To see the other types of publications on this topic, follow the link: Deadlock.

Dissertations / Theses on the topic 'Deadlock'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Deadlock.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Dathi, Naiem. "Deadlock and deadlock freedom." Thesis, University of Oxford, 1989. https://ora.ox.ac.uk/objects/uuid:458852c5-fa20-41f4-8537-8085a063c546.

Full text
Abstract:
We introduce a number of techniques for establishing the deadlock freedom of concurrent systems. Our methods are based on the local analysis (or at worst a directed global analysis) of networks. We identify the relationships between these techniques and the range of their application within a framework of deadlock freedom types that we have defined. We also show that the problem of proving total correctness may be translated to one of proving deadlock freedom, with the consequence that our techniques for proving deadlock freedom may be utilised to effect a total correctness proof.
APA, Harvard, Vancouver, ISO, and other styles
2

Palmer, Geraint. "Modelling deadlock in queueing systems." Thesis, Cardiff University, 2018. http://orca.cf.ac.uk/117490/.

Full text
Abstract:
Motivated by the needs of Aneurin Bevan University Health Board, this thesis ex- plores three themes: the phenomenon of deadlock in queueing systems, the develop- ment of discrete event simulation software, and applying modelling to the evaluation of the effects of a new healthcare intervention, Stay Well Plans, for older people in Gwent. When customers in a restricted queueing network become mutually blocked, and all possible movement ceases, that system becomes deadlocked. This thesis novelly investigates deadlock. A graph theoretical method of detecting deadlock in discrete event simulations is given, analytical models of deadlocking systems are built, and these are used to investigate the effect of system parameters on the expected time until reaching deadlock. Furthermore a deadlock resolution procedure is proposed. An open source discrete event simulation software, Ciw, is developed. This software is designed and developed using best practice principles. Furthermore it permits the use of best practice, such as reproducibility, in simulation modelling. Ciw is used for the modelling of a healthcare system, in order to evaluate the effect of Stay Well Plans. During the development of these models, a number of techniques are employed to overcome the difficulties of lack of data. Insightful results from these models are obtained, indicating a shift in demand from residential care services to community care services.
APA, Harvard, Vancouver, ISO, and other styles
3

Askman, Amelie. "Joint ventures : (deadlock-) låsningar och lösningar." Thesis, Stockholms universitet, Juridiska institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-153172.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kinsy, Michel A. "Application-aware deadlock-free oblivious routing." Thesis, Massachusetts Institute of Technology, 2009. http://hdl.handle.net/1721.1/53316.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2009.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. 67-71).
Systems that can be integrated on a single silicon die have become larger and increasingly complex, and wire designs as communication mechanisms for these systems on chip (SoC) have shown to be a limiting factor in their performance. As an approach to remove the limitation of communication and to overcome wire delays, interconnection networks or Network-on-Chip (NoC) architectures have emerged. NoC architectures enable faster data communication between components and are more scalable. In designing NoC systems, there are three key issues; the topology, which directly depends on packaging technology and manufacturing costs, dictates the throughput and latency bounds of the network; the flit control protocol, which establishes how the network resources are allocated to packets exchanged between components; and finally, the routing algorithm, which aims at optimizing network performance for some topology and flow control protocol by selecting appropriate paths for those packets. Since the routing algorithm sits on top of the other layers of design, it is critical that routing is done in a matter that makes good usage of the resources of the network. Two main approaches to routing, oblivious and adaptive, have been followed in creating routing algorithms for these systems. Each approach has its pros and cons; oblivious routing, as opposite to adaptive routing, uses no network state information in determining routes at the cost of lower performance on certain applications, but has been widely used because of its simpler hardware requirements.
(cont.) This thesis examines oblivious routing schemes for NoC architectures. It introduces various non-minimal, oblivious routing algorithms that globally allocate network bandwidth for a given application when estimated bandwidths for data transfers are provided, while ensuring deadlock freedom with no significant additional hardware. The work presents and evaluates these oblivious routing algorithms which attempt to minimize the maximum channel load (MCL) across all network links in an effort to maximize application throughput. Simulation results from popular synthetic benchmarks and concrete applications, such as an H.264 decoder, show that it is possible to achieve better performance than traditional deterministic and oblivious routing schemes.
by Michel A. Kinsy.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
5

Mastandrea, Vincenzo. "Deadlock analysis of asynchronous sequential processes." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/7451/.

Full text
Abstract:
In this thesis we present ad study an object-oriented language, characterized by two different types of objects, passive and active objects, of which we define the operational syntax and semantics. For this language we also define the type system, that will be used for the type checking and for the extraction of behavioral types, which are an abstract description of the behavior of the methods, used in deadlock analysis. Programs can manifest deadlock due to the errors of the programmer. To statically identify possible unintended behaviors we studied and implemented a technique for the analysis of deadlock based on behavioral types.
APA, Harvard, Vancouver, ISO, and other styles
6

Grazia, Carlo Augusto. "Analisi statica dei Deadlock in Featherweight Java con Futuri." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/4473/.

Full text
Abstract:
Abbiamo studiato ABSFJf, un linguaggio ad oggetti concorrente con tipi di dato futuro ed operazioni per acquisire e rilasciare il controllo delle risorse. I programmi ABSFJf possono manifestare lock (deadlock e livelock) a causa degli errori del programmatore. Per individuare staticamente possibili com- portamenti non voluti abbiamo studiato e implementato una tecnica per l'analisi dei lock basata sui contratti, che sono una descrizione astratta del comportamento dei metodi. I contratti si utilizzano per formare un automa i cui stati racchiudono informazioni di dipendenza di tipo chiamante-chiamato; vengono derivati automaticamente da un algoritmo di type inference e model- lati da un analizzatore che sfrutta la tecnica del punto
APA, Harvard, Vancouver, ISO, and other styles
7

Ashfield, Bruce. "Distributed deadlock detection in mobile agent systems." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/MQ57757.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Williams, Amy Lynne Ph D. Massachusetts Institute of Technology. "Static detection of deadlock for Java libraries." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/87909.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2005.
Includes bibliographical references (p. 63-66).
Library writers wish to provide a guarantee not only that each procedure in the library performs correctly in isolation, but also that the procedures perform correctly when run in conjunction. To this end, we propose a method for static detection of deadlock in Java libraries. Our goal is to determine whether client code exists that may deadlock a library, and, if so, to enable the library writer to discover the calling patterns that can lead to deadlock. Our flow-sensitive, context-sensitive analysis determines possible deadlock configurations using a lock-order graph. This graph represents the order in which locks are acquired by the library. Cycles in the graph indicate deadlock possibilities, and our tool reports all such possibilities. We implemented our analysis and evaluated it on 18 libraries comprising 1245 kLOC. We verified 13 libraries to be free from deadlock, and found -14 distinct deadlocks in 3 libraries.
by Amy Lynne Williams.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
9

Lehman, Eric (Eric Allen) 1970. "Deadlock-free routing in a faulty hypercube." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/47503.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Scherer, John-Patrick. "“Deadlock Provisions in Equity Joint Venture Agreements”." Master's thesis, University of Cape Town, 2018. http://hdl.handle.net/11427/29713.

Full text
Abstract:
The dissertation “Deadlock Provisions in Equity Joint Venture Agreements” gives a comprehensive overview and a detailed analysis of the existing contracting possibilities addressing conflicts between the partners of an equity joint venture which cannot dissolved by them. To understand the variety of such deadlock provisions and their effects on the relationship between the joint venture partners, reaching from provisions which preserve the joint cooperation (preservation mechanisms) to provisions which force the exit of, at least, one partner from the joint company (exit mechanisms), are the key points of the dissertation. Given such variety of deadlock provisions and their possible combinations, a comprehensive overview and a detailed analysis including a comparison of such clauses will support future joint venture partners to decide whether and, if yes, what types of deadlock provisions are suitable for their joint venture and should, therefore, be included in the joint venture agreement. Previous work has failed to give such a comprehensive overview and analysis of deadlock provisions consisting of a description of the different types of provisions, an explanation of their effects, and the provision of the respective example clauses. After a short description of the various types of joint ventures and the structure of an equity joint venture, the dissertation examines on the basis of example clauses preservation mechanisms and exit mechanisms typically included in equity joint venture agreements. The complexity of the different deadlock provisions, in particular the combination of preservation mechanisms and exit mechanisms, but also the question what types of disputes between the joint venture partners should be defined as “deadlocks” triggering such procedures require that joint venture partners understand the effects of drafting the joint venture agreement, in particular the inclusion of deadlock provisions, when they are entering into a joint venture. The dissertation provides the joint venture partners with a guide to cut through such complexity and to understand how the joint venture agreement should be drafted for their joint cooperation.
APA, Harvard, Vancouver, ISO, and other styles
11

Meng, Wang. "Verifying Deadlock-Freedom for Advanced Interconnect Architectures." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-171922.

Full text
Abstract:
Modern advanced Interconnects, such as those orchestrated by the ARM AMBA AXI protocol, can have fatal deadlocks in the connection between Masters and Slaves if those transactions are not properly arranged. There exists some research about the deadlock problems in an on-chip bus system and also methods to avoid those deadlocks which could happen. This project aims to verify those situations could make deadlock happens and also the countermeasures for those deadlocks. In this thesis, the ARM AMBA AXI protocol and countermeasures are modelled in NuSMV. Based on these models, we verified the non-trivial cycles of transactions could cause deadlocks and also some bus techniques which can mitigate deadlock problems efficiently. The results from model checking several instances of the protocol and corresponding countermeasures show the techniques could indeed avoid deadlocks.
APA, Harvard, Vancouver, ISO, and other styles
12

Ashfield, Bruce Carleton University Dissertation Computer Science. "Distributed deadlock detection in mobile agent systems." Ottawa, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Zhang, Wenle. "Scalable deadlock avoidance algorithms for flexible manufacturing systems." Ohio : Ohio University, 2000. http://www.ohiolink.edu/etd/view.cgi?ohiou1179862449.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Simpson, D. P. "Deadlock free algorithmic parallelism : analysis, implementation and performance." Thesis, University of Southampton, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.274694.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Lee, Victor Wui-Keung. "An evaluation of Fugu's network deadlock avoidance solution." Thesis, Massachusetts Institute of Technology, 1996. http://hdl.handle.net/1721.1/39072.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Elmagarmid, Ahmed Khalifa. "Deadlock detection and resolution in distributed processing systems /." The Ohio State University, 1985. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487261919110166.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Khan, Mahmood A. "A design environment for deadlock-free concurrent software." Thesis, Aston University, 1992. http://publications.aston.ac.uk/8099/.

Full text
Abstract:
Using current software engineering technology, the robustness required for safety critical software is not assurable. However, different approaches are possible which can help to assure software robustness to some extent. For achieving high reliability software, methods should be adopted which avoid introducing faults (fault avoidance); then testing should be carried out to identify any faults which persist (error removal). Finally, techniques should be used which allow any undetected faults to be tolerated (fault tolerance). The verification of correctness in system design specification and performance analysis of the model, are the basic issues in concurrent systems. In this context, modeling distributed concurrent software is one of the most important activities in the software life cycle, and communication analysis is a primary consideration to achieve reliability and safety. By and large fault avoidance requires human analysis which is error prone; by reducing human involvement in the tedious aspect of modelling and analysis of the software it is hoped that fewer faults will persist into its implementation in the real-time environment. The Occam language supports concurrent programming and is a language where interprocess interaction takes place by communications. This may lead to deadlock due to communication failure. Proper systematic methods must be adopted in the design of concurrent software for distributed computing systems if the communication structure is to be free of pathologies, such as deadlock. Therefore, the objective of this thesis is to ensure that processes do not deadlock due to communication failure. A software tool was designed and used to facilitate the production of fault-tolerant software for distributed concurrent systems. Where Occam is used as a design language then state space methods, such as Petri-nets, can be used in analysis and simulation to determine the dynamic behaviour of the software, and to identify structures which may be prone to deadlock so that they may be eliminated from the design before the program is ever run. This design software tool consists of two parts. One takes an input program and translates it into a mathematical model (Petri-net), which is used for modeling and analysis of the concurrent software. The second part is the Petri-net simulator that takes the translated program as its input and starts simulation to generate the reachability tree. The tree identifies `deadlock potential' which the user can explore further.
APA, Harvard, Vancouver, ISO, and other styles
18

Mohan, Sridhar. "Deadlock avoidance in mixed capacity flexible manufacturing systems." [Tampa, Fla.] : University of South Florida, 2004. http://purl.fcla.edu/fcla/etd/SFE0000428.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Deorukhkar, Mayuresh. "Deadlock probability prediction and detection in distributed systems /." free to MU campus, to others for purchase, 2004. http://wwwlib.umi.com/cr/mo/fullcit?p1421130.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Holsmark, Rickard. "Deadlock Free Routing inMesh Networks on Chip with Regions." Licentiate thesis, Department of Computer and Information Science, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-20284.

Full text
Abstract:

There is a seemingly endless miniaturization of electronic components, which has enabled designers to build sophisticated computing structureson silicon chips. Consequently, electronic systems are continuously improving with new and more advanced functionalities. Design complexity ofthese Systems on Chip (SoC) is reduced by the use of pre-designed cores. However, several problems related to the interconnection of coresremain. Network on Chip (NoC) is a new SoC design paradigm, which targets the interconnect problems using classical network concepts. Still,SoC cores show large variance in size and functionality, whereas several NoC benefits relate to regularity and homogeneity.

This thesis studies some network aspects which are characteristic to NoC systems. One is the issue of area wastage in NoC due to cores of varioussizes. We elaborate on using oversized regions in regular mesh NoC and identify several new design possibilities. Adverse effects of regions oncommunication are outlined and evaluated by simulation.

Deadlock freedom is an important region issue, since it affects both the usability and performance of routing algorithms. The concept of faultyblocks, used in deadlock free fault-tolerant routing algorithms has similarities with rectangular regions. We have improved and adopted one suchalgorithm to provide deadlock free routing in NoC with regions. This work also offers a methodology for designing topology agnostic, deadlockfree, highly adaptive application specific routing algorithms. The methodology exploits information about communication among tasks of anapplication. This is used in the analysis of deadlock freedom, such that fewer deadlock preventing routing restrictions are required.

A comparative study of the two proposed routing algorithms shows that the application specific algorithm gives significantly higher performance.But, the fault-tolerant algorithm may be preferred for systems requiring support for general communication. Several extensions to our work areproposed, for example in areas such as core mapping and efficient routing algorithms. The region concept can be extended for supporting reuse ofa pre-designed NoC as a component in a larger hierarchical NoC.

APA, Harvard, Vancouver, ISO, and other styles
21

Zhou, Jun. "Deadlock Analysis of Message-Passing Programs with Identical Processes." NCSU, 2001. http://www.lib.ncsu.edu/theses/available/etd-20010105-233920.

Full text
Abstract:

Deadlocks are a common type of faults in message-passing programs. One approach to detecting deadlocks in a message-passing program is to perform reachability analysis, which involvesderiving possible global states of the program. The resulting state graph is referred to as a reachability graph (RG). The size of the RG of a message-passing program, in the worst case, is anexponential function of the number of processes in the program. This problem, referred to as the state explosion problem, makes reachability analysis impractical for message-passing programs withmany processes.

Assume that P is a message-passing program that contains one process type T with a dynamic number of instances. Let P_m denote the version of P that has m instances of T. To detect deadlocks inP, we apply reachability analysis to P_1, P_2, ..., and P_n, where n is an integer chosen randomly or according to some criterion. If the value of n is large, reachability analysis of P_n is impractical. Ifthe value of n is small, we have little confidence on whether P_k is deadlock-free for any k > n. A deadlock cutoff number c for P means that under certain conditions, if P_c has no deadlocks, then P_khas no deadlocks for any k > c. For message-passing programs that contain two or more process types with dynamic numbers of instances, their deadlock cutoff vectors are defined in a similar way.

In this dissertation we present four approaches to finding deadlock cutoff numbers for synchronous message-passing programs. These approaches are based on the use of observational equivalence,projection equivalence, client/server reachability graphs, and abstract client/server reachability graphs, respectively. The first three approaches assume that each process in a synchronousmessage-passing program is modeled as a labeled transition system (LTS). The fourth approach assumes that each process in a synchronous message-passing program is modeled as acommunicating finite state machine (CFSM) or extended CFSM.

Observational equivalence is an important concept in verifying properties of LTS systems. Let L be an instance of process type T in P. The environment of L in P_m, m>0, is defined to be thecomposition of processes in P_m excluding L. In other words, P_m is the composition of L and its environment in P_m. We show that if there exists an integer n such that the environments of L in P_nand P_{n+1} are observational equivalent and P_n has no global deadlocks, then P_k, k>n, has no global deadlocks and n is a deadlock cutoff number for P. We also show how to apply this approach toring-structured programs. One major problem with this approach is that it fails to find deadlock cutoff numbers for many message-passing programs.

