skip to main content
10.1145/167088.167139acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free Access

Lower bounds for randomized mutual exclusion

Published:01 June 1993Publication History
First page image

References

  1. AS91.H. Attiya and M. Snir. Better computing on the #nonymous ring. Journal of Algorithms, 12:204-238, June 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. BFJ+82.J. E. Burns, M. J. Fischer, P. Jackson, N. A. Lynch, and G. L. Peterson. Data requirements for implementation of nprocess mutual exclusion using a single shared variable. JA CM, 29:183-205, 1982. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. BO83.M. Ben-Or. Another advantage of free choice: Complete asynchronous agreement protocols. In 6th ACM Symp. on Principles of Distributed Computing, pages 27-30, August 1983. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Bra85.G. Bracha. An o(log n) expected rounds randomized byzantine generals protocol. In 17th ACM Symp. on Theory of Computing, pages 316-326, 1985. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. CIL87.B. Chor, A. israeli, and M. Li. On process coordination using asynchronous hardware. In 6th ACM Syrup. on Principles of Distributed Computing, pages 86-97, August 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Dij65.E. Dijkstra. Solution of a problem in concurrent programming control. CACM, 8(9):569, 1965. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. FL82.M. Fischer and N. Lynch. A lower bound for the time to assure interactive consistency. IPL, 14(4):183-186, 1982.Google ScholarGoogle ScholarCross RefCross Ref
  8. FLP85.M.J. Fischer, N. A. Lynch, and M. S. Paterson. Impossibility of distributed consensus with one family faulty process. Journal of the ACM, 32(2):374- 382, April 1985. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. FM88.P. Feldman and S. Micali. Optimal algorithms for byzantine agreement. In 20th ACM Symp. on Theory of Computing, pages 148-161, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. GY89.R.L. Graham and A. C. Yao. On the improbability of reaching byzantine agreements. In 21st ACM Symp. on Theory of Computing, pages 467-478, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. IR81.A. Itai and M. Rodeh. The lord of the ring, or probabilistic methods for breaking symmetry in distributed networks. In Proc. 22th IEEE Syrup. on Foundations of Computer Science, pages 150- 158, Nashville, T ennesse, October 1981.Google ScholarGoogle Scholar
  12. KR92.E. Kushilevitz and M. O. Rabin. Randomized mutual exclusion Mgorithms revisited. In llth ACM Symp. on Principles of Distributed Computing, pages 273-285, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. KY84.A. Karlin and A. C. Yao. Probabilistic lower bounds for byzantine agreement. 1984.Google ScholarGoogle Scholar
  14. LR81.D. Lehman and M. O. Rabin. On the advantage of free choice: A symmetric and fully distributed solution to the dining philosophers problem. In 8th POPL, pages 133-138, 1981. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Rab82.M.O. Rabin. n-process mutual exclusion with bounded waiting by 4log2 nvalued shared variable. JCSS, 25(1):66- 75, 1982.Google ScholarGoogle ScholarCross RefCross Ref
  16. Sai92.I. Saias. Proving probabilistic correctness statements: The case of Rabin's algorithm for mutual exclusion. In llth ACM Symp. on Principles of Distributed Computing, pages 263-272, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Yao77.A.C. Yao. Probabilistic computations: Toward a unified measure of complexity. In Proc. 18th IEEE Syrup. on Foundations of Computer Science, pages 222- 227, 1977.Google ScholarGoogle Scholar

Index Terms

  1. Lower bounds for randomized mutual exclusion

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            STOC '93: Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing
            June 1993
            812 pages
            ISBN:0897915917
            DOI:10.1145/167088

            Copyright © 1993 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 June 1993

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Acceptance Rates

            Overall Acceptance Rate1,469of4,586submissions,32%

            Upcoming Conference

            STOC '24
            56th Annual ACM Symposium on Theory of Computing (STOC 2024)
            June 24 - 28, 2024
            Vancouver , BC , Canada

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader