article
Free Access

The Deadlock problem: a classifying bibliography

Authors Info & Claims
Online:01 October 1983Publication History

Abstract

The desire for a better utilisation of resources and an acceleration of computing introduced the concept of parallelism with all its difficulties. Soon the danger of eternal delays of processes was discovered and called deadlock. For almost twenty years a lot of publications have dealt with problems considering deadlocks or their environment.Here we want to give a classification of our collected publications. We do not claim that this collection is complete in any sense, but we hope to have found essential articles (underlined) for nearly all the different topics fitting under the title "Deadlock".This classification regards different aspects of the problem and cannot always be given unambigiously so that many publications are listed several times. We would appreciate to get knowledge of other interesting articles or textbooks to this theme.

References

  1. {Ahu 79} V. Ahuja / Algorithm to Network States for Deadlock / IBM Research and Development, Vol. 23, No. 1, January 1979 C3, Dl]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. {Ahu 80} V. Ahuja / Determining Deadlock Exposure for a Class of Store and Forward Communication Networks / IBM Research and Development, Vol. 24, No. 1, January 1980 C3, D2]]Google ScholarGoogle Scholar
  3. {Ba 82} P. Bathelt / Vergleich von Synchronisationsmechanismen / Arbeitsbericht des Insituts für mathematische Maschinen und Datenverarbeitung (Informatik), Band 15, Number 3, Universität Erlangen Nürnberg, May 1982, 1--38, (dt.) E2]]Google ScholarGoogle Scholar
  4. {BiUn 79} P. Bittmann, K. Unterauer / Models and Algorithms for Deadlock Detection / in "Operating Systems: Theory and Practice", edited by D. Lanciaux, North-Holland Publishing Company, 1979, 101--111 C2, D1]]Google ScholarGoogle Scholar
  5. {BłBo 81} J. Błazewicz, D. P. Bovet / Detection and Avoidance in Store and Forward Communication Networks / in Performance '81 editor: F. J. Kylstra, North-Holland Publishing Company, 1981 C3, D1, D2]]Google ScholarGoogle Scholar
  6. {ChBoTr 74} D. D. Chamberlin, R. F. Boyce, I. L. Traiger / A Deadlock-free Scheme for Resource Locking in a Data-Base Environment / Information Processing 74, North-Holland Publishing Company, 1974 C2, D3, E3]]Google ScholarGoogle Scholar
  7. {CheGelMit 83} A. Chesnais, E. Gelenbe, I. Mitrani / On the Modelling of Parallel Access to Shared Data / CACM, Vol. 26, No. 3, March 1983, 196--202 C2, F]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. {CoEISh 71} E. G. Coffman, M. J. Elphick, A. Shoshani / System Deadlocks / Computing Surveys, Vol. 3, NO. 2, June 1971 67--78 C1, D3]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. {CoDen 73} E. G. Coffman, P. J. Denning / Operating Systems Theory / Prentice Hall, 1973 B]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. {Da 72} D. W. Dawies / The Control of Congestion in Packet-Switching Networks / IEEE TRansactions on Communications, Vol. COM-20, No. 3, June 1972, 546--550 C3]]Google ScholarGoogle Scholar
  11. {Dad 81} P. Dadam / Einführung in die Synchronisation von Datenbank-Systemen / Elektronische Rechenanlagen, 23. Jahrgang, Heft 1, 1981, 4--12, (dt.) E2]]Google ScholarGoogle Scholar
  12. {De 74} R. Devillers / Prévention des interblocages dans un modèle à organigrammes / Ph.D. thèse, Université Libre de Bruxelles, Faculté des Sciences, 1974 (fr.) C1, D3]]Google ScholarGoogle Scholar
  13. {De 77} R. Devillers / Game Interpretation of the Deadlock Avoidance Problem / CACM, Vol. 20, No. 10, Octber, 1977, 741--745 C1, D3]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. {DeLa 78} R. E. Devillers, P. E. Lauer / A General Mechanism for Avoiding Starvation with Distributed Control / Information Processing Letters, Vol. 7, No. 3, January 1978 E1]]Google ScholarGoogle ScholarCross RefCross Ref
  15. {Di 68} E. W. Dijkstra / Cooperating Sequential Processes / Academic Press, New York, 1968 C1, E2]]Google ScholarGoogle Scholar
  16. {Di 71} E. W. Dijkstra / Hierarchical Ordering of Sequential Processes / Acta Informatica, Vol. 1, No. 2, October 1971, 115--138 C1, E2]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. {Fo 71} R. O. Fontao / A Concurrent Algorithm for Avoiding Deadlocks in Multiprocess Multiple Resource Systems / Third ACM Symposium on Operating Systems Principles, Stanford University, 1971, 72--79 C1, D3]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. {GeRe 83} J. Geisberger, A. Reiser / Sperrprotokolle für Transaktionen mit Prioritäten / Technische Universität München, interner Bericht, TUM-I8304, February 1983, (dt.) C2, D1]]Google ScholarGoogle Scholar
  19. {Gi 80} H. Giesen / Ein effizienter Algorithmus zur Vermeidung von Deadlocks / EWH Koblenz, Seminar für Infomatik, interner Bericht 4/80, 1980, (dt.) C1, D3]]Google ScholarGoogle Scholar
  20. {GISh 80} V. D. Gligor, S. H. Shattuck / On Deadlock Detection in Distributed Systems / IEEE Transactions on Software Engineering, Vol. SE-6, No. 5, September 1980 C2, D1]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. {Go 78} M. Gold / Deadlock Prediction: Easy and Difficult Cases / SIAM Journal of Comput., Vol. Y, No. 3, August 1978, 320--336 A, C1, D2, D3]]Google ScholarGoogle Scholar
  22. {GrHomObKo 81} J. Gray, P. Homan, R. Obermarck, H. Korth / A Straw Man Analysis of Waiting and Deadlock / IBM Research Laboratory, San Jose, California, RJ3066, 1981 F]]Google ScholarGoogle Scholar
  23. {Ha 69} A. N. Habermann / Prevention of System Deadlocks / CACM, Vol. 12, No. 7, July 1969, 373--386 C1, D3]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. {Ha 74} A. N. Habermann / A New Approach to Avoidance of System Deadlocks / Lecture Notes in Computer Science, editors: E. Gelenbe and C. Kaiser, "Operating Systems", Springer Verlag, Vol. 16, 1974, 163--170 C1, D3]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. {Ha 77} A. N. Habermann / System Deadlocks / in "Current Trends in Programming Methodology", editors: K. M. Chandy, R. T. Yeh, Prentice Hall, 1978 C1, D3]]Google ScholarGoogle Scholar
  26. {Hav 68} J. W. Havender / Avoiding Deadlock in Multitasking Systems / IBM Systems Journal, No. 2, 1968 C1, D3]]Google ScholarGoogle Scholar
  27. {He 72} P. G. Hebalkar / A Graph Model for Analysis of Deadlock Prevention in Systems with Parallel Computations / Information Processing '71, North-Holland Publishing Company, 1972, 498--503 C1, D2]]Google ScholarGoogle Scholar
  28. {HoRa 82} G. S. Ho, C. V. Ramamoorthy / Protocols for Deadlock Detection in Distributed Database Systems / IEEE Transactions on Software Engineering, Vol. SE-8, No 6, November 1982, 554--557 C2, D1, E3]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. {Hol 71} R. C. Holt / Comments on Prevention of System Deadlocks / CACM, Vol. 14, No. 1, January 1971, 36--38 C1]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. {Hol 72} R. C. Holt / Some Deadlock Properties of Computer Systems / Computing Surveys, Vol. 4, No. 3, September 1972, 179--196 C1, D1, D3]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. {Holz 82} G. J. Holzmann / A Theory of Protocol Validation / IEEE Transactions on Computers, Vol. C-31, No. 8, August 1982, 730--738 C3, D2, E2]]Google ScholarGoogle Scholar
  32. {HofSch 82} J. Hofmann, H. Schmutz / Performance Analysis of Suspend Locks in Operating Systems / IBM Research and Development, Vol. 26, No 2, March 1982 F]]Google ScholarGoogle Scholar
  33. {How 73} H. H. Howard / Mixed Solutions for the Deadlock Problem / CACM, Vol. 16, No. 7, July 1973, A, C1]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. {IbKa 82} T. Ibaraki, T. Kameda / Deadlock-Free Systems for a Bound Number of Processes / IEEE Transactions on Computers, Vol. C-31, No. 3, March 1982, 188--193 C1, D2]]Google ScholarGoogle Scholar
  35. {Ka 77} T. Kameda / A Polynomial-Time Test for Deadlock-Freedom of Computer Systems / Proc. Third GI-Fachtagung Theoretische Informatik, Darmstadt, March 1977, 282--291 C1, D2]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. {Ka 80} T. Kameda / Testing Deadlock-Freedom of Computer Systems / JACM, Vol. 27, No. 2, April 1980, 270--280 C1, D2]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. {Kan Sil 82} K. Kant, A. Silberschatz / On the Generalized Critical Region Construct / ACM Operating Systems Review, Vol. 16, No. 3, 1982 E2]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. {KiLa 83} W. Kieling, G. Landherr / A Quantitative Comparison of Lockprotocols for Centralized Database / Technische Universität München, Bericht TUM-I8302, January 1983 C2, E1, E3]]Google ScholarGoogle Scholar
  39. {Ko 81} H. F. Korth / Locking Protocols: General Locking Classes and Deadlock Freedom / Ph.D. Thesis, Princeton University, University Microfilms International, 1981 C2, E2, E3]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. {KurHeiSa 75} S. A. Kurzban, T. S. Heines, A. P. Sayers / Operating Systems Principles / Petrocelli-Charter, New York, 1975 B]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. {Kw 78a} Y. S. Kwong / On Reductions and Livelocks in Asynchronous Parallel Computation / Ph.D. Dissertion, Dept. of Electrical Engineering and Computer Science, Princeton University, May 1978 E1]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. {Kw 78b} Y. S. Kwong / Livelocks in Parallel Programs - Part I: Basic Concepts, Classification and Proof Techniques; Part II: The Effects of Fair Scheduling Disciplines / McMaster University, Hamilton, Canada, reports 78-CS-15, 78-CS-16, August 1978 E1, E2]]Google ScholarGoogle Scholar
  43. {Li 73} R. J. Lipton / On Synchrnous Primitive Systems / Departement of Computer Science, Carnegie - Mellon University, Pittsburgh, 1973 E2]]Google ScholarGoogle Scholar
  44. {Lo 77} D. B. Lomet / A Practical Deadlock Avoidance Algorithm for Database Systems / Proc. International Conference on Management of Data (ACM SIGMOD), editor: D. C. P. Smith, August 1977, 122--127 C2, D3]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. {Lo 80} D. B. Lomet / Subsystems of Processes with Deadlock Avoidance / IEEE Transactions on Software Engineering, Vol. SE-6, NO. 3, May 1980, 297--304 C2, D3, E1]]Google ScholarGoogle Scholar
  46. {LorDei 81} H. Lorin, H. M. Deitel / Operating Systems / Addison-Wesley Publishing Company, Reading Ma., 1981 B]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. {MaDo 74} S. E. Madnick, J. J. Donovan / Operating Systems / McGraw-Hill Kogakusha Computer Science Series, Int. Stud. Ed., Tokyo, 1974 B]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. {MeMun 79} D. A. Menasce, R. R. Muntz / Locking and Deadlock Detection in Distributed Data Bases / IEEE Transactions on Software Engineering, Vol. SE-5, No. 3, May 1979, 195--202 C2, D1, E3]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. {Mi 82} T. Minoura / Deadlock Avoidance Revisited / JACM, Vol. 29, No. 4, October 1982, 1023--1048 A, C1, D2, D3]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. {MoSeiZö 83} M. Mosen, H. Seiwert, D. Zöbel / Gegenüberstellung verschiedener Verfahren zur Deadlockvermeidung / EWH Koblenz Seminar für Informatik, report in preparation, (dt.) F]]Google ScholarGoogle Scholar
  51. {Mu 68} J. E. Murphy / Resource Allocation with Interlock Detection in a Multitask System / Proceedings AFIPS, 1968, FJCC, vol. 33, part II, 1168--1176 D1]]Google ScholarGoogle Scholar
  52. {Ne 79} G. Newton / Deadlock Prevention, Detection and Resolution: An Annotated Bibliography / ACM Operating Systems Review, Vol. 13, No. 2, April 1979, 33--44 A]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. {Ob 80} R. Obermarck / Global Deadlock Detection Algorithm / IBM Research Laboratory, San Jose, Cal., RJ2845, 1980 C2, D1]]Google ScholarGoogle Scholar
  54. {Pa 82} C. H. Papadimitriou / A Theorem in Database Concurrency Control / JACM, Vol. 29, No. 4, October 1982, 998--1006 D2, E3]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. {Pa 83} C. H. Papadimitriou / Theory of Concurrency Control / Lecture Notes in Computer Science, Springer Verlag, No. 145, 6th GI-Conference Theoretische Informatik, Dortmund, January 1983, 35--47 C2, E3]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. {ParHa 72} D. L. Parnas, A. N. Habermann / Comment on Deadlock Prevention Method / CACM, Vol. 15, No. 9, September 1972 E1]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. {Ri 77} L. Richter / Betriebssysteme / Teubner Studienbücher Informatik, Stuttgart, 1977, (dt.) B]]Google ScholarGoogle Scholar
  58. {RicAg 81} G. Ricart, A. K. Agrawala / An Optimal Algorithm for Mutual Exclusion in Computer Networks / CACM, Vol. 24, No. 1, January 1981, 9--17 C3, E2]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. {RieSm 82} D. R. Ries, G. C. Smith / Nested Transactions in Distributed Systems / IEEE Transactions on Software Engineering, Vol. SE-8, No. 3, May 1982, 167--172 C3, D1, E3]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. {Sc 78} W. Schulze / Ein graphentheoretisches Verfahren zur kostenminimalen Beseitigung von Prozeßverklemmungen / Elektronische Rechenanlagen, 21. Jahrgang, Heft 5, 1979, 217--225, (dt.) D1]]Google ScholarGoogle Scholar
  61. {Si 79} J. Sifakis / Le Controle de Systèmes Asynchrones: Concepts, Proprietés, Analyse Statique / Thèse d'Etat, Institute Nationale Polytechnique de Grenoble, 1979(fr.) E2]]Google ScholarGoogle Scholar
  62. {Si 83} J. Sifakis / A Note on Deadlocks in CA-Systems / EATCS - Bulletin, No. 20, June 1983, 153--159 C3, D2, E2]]Google ScholarGoogle Scholar
  63. {SilKe 82} A. Silberschatz, Z. M. Kedem / A Family of Locking Protocols for Database Systems that are Modeled by Directed Graphs / IEEE Transactions on Software Engineering, Vol. SE-8, No. 6, November 1982, 558--562 C2, D1, E3]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. {SoMa 82} E. Soisalon-Soininen, H. Mannila / On Deadlock Detection in Distributed and Centralized Locking / Forschungsbericht der Universität Karlsruhe, Institut für angewandte Informatik, Bericht 118, October 1982 C2, D2, E3]]Google ScholarGoogle Scholar
  65. {SpSch 83} A. Z. Spector, P. M. Schwarz / Transactions: A Construct for Reliable Distributed Computing / ACM Operating Systems Review, Vol. 17, No. 2, April 1983, 18--35 A]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. {St. 82} E. W. Stark / Semaphore Primitives and Starvation-free Mutual Exclusion / JACM, Vol. 29, No. 4, October 1982, 1049--1072 E1, E2]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. {Ta 78} M. M. Tanik / A Graph Model for Deadlock Prevention / Ph.D. Thesis, Texas University, University Microfilms International, 1981 D2, E2]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. {To 79 } S. Toueg / The Design of Deadlock- and Livelock-free Packet Switching Networks / Ph.D. Thesis, Princeton University, University Microfilms International, 1979 C3, E1]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. {TsBe 74} D. C. Tsichritzis, P. A. Bernstein / Operating Systems / Academic Press, New York, 1974 B]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. {We 82} G. Weck / Prinzipien und Realisierung von Betriebssystemen / Teubner Studienbücher Informatik, Stuttgart, 1982, (dt.) B]]Google ScholarGoogle Scholar
  71. {YaPaKu 79} M. Yannakakis, C. H. Papadimitrious, H. T. Kung / Locking Policies: Safety and Freedom from Deadlock / Proc. 20th Ann. IEEE Symp. on Foundations of Computer Science, San Juan, Puerto Rico, 1979 C2, E3]]Google ScholarGoogle Scholar
  72. {Ze 76} A. Zeyn / Algorithmen zur Deadlock-Vermeidung / Dissertation, Universität Dortmund, Abteilung Informatik, Bericht NO. 22/76, 1976, (dt.) C1, D3]]Google ScholarGoogle Scholar
  73. {Zi 80} H. Zima / Betriebssysteme, Parallele Prozesse / Bibliographisches Institut, Reihe Informatik, Band 20, Mannheim, 2. ed., 1980, (dt.) B]]Google ScholarGoogle Scholar
  74. {Zö 83} D. Zöbel / Zur Integration der Deadlockvermeidung in Betriebssysteme / EWH Koblenz, Seminar för Informatik, interner Bericht 1/83, (dt.) A, C1, D3, E1]]Google ScholarGoogle Scholar

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

Full Access

  • Published in

    ACM SIGOPS Operating Systems Review cover image
    ACM SIGOPS Operating Systems Review  Volume 17, Issue 4
    October 1983
    10 pages
    ISSN:0163-5980
    DOI:10.1145/850752
    Issue’s Table of Contents

    Copyright © 1983 Author

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Online: 1 October 1983

    Qualifiers

    • article

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader
About Cookies On This Site

We use cookies to ensure that we give you the best experience on our website.

Learn more

Got it!