To improve the above approach, we define a new equivalence relation called projection equivalence, which is weaker than observational equivalence. The projection of L in P_m, i>0, is defined to bethe behavior of L in P_m. The environments of L in P_i and P_j, i=\=j, are said to be projection equivalent if L has the same projection in P_i and P_j. We show how to apply projection equivalence tofind deadlock cutoff numbers for client/server programs and ring-structured programs. A client/server program contains a server and a number of clients. Clients call the server to request service;they do not communication with each other. The server cannot call individual clients. For client/server programs, we define a new type of reduced reachability graphs, called client/server reachabilitygraphs or CSRGs. The size of the CSRG of a client/server program is a polynomial function of the number of clients. Based on CSRGs, we show how to determine the existence of a deadlock cutoffnumber for a client/server program and how to find this number if it exists. We also show how to find deadlock cutoff vectors for client/server programs with two or more types of clients.

Finally, we consider client/server programs with two-way communication, which allows the server to call individual clients. Each client in such a program is represented as a communicating finitestate machine (CFSM), while the server is represented as an extended CFSM. For such programs, we define a new type of reduced reachability graphs, called abstract CSRGs or ACSRGs. Basedon ACSRGs, we show how to find deadlock cutoff numbers for client/server programs with two-way communication. Our empirical studies show that ACSRGs are much smaller than theircorresponding RGs. For example, for a solution to the gas station problem with one pump and six customers, its ACSRG has 74 states and its RG has 25394 states.

APA, Harvard, Vancouver, ISO, and other styles
22

Martin, Jeremy Malcolm Randolph. "The design and construction of deadlock-free concurrent systems." Thesis, University of Buckingham, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.601333.

Full text
Abstract:
Throughout our lives we take for granted the safety of complex structures that surround us. We live and work in buildings with scant regard for the lethal currents of electricity and flammable gas coarsing through their veins. We cross high bridges with little fear of them crumbling into the depths below. We are secure in the knowledge that these objects have been constructed using sound engineering principles. Now, increasingly, we are putting OUT lives into the hands of complex computer programs. One could cite aircraft control systems, railway signalling systems, and medical databases as examples. But whereas the disciplines of electrical and mechanical engineering have long been well understood, software engineering is in its infancy. Unlike other fields, there is no generally accepted certification of competence for its practitioners. Formal scientific methods for reliable software production have been developed, but these tend to require a level of mathematical knowledge beyond that of most programmers. Engineers, in general, are usually more concerned with practical issues than with the underlying scientific theory of their particular discipline. They want to get on with the business of building powerful systems. They rely on scientists to provide them with safety rules which they can incorporate into their designs. For instance, a bridge designer needs to know certain formulae to calculate how wide to set the span of an arch - he does not need to know why the formulae work. Software engineering is in need of a battery of similar rules to provide a bridge between theory and practice. The demand for increasing amounts of computing power makes parallel programming very appealing. However additional dangers lurk in this exciting field. In this thesis we explore ways to circumvent one particularly dramatic problem - deadlock. This is a state where none of the constituent processes of a system can agree on how to proceed, so nothing ever happens. Clearly we would desire that any sensible system we construct could never arrive at such a state, but what can we do to ensure that this is indeed the case? We might think to use a computer to check every posssible state of the system. But, given that the number of states of a parallel system usually grows exponentially with the number of processes, we would most likely find the task too great.
APA, Harvard, Vancouver, ISO, and other styles
23

Kshemkalyani, Ajay D. "Characterization and correctness of distributed deadlock detection and resolution /." The Ohio State University, 1991. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487694702783488.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Sánchez, César. "Deadlock avoidance for distributed real-time and embedded systems /." May be available electronically:, 2007. http://proquest.umi.com/login?COPT=REJTPTU1MTUmSU5UPTAmVkVSPTI=&clientId=12498.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Cape, David Andrew. "Deadlock detection and dihomotopic reduction via progress shell decomposition." Diss., Rolla, Mo. : Missouri University of Science and Technology, 2010. http://scholarsmine.mst.edu/thesis/pdf/Cape_09007dcc8078d6bb.pdf.

Full text
Abstract:
Thesis (Ph. D.)--Missouri University of Science and Technology, 2010.
Vita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed April 21, 2010) Includes bibliographical references (p. 133-134).
APA, Harvard, Vancouver, ISO, and other styles
26

Chua, Kee Koon 1965. "Deadlock avoidance: Improved algorithms for centralized and distributed systems." Thesis, The University of Arizona, 1992. http://hdl.handle.net/10150/291335.

Full text
Abstract:
A deadlock avoidance algorithm for a centralized resource allocation system is presented. Unlike the Banker's algorithm, this proposed algorithm makes use of the state of the previous safe sequence to construct a new safe sequence. The performance of this proposed algorithm is compared to that of both the Banker's algorithm and an efficient algorithm proposed by Belik. The simulation results show that our algorithm's execution time is significantly better than the Banker's algorithm and is very competitive with Belik's algorithm. In addition, our Modified Banker's Algorithm produces optimal results unlike Belik's approach which sometimes deems a safe allocation request unsafe. This centralized algorithm combined with an algorithm by Moser, is extended for use in distributed systems. Compared with Moser's algorithm, this algorithm is less restrictive in acquiring resources from other processes and allowing increase in its maximum resource requirement as confirmed by our analysis and simulation results.
APA, Harvard, Vancouver, ISO, and other styles
27

LÔBO, Rafael Brandão. "Deadlocks as runtime exceptions." Universidades Federais de Pernambuco, 2015. https://repositorio.ufpe.br/handle/123456789/17332.

Full text
Abstract:
Submitted by Fabio Sobreira Campos da Costa (fabio.sobreira@ufpe.br) on 2016-07-12T12:30:10Z No. of bitstreams: 2 license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) DISSERTAÇÃO (2015-08-17) - RAFAEL BRANDAO LOBO.pdf: 1015468 bytes, checksum: d543b6f16adc4ce4d3aa4d59c8d546ff (MD5)
Made available in DSpace on 2016-07-12T12:30:10Z (GMT). No. of bitstreams: 2 license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) DISSERTAÇÃO (2015-08-17) - RAFAEL BRANDAO LOBO.pdf: 1015468 bytes, checksum: d543b6f16adc4ce4d3aa4d59c8d546ff (MD5) Previous issue date: 2015-07-17
CAPEs
Deadlocks are a common type of concurrency bug. When a deadlock occurs, it is difficult to clearly determine whether there is an actual deadlock or if the application is slow or hanging due to a different reason. It is also difficult to establish the cause of the deadlock. In general, developers deal with deadlocks by using analysis tools, introducing application-specific deadlock detection mechanisms, or simply by using techniques to avoid the occurrence of deadlocks by construction. In this paper we propose a different approach. We believe that if deadlocks manifest at runtime, as exceptions, programmers will be able to identify these deadlocks in an accurate and timely manner. We leverage two insights to make this practical: (i) most deadlocks occurring in real systems involve only two threads acquiring two locks (TTTL deadlocks); and (ii) it’s possible to detect TTTL deadlocks efficiently enough for most practical systems. We conducted a study on bug reports and found that more than 90% of identified deadlocks were indeed TTTL.We extended Java’s ReentrantLock class to detect TTTL deadlocks and measured the performance overhead of this approach with a conservative benchmark. For applications whose execution time is not dominated by locking, the overhead is estimated as below 6%. Empirical usability evaluation in two experiments showed that students finished tasks 16.87% to 30.7% faster on the average using our approach with the lock being the most significant factor behind it, and, in one of the experiments they were able to identify the defects more accurately with a signficant 81.25% increase in the number of correct answers when deadlock exceptions where present.
Deadlocks são um tipo comum de bug de concorrência. Quando um deadlock acontece, é difícil determinar claramente se houve um deadlock de verdade ou se a aplicação está lenta ou travada por qualquer outro motivo. Também é difícil estabelecer a causa do deadlock. Em geral, desenvolvedores lidam com deadlocks de várias maneiras: utilizando ferramentas analíticas; utilizando mecanismos especificos da aplicação para detectar deadlocks; ou simplesmente usando técnicas para evitar a ocorrência de deadlocks no momento da construção do código. Neste trabalho, propomos uma abordagem diferente. Acreditamos que se deadlocks se manifestarem durante a execução na forma de exceções, programadores serão capazes de identificar esses deadlocks de forma mais precisa e mais rápida. Levamos em consideração alguns aspectos para tornar esta abordagem prática: (i) a maioria dos deadlocks que ocorrem em sistemas reais envolvem apenas duas threads adquirindo dois locks ou two-thread, two-lock (TTTL) deadlock; e (ii) é possível detectar TTTL deadlocks de forma suficientemente eficiente para uso prático na maioria dos sistemas. Conduzimos um estudo com bugs reportados em sistemas de software de larga escala e descobrimos que mais de 90% dos bugs identificados como deadlocks eram de fato TTTL. Extendemos a classe ReentrantLock de Java para detectar TTTL deadlocks e medimos seu overhead na performance com um benchmark bastante conservador onde medimos o overhead das operações de trava quando deadlocks não são possíveis. Para aplicações cujo tempo de execução não é dominado por travas, o impacto médio no tempo de execução é na ordem de 6%. Realizamos uma avaliação empírica para testar usabilidade através de dois experimentos. Nesta avaliação, mostramos que, em média, estudantes terminam tarefas de 16.87% a 30.7% mais rapidamente usando nossa abordagem, sendo o tipo de abordagem o fator de maior significância e, em um dos experimentos, estudantes foram capazes de identificar mais corretamente a causa dos bugs, mostrando que o número de respostas corretas aumentou significativamente em 81.25% quando as exceções propostas estavam presentes.
APA, Harvard, Vancouver, ISO, and other styles
28

Bernini, Simone. "Analisi e gestione del protocol deadlock nelle network-on-chip." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2010. http://amslaurea.unibo.it/1245/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Deering, Paul E. "Necessary and sufficient conditions for deadlock in a manufacturing system." Ohio : Ohio University, 2000. http://www.ohiolink.edu/etd/view.cgi?ohiou1179169384.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Landrum, Chad Michael. "A recursive algorithm to prevent deadlock in flexible manufacturing systems." Ohio : Ohio University, 2000. http://www.ohiolink.edu/etd/view.cgi?ohiou1172265184.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Faiz, Tariq Nadeem. "Deadlock detection and avoidance for a class of manufacturing systems." Ohio : Ohio University, 1996. http://www.ohiolink.edu/etd/view.cgi?ohiou1178654511.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Watt, Emir Patrick James. "Managing deadlock : organisational development in the British First Army, 1915." Thesis, University of Edinburgh, 2018. http://hdl.handle.net/1842/31530.

Full text
Abstract:
In terms of the British Army in the Great War, the study of whether or how the army learned has become the dominant historiographical theme in the past thirty years. Previous studies have often viewed learning and institutional change through the lens of the 'learning curve', a concept which emphasises that the high command of the British Army learned to win the war through a combination of trial and error in battle planning, and through careful consideration of their collective and individual experiences. This thesis demonstrates that in order to understand the complexities of institutional change in the Great War, we must look beyond ill-defined concepts such as the learning curve and adopt a more rigid framework. This thesis examines institutional change in the British First Army in the 1915 campaign on the western front. It applies concepts more commonly found in business studies, such as organisational culture, knowledge management and organisational memory, to understand how the First Army developed as an institution in 1915. It presents a five-stage model - termed the Organisational Development Model - which demonstrates how the high command of the First Army considered their experiences and changed their operational practices in response. This thesis finds that the 'war managers' decision-making was affected by a number of institutional and personal 'inputs' which shaped their approach to understanding warfare. This thesis examines the manner in which new knowledge was created and collated in the immediate post-battle period, before studying how the war managers considered new information, disseminated it across the force and institutionalised it in the organisation's formal practices, structures and routines. In a broad sense, this thesis does three things. First, by examining how the army learned it moves beyond standard narratives of learning in the British Army in the Great War and highlights the complex interplay between personal and institutional learning processes. Second, by focusing on institutional change in the 1915 campaign, it sheds new light on an understudied yet crucial part of the British war experience. Finally, in creating the Organisational Development Model, it provides a robust platform on which future research can be built.
APA, Harvard, Vancouver, ISO, and other styles
33

