z-logo
open-access-imgOpen Access
Efficient token-based control in rings
Author(s) -
Esteban Feuerstein,
Stefano Leonardi,
Alberto Marchetti-Spaccamela,
Nicola Santoro
Publication year - 1996
Publication title -
citeseer x (the pennsylvania state university)
Language(s) - English
Resource type - Conference proceedings
DOI - 10.1145/248052.248080
Subject(s) - computer science , security token , control (management) , computer network , artificial intelligence
In this paper we deal with the efficiency oftoken-based strategies for the basic problem of controlling the allocation of a shared resource in a ring of n processing entities. We propose new protocols that allow a bounded number of exchanged messages per access request to the resource, while this amount is unbounded for classical solutions. We also guarantee all the requests to be served within a maximum delay. The new proposed protocols are request-message-based strategies, in that a process entity sends a message to “inform” the token of the access request.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom