Registers
نویسنده
چکیده
Consider a system of asynchronous processes that communicate among themselves by only executing read and write operations on a set of shared variables (also known as shared registers). The system has no global clock or other synchronization primitives. Every shared variable is associated with a process (called owner) which writes it and the other processes may read it. An execution of a write (read) operation on a shared variable will be referred to as a Write (Read) on that variable. A Write on a shared variable puts a value from a predetermined finite domain into the variable, and a Read reports a value from the domain. A process that writes (reads) a variable is called a writer (reader) of the variable. We want to construct shared variables in which the following two properties hold. (1) Operation executions are not necessarily atomic, that is, they are not indivisible but rather consist of atomic sub-operations, and (2) every operation finishes its execution within a bounded number of its own steps, irrespective of the presence of other operation executions and their relative speeds. That is, operation executions are wait-free. These two properties give rise to a classification of shared variables, depending on their output characteristics. Lamport [8] distinguishes three categories for 1-writer shared variables, using a precedence relation on operation executions defined as follows: for operation executions A and B, A precedes B, denoted A −→ B, if A finishes before B starts; A and B overlap if neither A precedes B nor B precedes A. In 1-writer variables, all the Writes are totally ordered by " −→ ". The three categories of 1-writer shared variables defined by Lamport are the following. 1. A safe variable is one in which a Read not overlapping any Write returns the most recently written value. A Read that overlaps a Write may return any value from the domain of the variable.
منابع مشابه
DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers
To control the exponential growth of malware files, security analysts pursue dynamic approaches that automatically identify and analyze malicious software samples. Obfuscation and polymorphism employed by malwares make it difficult for signature-based systems to detect sophisticated malware files. The dynamic analysis or run-time behavior provides a better technique to identify the threat. In t...
متن کاملACADEMIC WRITING REVISITED: A PHRASEOLOGICAL ANALYSIS OF APPLIED LINGUISTICS HIGH-STAKE GENRES FROM THE PERSPECTIVE OF LEXICAL BUNDLES
Lexical bundles are frequent word combinations that commonly appear in different registers. They have been the subject of much research in the area of corpus linguistics during the last decade. While most previous studies of bundles have mainly focused on variations in the use of these word combinations across different registers and a number of disciplines, not much research has been done to e...
متن کاملI-18: Evaluating Pregnancy and Long-Term Outcomes of ART
When treating infertile couples by assisted reproductive technologies (ART), all aspects of their care in individual clinics should be evaluated frequently. Results should then be compared with other clinics offering similar treatment. Evaluation of possible adverse longterm outcomes can be achieved by pooling results from individual clinics in national, regional and international registers and...
متن کاملThe risk of risk registers - managing risk is managing discourse not tools
D rummond (2011) eloquently illustrates the Janus-head of MIS using a vivisection of risk registers, noting how, although risk registers are commonly used, they often fail. Drummond finds two root causes for their failure (1) the fog of risk and (2) the surplus reality of risk registers. Drummond first notes that risk registers compile information about the future of the world and the possible ...
متن کاملVillage registers for vital registration in rural Malawi.
Paper-based village registers were introduced 5 years ago in Malawi as a tool to measure vital statistics of births and deaths at the population level. However, usage, completeness and accuracy of their content have never been formally evaluated. In Traditional Authority Mwambo, Zomba district, Malawi, we assessed 280 of the 325 village registers with respect to (i) characteristics of village h...
متن کاملOn the Importance of Registers for Computability
All consensus hierarchies in the literature assume that we have, in addition to copies of a given object, an unbounded number of registers. But why do we really need these registers? This paper considers what would happen if one attempts to solve consensus using various objects but without any registers. We show that under a reasonable assumption, objects like queues and stacks cannot emulate t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008