Kachru, Rajiv Carleton University Dissertation Computer Science. "Performance of some deadlock prevention routing algorithms for multicomputer systems." Ottawa, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Holsmark, Rickard. "Deadlock Free Routing in Mesh Networks on Chip with Regions." Licentiate thesis, Linköping : Department of Compuuter and Information Science, Linköpings universitet, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-20284.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

ElMekkawy, Tarek Younis. "Deadlock resolution in flexible manufacturing systems, a Petri nets based approach." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp05/NQ62315.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Lee, Jaehwan. "Hardware/Software Deadlock Avoidance for Multiprocessor Multiresource System-on-a-Chip." Diss., Also available online, Georgia Institute of Technology, 2004:, 2004. http://etd.gatech.edu/theses/available/etd-11222004-083429/unrestricted/lee%5Fjaehwan%5F200412%5Fphd.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Bodner, Douglas Anthony. "Real-time control approaches to deadlock management in automated manufacturing systems." Diss., Georgia Institute of Technology, 1996. http://hdl.handle.net/1853/25607.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

劉少華 and Siu-wah Lau. "A novel approach to deadlock prevention in store-and-forward networks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1991. http://hub.hku.hk/bib/B31209798.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Cai, Wentong. "Parallel program monitoring : the logical clock approach and its deadlock avoidance." Thesis, University of Exeter, 1990. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.279753.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Silva, Luciane de Fátima. "Detecção e correção de situações de deadlock em workflow nets interorganizacionais." Universidade Federal de Uberlândia, 2014. https://repositorio.ufu.br/handle/123456789/12555.

Full text
Abstract:
In this work, an approach based on Deadlock avoidance of Interorganizational Work-Flow nets is proposed to deal with these situations. Interorganizational business processes are modeled by Interorganizational WorkFlow nets. Deadlock situations in interorganizational business processes come generally related to losses during message exchanges between several business processes. Within the Petri net theory, a Deadlock situation is characterized by the presence of a siphon that can be empty. After detecting and controlling the Siphon structures that lead to Deadlock situations in Interorganizational WorkFlow nets, a method for the design of Interorganizational WorkFlow nets free of Deadlock is proposed. In particular, the basic principle is to dene new Work- Flow nets shared among the original work ow processes that allow one to remove the scenarios responsible for the Deadlocks.
Neste trabalho e proposta uma abordagem baseada na prevenção de deadlocks em WorkFlow nets Interorganizacionais para lidar com situações dessa natureza. Processos de negocio interorganizacionais são modelados por work ows interorganizacionais. Situações de deadlock nos processos de negocio interorganizacionais geralmente estão relacionadas a perdas durante trocas de mensagens entre varios processos de negocio. Dentro da teoria das redes de Petri, uma situação de deadlock e caracterizada pela presenca de um sifão que pode car vazio. Depois de detectar e controlar as estruturas de sifão que levam as situações de deadlock nas WorkFlow nets Interorganizacionais, e proposta uma arquitetura distribuda para modelar as WorkFlow nets Interorganizacionais livre de deadlock. Em particular, o princpio basico consiste em denir novas WorkFlow nets compartilhadas entre os work ows originais que permitem remover os cenarios responsaveis pelos deadlocks.
Mestre em Ciência da Computação
APA, Harvard, Vancouver, ISO, and other styles
41

Lau, Siu-wah. "A novel approach to deadlock prevention in store-and-forward networks /." [Hong Kong : University of Hong Kong], 1991. http://sunzi.lib.hku.hk/hkuto/record.jsp?B13005625.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Birkinshaw, Carl Ian. "Engineering communicative distributed safety-critical systems." Thesis, University of Sheffield, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.263801.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Yamamoto, Yuji, R. C. Schmidt, Hiroo Suzuki, Motoki Okumura, Keiko Yokoyama, Koji Kadota, and Akifumi Kijima. "Switching Dynamics in an Interpersonal Competition Brings about “Deadlock” Synchronization of Players." PLOS ONE, 2012. http://hdl.handle.net/2237/17183.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Côté, Claire. "Pseudosimulation in distributed simulations : a deadlock prevention algorithm with fixed memory requirements." Thesis, McGill University, 1991. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=59962.

Full text
Abstract:
Distributing discrete event simulations among several processors appears to be a promising approach to speed up simulations and reduce the complexity of the tasks to be accomplished by each processor. Processing the events in parallel requires a synchronization technique which would insure the simulation correctness while keeping the overhead relatively low. In a distributed simulation, the simulation progresses at a different speed in every processor. The main problem consists in enabling a processor to know if it holds all the information needed to correctly make a further step in the simulation. We describe an algorithm having fixed memory requirements and allowing a processor to know if it holds a complete set of information in order to correctly continue the simulation. The algorithm also forces missing information to arrive at a processor that requested it.
APA, Harvard, Vancouver, ISO, and other styles
45

Martorelli, Hernández María Paola de San Nicolás. "Beyond deadlock? : legislative co-operation in the Latin American presidential/PR systems." Thesis, University of Essex, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.442517.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

ANTONINO, Pedro Ribeiro Gonçalves. "A refinement based strategy for locally verifying networks of CSP processes." Universidade Federal de Pernambuco, 2014. https://repositorio.ufpe.br/handle/123456789/11966.

Full text
Abstract:
The increase of computer systems complexity has led to a direct increase in the difficulty of verifying their correctness. For mastering this complexity, formal methods can be used in the development of systems providing techniques for both design and verification. Regarding concurrent and distributed systems, the necessity of a formal approach is more prominent given the substantial increase in complexity due to the countless number of interactions between their constituent systems. Unfortunately, however, current methods are not capable of dealing with the automated analysis of such systems in general, even if we consider only classical properties such as deadlock freedom; the state explosion problem is the main reason for this ineffectiveness. This work is a contribution in this direction. Particularly, considering networks of CSP processes, this work proposes a local strategy for deadlock analysis based on the notion of process refinement. The locality of this strategy prevents the state explosion problem generated by the interaction of constituent systems, which represents a major asset of our strategy. We define a refinement assertion for checking conflict freedom between pairs of processes in the network; this can be used for the local verification of networks with an acyclic communication topology. Concerning networks with a cyclic communication topology, we propose three patterns that prevent deadlocks: the resource allocation, the client/server and the async dynamic. These patterns impose behavioural and structural restrictions to prevent deadlocks. The behavioural restrictions are also captured by refinement assertions, which enable one to automatically verify these conditions using a refinement checker. Besides this, we develop four case studies to evaluate the efficiency of our strategy in practice: a ring buffer, a dining philosopher, and two variations of a leadership election algorithm. One of the variations of the leadership election algorithm consists of a model used in practice by the B&O Company, an industrial partner. In this study, we compare our strategy with two other techniques for deadlock freedom verification, the SSD algorithm of the Deadlock Checker tool and the built-in deadlock freedom assertion of FDR. This study demonstrates how our strategy can be used and that it might be a useful alternative to analysing complex industrial systems for deadlock freedom.
Submitted by Luiz Felipe Barbosa (luiz.fbabreu2@ufpe.br) on 2015-03-10T16:54:41Z No. of bitstreams: 2 DISSERTAÇÃO Pedro Ribeiro Gonçalves Antônio.pdf: 921372 bytes, checksum: 64def1c3ae98cbca7868d944c1f786f2 (MD5) license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5)
Made available in DSpace on 2015-03-11T17:34:41Z (GMT). No. of bitstreams: 2 DISSERTAÇÃO Pedro Ribeiro Gonçalves Antônio.pdf: 921372 bytes, checksum: 64def1c3ae98cbca7868d944c1f786f2 (MD5) license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) Previous issue date: 2014-03-31
Com o aumento da complexidade dos sistemas computacionais, houve também um aumento da dificuldade na tarefa de verificação de sistemas. Para lidar com essa complexidade, métodos formais podem ser usados no desenvolvimento de sistemas, fornecendo técnicas para a modelagem e verificação. No contexto de sistemas concorrentes e distribuídos, a necessidade de uma abordagem formal é ainda mais proeminente, dadas as inúmeras possibilidades de interação entre seus sistemas componentes. Entretanto, infelizmente, os métodos atuais não se encontram, de forma geral, completamente aptos a lidar com a análise automática desses sistemas, mesmo em se tratando de propriedades clássicas como a ausência de deadlocks. A explosão do espaço de estados a ser analisado é o principal fator para essa ineficácia por parte desses sistemas. O trabalho apresentado é uma contribuição nesta direção. Considerando o conceito de redes de processos CSP, o presente trabalho propõe uma estratégia local para a análise de deadlocks baseada na noção de refinamento de processos. A localidade dessa estratégia previne a explosão de espaço de estados causada pela interação de sistemas componentes, o que constitui uma vantajosa característica da nossa estratégia. O trabalho define uma expressão de refinamento capturando o conceito de ausência de conflito, que pode ser usado para verificar localmente que uma rede de processos com uma topologia de comunicação acíclica é livre de deadlocks. Para as redes com topologia cíclica, o trabalho sistematiza e formaliza três padrões comportamentais que impedem deadlocks: o alocação de recursos, o cliente/servidor e o assíncrono dinâmico. Esses padrões impõem restrições comportamentais e estruturais para prevenir deadlocks. Essas restrições comportamentais também são capturadas através de expressões de refinamento, o que possibilita a verificação automática dessas condições com o uso de um verificador de refinamento. Além disso, são apresentados quatro estudos de caso usados para avaliar o desempenho da nossa técnica na prática: um buffer circular, um jantar dos filósofos e duas variações de um algoritmo para eleição de líder. Uma dessas variações consiste num modelo usado na prática pela empresa B&O, um parceiro industrial. Nesse estudo, avaliamos a nossa técnica em comparação com outras duas técnicas para verificação de ausência de deadlocks, o algoritmo SSD da ferramenta Deadlock Checker e a asserção de verificação de deadlocks padrão do verificador de modelos FDR. Esse estudo demonstra como a nossa estratégia é aplicada e que ela pode ser uma alternativa vantajosa para a verificação de sistemas complexos.
APA, Harvard, Vancouver, ISO, and other styles
47

Nguyen, Tuong M. "On exploring even reachable global state space to verify deadlock freedom of protocols." Thesis, University of Ottawa (Canada), 2002. http://hdl.handle.net/10393/6424.

Full text
Abstract:
During the fourth international conference on computer communications and networks (ICCCN), which was held in Las Vegas in September 1995, Peng introduced another relief strategy for reachability analysis, called even reachability analysis. In the proceedings of ICCCN'95, Peng also attempts to prove that deadlock freedom of any n-process protocol with arbitrary topology is verifiable by even reachability analysis with more than one-half reduction in generated global states. This thesis reviews the Peng strategy and proves that the selected set of transition pairs is not sufficient to reach all deadlock states in an n-process protocol with arbitrary topology. Hence, deadlock freedom of the protocol is not verifiable by the Peng strategy for even reachability analysis. This thesis then forms an extended set of transition pairs to explore the entire even reachable global state space in a finite sequentially reachable global state space. Finally, the ideas of even reachability analysis are visited again and compared with existing relief strategies. (Abstract shortened by UMI.)
APA, Harvard, Vancouver, ISO, and other styles
48

Khonsari, Ahmad. "Performance modelling and analysis of deadlock recovery routing algorithms in multicomputer interconnection networks." Thesis, University of Glasgow, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.398647.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Parreira, Daniel Luis Landeiroto. "Data-centric concurrency control on the java programming language." Master's thesis, Faculdade de Ciências e Tecnologia, 2013. http://hdl.handle.net/10362/10814.

