Software-Based Deadlock Recovery Routing Algorithm in Hypercubes." Parallel Processing Letters 15, no. 01n02 (March 2005): 153–68. http://dx.doi.org/10.1142/s012962640500212x.
Full text., Elavarasi, and G. Raja. "A Necessary and Sufficient Condition for Deadlock-Free Message Routing in Communication Networks." International Journal of Advance Research and Innovation 3, no. 2 (2015): 23–26. http://dx.doi.org/10.51976/ijari.321506.
Full textDissertations / Theses on the topic "Deadlock"
Dathi, Naiem. "Deadlock and deadlock freedom." Thesis, University of Oxford, 1989. https://ora.ox.ac.uk/objects/uuid:458852c5-fa20-41f4-8537-8085a063c546.
Full textPalmer, Geraint. "Modelling deadlock in queueing systems." Thesis, Cardiff University, 2018. http://orca.cf.ac.uk/117490/.
Full textAskman, Amelie. "Joint ventures : (deadlock-) låsningar och lösningar." Thesis, Stockholms universitet, Juridiska institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-153172.
Full textKinsy, Michel A. "Application-aware deadlock-free oblivious routing." Thesis, Massachusetts Institute of Technology, 2009. http://hdl.handle.net/1721.1/53316.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (p. 67-71).
Systems that can be integrated on a single silicon die have become larger and increasingly complex, and wire designs as communication mechanisms for these systems on chip (SoC) have shown to be a limiting factor in their performance. As an approach to remove the limitation of communication and to overcome wire delays, interconnection networks or Network-on-Chip (NoC) architectures have emerged. NoC architectures enable faster data communication between components and are more scalable. In designing NoC systems, there are three key issues; the topology, which directly depends on packaging technology and manufacturing costs, dictates the throughput and latency bounds of the network; the flit control protocol, which establishes how the network resources are allocated to packets exchanged between components; and finally, the routing algorithm, which aims at optimizing network performance for some topology and flow control protocol by selecting appropriate paths for those packets. Since the routing algorithm sits on top of the other layers of design, it is critical that routing is done in a matter that makes good usage of the resources of the network. Two main approaches to routing, oblivious and adaptive, have been followed in creating routing algorithms for these systems. Each approach has its pros and cons; oblivious routing, as opposite to adaptive routing, uses no network state information in determining routes at the cost of lower performance on certain applications, but has been widely used because of its simpler hardware requirements.
(cont.) This thesis examines oblivious routing schemes for NoC architectures. It introduces various non-minimal, oblivious routing algorithms that globally allocate network bandwidth for a given application when estimated bandwidths for data transfers are provided, while ensuring deadlock freedom with no significant additional hardware. The work presents and evaluates these oblivious routing algorithms which attempt to minimize the maximum channel load (MCL) across all network links in an effort to maximize application throughput. Simulation results from popular synthetic benchmarks and concrete applications, such as an H.264 decoder, show that it is possible to achieve better performance than traditional deterministic and oblivious routing schemes.
by Michel A. Kinsy.
S.M.
Mastandrea, Vincenzo. "Deadlock analysis of asynchronous sequential processes." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/7451/.
Full textGrazia, Carlo Augusto. "Analisi statica dei Deadlock in Featherweight Java con Futuri." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/4473/.
Full textAshfield, Bruce. "Distributed deadlock detection in mobile agent systems." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/MQ57757.pdf.
Full textWilliams, Amy Lynne Ph D. Massachusetts Institute of Technology. "Static detection of deadlock for Java libraries." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/87909.
Full textIncludes bibliographical references (p. 63-66).
Library writers wish to provide a guarantee not only that each procedure in the library performs correctly in isolation, but also that the procedures perform correctly when run in conjunction. To this end, we propose a method for static detection of deadlock in Java libraries. Our goal is to determine whether client code exists that may deadlock a library, and, if so, to enable the library writer to discover the calling patterns that can lead to deadlock. Our flow-sensitive, context-sensitive analysis determines possible deadlock configurations using a lock-order graph. This graph represents the order in which locks are acquired by the library. Cycles in the graph indicate deadlock possibilities, and our tool reports all such possibilities. We implemented our analysis and evaluated it on 18 libraries comprising 1245 kLOC. We verified 13 libraries to be free from deadlock, and found -14 distinct deadlocks in 3 libraries.
by Amy Lynne Williams.
S.M.
Lehman, Eric (Eric Allen) 1970. "Deadlock-free routing in a faulty hypercube." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/47503.
Full textScherer, John-Patrick. "“Deadlock Provisions in Equity Joint Venture Agreements”." Master's thesis, University of Cape Town, 2018. http://hdl.handle.net/11427/29713.
Full textBooks on the topic "Deadlock"
More sourcesBook chapters on the topic "Deadlock"
Weik, Martin H. "deadlock." In Computer Science and Communications Dictionary, 366. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_4458.
Full textDallin, David J. "The Deadlock." In Soviet Foreign Policy after Stalin, 101–14. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003324256-5.
Full textBérard, Béatrice, Michel Bidoit, Alain Finkel, François Laroussinie, Antoine Petit, Laure Petrucci, Philippe Schnoebelen, and Pierre Mckenzie. "Deadlock-freeness." In Systems and Software Verification, 99–101. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/978-3-662-04558-9_9.
Full textFalsafi, Babak, Samuel Midkiff, JackB Dennis, JackB Dennis, Amol Ghoting, Roy H. Campbell, Christof Klausecker, et al. "Deadlock Detection." In Encyclopedia of Parallel Computing, 524. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-0-387-09766-4_2249.
Full textFritchey, Grant. "Deadlock Analysis." In SQL Server 2012 Query Performance Tuning, 393–406. Berkeley, CA: Apress, 2012. http://dx.doi.org/10.1007/978-1-4302-4204-8_13.
Full textSong, Wei, and Guangda Zhang. "Deadlock Recovery." In Asynchronous On-Chip Networks and Fault-Tolerant Techniques, 303–22. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003284789-8.
Full textSong, Wei, and Guangda Zhang. "Deadlock Detection." In Asynchronous On-Chip Networks and Fault-Tolerant Techniques, 271–302. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003284789-7.
Full textSong, Wei, and Guangda Zhang. "Deadlock Recovery." In Asynchronous On-Chip Networks and Fault-Tolerant Techniques, 303–22. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003284789-8.
Full textSong, Wei, and Guangda Zhang. "Deadlock Detection." In Asynchronous On-Chip Networks and Fault-Tolerant Techniques, 271–302. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003284789-7.
Full textRennard, Jean-Philippe. "Perspectives for Strong Artificial Life." In Recent Developments in Biologically Inspired Computing, 301–19. IGI Global, 2005. http://dx.doi.org/10.4018/978-1-59140-312-8.ch012.
Full textConference papers on the topic "Deadlock"
Simon, Bertrand, Brigitte Jaumard, and Thai Hoa Le. "Deadlock Avoidance and Detection in Railway Simulation Systems." In 2014 Joint Rail Conference. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/jrc2014-3864.
Full textZhou, Shuqiao, Xiaojin Huang, and Jia Qianqian. "Control Policy for Shared Objects in HTR-PM: Toward the Collision and Deadlock Avoidance." In 2016 24th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2016. http://dx.doi.org/10.1115/icone24-60406.
Full textMireles, Jose, Frank L. Lewis, and Ayla Gu¨rel. "Implementation of a Deadlock Avoidance Policy for Multipart Reentrant Flow Lines Using a Matrix-Based Discrete Event Controller." In ASME 2002 International Mechanical Engineering Congress and Exposition. ASMEDC, 2002. http://dx.doi.org/10.1115/imece2002-33431.
Full textPyla, Hari K., and Srinidhi Varadarajan. "Avoiding deadlock avoidance." In the 19th international conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1854273.1854288.
Full textEl-Kafrawy, Passent M. "Graphical Deadlock Avoidance." In 2009 International Conference on Advances in Computing, Control, & Telecommunication Technologies (ACT 2009). IEEE, 2009. http://dx.doi.org/10.1109/act.2009.83.
Full textKaratkevich, Andrei, and Iwona Grobelna. "Deadlock detection in Petri nets: One trace for one deadlock?" In 2014 7th International Conference on Human System Interactions (HSI). IEEE, 2014. http://dx.doi.org/10.1109/hsi.2014.6860480.
Full textPinkston, Timothy Mark, Mongkol Raksapatcharawong, and Yungho Choi. "Smart-Pixel Implementation of Network Router Deadlock Handling Mechanisms." In Optics in Computing. Washington, D.C.: Optica Publishing Group, 1997. http://dx.doi.org/10.1364/oc.1997.othb.2.
Full textRaksapatcharawong, Mongkol, and Timothy Mark Pinkston. "A System Demonstration of Progressive Deadlock Recovery Routing based on Optoelectronic/VLSI Chips." In Optics in Computing. Washington, D.C.: Optica Publishing Group, 1997. http://dx.doi.org/10.1364/oc.1997.othd.18.
Full textBujtor, Ferenc, Lev Sorokin, and Walter Vogler. "Testing Preorders for dMTS: Deadlock- and the New Deadlock/Divergence-Testing." In 2015 15th International Conference on Application of Concurrency to System Design (ACSD). IEEE, 2015. http://dx.doi.org/10.1109/acsd.2015.21.
Full textZeng, Fancong. "Pattern-driven deadlock avoidance." In the 7th Workshop. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1639622.1639628.
Full textReports on the topic "Deadlock"
Roncero, Matias F. Deadlock Before Moscow. Fort Belvoir, VA: Defense Technical Information Center, April 2001. http://dx.doi.org/10.21236/ada394188.
Full textDonaldson, Jason Roderick, Nadya Malenko, and Giorgia Piacentino. Deadlock on the Board. Cambridge, MA: National Bureau of Economic Research, August 2019. http://dx.doi.org/10.3386/w26155.
Full textForss, Stefan, and Pekka Holopainen. Breaking the Nordic Defense Deadlock. Fort Belvoir, VA: Defense Technical Information Center, February 2015. http://dx.doi.org/10.21236/ada615286.
Full textTchobo, Denakpon. Proposed Ukraine Tribunal risks justice deadlock. Edited by Reece Hooker. Monash University, February 2023. http://dx.doi.org/10.54377/0f91-eb58.
Full textBrewer, Eric A., and Carl A. Waldspurger. Preventing Recursion Deadlock in Concurrent Object-Oriented Systems. Fort Belvoir, VA: Defense Technical Information Center, February 1992. http://dx.doi.org/10.21236/ada247084.
Full textBurg, Roger W. Anwar Sadat and the October War: Breaking the Deadlock. Fort Belvoir, VA: Defense Technical Information Center, September 1992. http://dx.doi.org/10.21236/ada440778.
Full textBonakdarpour, Borzoo, Fuad Abujarad, and Sandeep S. Kulkarni. Parallelizing Deadlock Resolution in Symbolic Synthesis of Distributed Programs. Fort Belvoir, VA: Defense Technical Information Center, January 2008. http://dx.doi.org/10.21236/ada487024.
Full textBrookes, Stephen. An Axiomatic Treatment of Partial Correctness and Deadlock in a Shared Variable Parallel Language. Fort Belvoir, VA: Defense Technical Information Center, June 1992. http://dx.doi.org/10.21236/ada256234.
Full textA., Mulyana, Moeliono M., Minnigh P., Indriatmoko Y., Limberg G., Utomo N.A., Iwan R., Saparuddin, and Hamzah. Establishing special use zones in national parks: can it break the conservation deadlock in Indonesia? Center for International Forestry Research (CIFOR), 2010. http://dx.doi.org/10.17528/cifor/003094.
Full textAraujo, María Caridad, Sebastián Saiegh, Aníbal Pérez-Liñán, and Andrés Mejía Acosta. Veto Players, Fickle Institutions and Low-Quality Policies: The Policymaking Process in Ecuador. Inter-American Development Bank, May 2006. http://dx.doi.org/10.18235/0011280.
Full text