Token-based sequential consistency

被引:0
|
作者
Raynal, M [1 ]
机构
[1] Univ Rennes 1, IRISA, F-35042 Rennes, France
来源
COMPUTER SYSTEMS SCIENCE AND ENGINEERING | 2002年 / 17卷 / 06期
关键词
asynchronous distributed systems; message passing; shared memory abstraction; sequential consistency; token;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A concurrent object is an object that can be concurrently accessed by several processes. Sequential consistency is a consistency criterion for such objects. It informally states that a multiprocess program executes correctly if its results could have been produced by executing that program on a single processor system. (Sequential consistency is weaker than atomic consistency - the usual consistency criterion- - as it does not refer to realtime.) The paper proposes a new surprisingly simple protocol that ensures sequential consistency when the shared memory abstraction is Supported by the local memories of nodes that can communicate only by exchanging messages through reliable channels. The protocol nicely combines in a simple way the use a token with cached values. it has the noteworthy property to never invalidate cached values, thereby providing fast read operations (i.e., a process has never to wait to get a correct value of a shared object). Additionally, The paper presents a simple token navigation protocol.
引用
收藏
页码:359 / 365
页数:7
相关论文
共 50 条
  • [21] A token-based single sign-on protocol
    Hui, L
    Ting, S
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 180 - 185
  • [22] TOKEN-BASED EXTRACTION OF STRAIGHT-LINES
    BOLDT, M
    WEISS, R
    RISEMAN, E
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS, 1989, 19 (06): : 1581 - 1594
  • [23] DenseDINO: Boosting Dense Self-Supervised Learning with Token-Based Point-Level Consistency
    Yuan, Yike
    Fu, Xinghe
    Yu, Yunlong
    Li, Xi
    PROCEEDINGS OF THE THIRTY-SECOND INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, IJCAI 2023, 2023, : 1695 - 1703
  • [24] An active attack on the token-based security protocol
    Abdelshafy, M.A.
    Elsaholy, M.S.
    Darwish, M.G.
    Journal of Engineering and Applied Science, 2001, 48 (02): : 365 - 383
  • [25] A Token-based Protocol for Securing MQTT Communications
    Calabretta, Marco
    Pecori, Riccardo
    Veltri, Luca
    2018 26TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2018, : 246 - 251
  • [26] An empirical study of token-based micro commits
    Kondo, Masanari
    German, Daniel M.
    Kamei, Yasutaka
    Ubayashi, Naoyasu
    Mizuno, Osamu
    EMPIRICAL SOFTWARE ENGINEERING, 2024, 29 (06)
  • [27] CoKey: Fast Token-Based Cooperative Cryptography
    Horsch, Julian
    Wessel, Sascha
    Eckert, Claudia
    32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016), 2016, : 314 - 323
  • [28] A centralized token-based distributed mutual exclusion algorithm
    Wu, MY
    Shu, W
    PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, 2000, : 387 - 392
  • [29] Token-based payment in dynamic SAML-based federations
    Lutz, David J.
    Stiller, Burkhard
    RESILIENT NETWORKS AND SERVICES, 2008, 5127 : 185 - +
  • [30] The impact of clustering on token-based mutual exclusion algorithms
    Sopena, Julien
    Arantes, Luciana
    Legond-Aubry, Fabrice
    Sens, Pierre
    EURO-PAR 2008 PARALLEL PROCESSING, PROCEEDINGS, 2008, 5168 : 565 - 575