Full text
Abstract:
Dissertação para obtenção do Grau de Mestre em Engenharia Informática
The multi-core paradigm has propelled shared-memory concurrent programming to an important role in software development. Its use is however limited by the constructs that provide a layer of abstraction for synchronizing access to shared resources. Reasoning with these constructs is not trivial due to their concurrent nature. Data-races and deadlocks occur in concurrent programs, encumbering the programmer and further reducing his productivity. Even though the constructs should be as unobtrusive and intuitive as possible, performance must also be kept high compared to legacy lock-based mechanism. Failure to guarantee similar performance will hinder a system from adoption. Recent research attempts to address these issues. However, the current state of the art in concurrency control mechanisms is mostly code-centric and not intuitive. Its codecentric nature requires the specification of the zones in the code that require synchronization,contributing to the decentralization of concurrency bugs and error-proneness of the programmer. On the other hand, the only data-centric approach, AJ [VTD06], exposes excessive detail to the programmer and fails to provide complete deadlock-freedom. Given this state of the art, our proposal intends to provide the programmer a set of unobtrusive data-centric constructs. These will guarantee desirable security properties: composability, atomicity, and deadlock-freedom in all scenarios. For that purpose, a lower level mechanism (ResourceGroups) will be used. The model proposed resides on the known concept of atomic variables, the basis for our concurrency control mechanism. To infer the efficiency of our work, it is compared to Java synchronized blocks, transactional memory and AJ, where our system demonstrates a competitive performance and an equivalent level of expressivity.
RepComp project(PTDC/EIA-EIA/108963/2008)
APA, Harvard, Vancouver, ISO, and other styles
50

Castillo, Ernesto Cristopher Villegas. "DyAFNoC: sistema dinamicamente reconfigurável baseado em redes intrachip com algoritmo de roteamento ordenado por dimensão flexibilizado." Universidade de São Paulo, 2014. http://www.teses.usp.br/teses/disponiveis/3/3140/tde-31122015-101031/.

Full text
Abstract:
O aumento da capacidade dos Sistemas sobre Silício (SoCs do inglês, Systemon-Chip) tem levado Redes Intrachip (NoCs do inglês, Network on-Chip) a serem utilizadas como interface de comunicação de Módulos de Processamento de sistemas complexos, e particularmente em Sistemas Dinamicamente Reconguráveis a serem implementados sobre FPGAs com capacidade de reconguração parcial. Algumas estratégias de reconguração geram cenários com NoCs irregulares e indiretas, fato que força o sistema a atualizar o seu algoritmo de roteamento afim de se evitar problemas de comunicação de dados, como deadlock e livelock. O presente trabalho apresenta uma NoC Dinamicamente Recongurável (DRNoC do inglês, Dynamically Recongurable Newtwork on-Chip) utilizando o Algoritmo de Roteamento Ordenado por Dimensão Flexibilizado (FDOR do inglês, Flexible Dimension Order Routing) que se caracteriza principalmente sua simplicidade, baixa complexidade e ser livre de deadlock. No presente trabalho, foi implementada a ferramenta DRSimGen, que gera código VHDL da arquitetura da NoC associada, para ser utilizado com aplicações específicas com reconfiguração parcial dinâmica que requeiram comunicações paralelas entre seus módulos de processamento. Esta ferramenta gera os roteadores, módulos de processamento, além de um Sistema de Controle de Reconguração Parcial Dinâmica que pode ser utilizado junto com o Sistema de Reconguração do algoritmo de roteamento baseado em FDOR, já desenvolvido por outros anteriormente. A ferramenta também gera componentes de testbench para a simulação do sistema, baseados na técnica de Chaveamento Dinâmico de Circuitos; são utilizadas chaves de isolação para emularos processos de reconguração parcial dinâmica. Os resultados destes experimentos ajudaram a determinar o comportamento desejado do sistema. Também foram feitas simulações da implementação do FDOR em descrição de alto nível, com a finalidade de determinar seu desempenho na transferência de dados que ajudarão a definir o posicionamento dos módulos de processamento sobre a estrutura da rede. Os resultados dos experimentos tem demonstrado a viabilidade desta estratégia, levando à conclusão que o algoritmo FDOR é uma solução adequada para DRNoCs.
The increased capacity of Systems on-Chip (SoCs) has led Networks on-Chip (NoC) to be used as communication interface for processing modules of complex systems, and particularly in Dynamically Recongurable Systems to be implemented over partially recongurable FPGAs. Some reconguration strategies work on irregular and indirect NoCs, fact that forces the system to update its routing algorithm in order to avoid data communication problems, such as deadlockandlivelock. ThispaperpresentsaDynamicallyRecongurableNoC(DRNoC)using Flexible Dimension Order Routing Algorithm (FDOR), mainly characterized by its simplicity, low complexity and deadlock freedom In this work, the DyAFNoC tool was implemented, to generate the VHDL code of the associated NoC architecture to be used with specic applications with dynamic partial reconguration that require parallel communications between their processing modules. This tool generates routers, processing modules, and also a Partial Dynamic Reconguration Control System that can be used with the FDOR-based Reconguration System, developed elsewhere. The tool also generates testbench components for the system simulation, based on the Dynamic Circuit Switching technique that uses isolation switches to emulate the dynamic partial reconguration processes. The results of these experiments have helped to determine the desired system behavior. Simulations of the FDOR implementation were also made in high level descriptioninordertodetermineitsdatatransferperformancethatwillhelptodeneplacement of the processing modules over the network structure. The experiments results have demonstrated the feasibility of this strategy, leading to the conclusion that the FDOR algorithm is a suitable solution for DRNoC.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography