1 |
P. Chaudhury and T. Edward, "An O(√n) Distributed Mutual Exclusion Algorithm using Queue Migration," Journal of Universal Computer Science, vol. 12, no. 2, 2006, pp. 142-159.
|
2 |
B. Sharma, R. Bhatia and A. Singh, "DMX in MANETs: Major Research Trends Since 2004," Int. Conf. on Advances in Computing and Artificial Intelligence, ACAI'11, 2011, pp. 50-55.
|
3 |
H. Hartenstein and K. Laberteaux, "A Tutorial Survey on Vehicular Ad Hoc Networks," IEEE Communications Magazine, June 2008, pp. 164-171.
|
4 |
V. Kumar, J. Place and G. -C. Yang, "An Efficient Algorithm for Mutual Exclusion using Queue Migration in Computer Networks," IEEE Trans. Knowledge and Data Engineering, vol. 3, no. 3, 1991, pp. 380-384.
DOI
ScienceOn
|
5 |
R. Baldoni, A. Virgillito and R. Petrassi, "A Distributed Mutual Exclusion Algorithm for Mobile Ad Hoc Networks," 7th IEEE Symposium on Computer and communications (ISCC'02), July 2002, pp. 539-545.
|
6 |
S. Tamhane and M. Kumar, "A Token Based Distributed Algorithm for Supporting Mutual Exclusion in Opportunistic Networks," Pervasive and Mobile Computing, vol. 8, no. 5, October 2012, pp. 795-809.
DOI
ScienceOn
|
7 |
W. Wu, J. Cao and M. Raynal, "A Dual-token-based Fault Tolerant Mutual Exclusion Algorithm for MANETs," LNCS 4864, 2007, pp. 572-583.
|
8 |
A. Kshemkalyani and M. Singhal, Distributed Computing: Principles, Algorithms, and Systems, Cambridge University Press, NY, 2008, pp. 327-336.
|
9 |
P. Saxena and J. Rai, "A Survey of Permission-based Mutual Exclusion Algorithms," Journal of Computer Standards and Interface, vol. 25, no. 2, 2003, pp. 159-181.
DOI
ScienceOn
|
10 |
B. Badrinath, A. Acharya and T. Imielinski, "Designing Distributed Algorithms for Mobile Computing Networks," Computer Communications, 19, 1996, pp. 309-320.
DOI
ScienceOn
|
11 |
R. Ghosh and H. Mohanty, "On Restructuring Distributed Algorithms for Mobile Computing," IWDC 2002, LNCS 2571, 2002, pp. 224-233.
|
12 |
M. Bertier, L. Arantes and P. Sens, "Distributed Mutual Exclusion Algorithms for Grid Applications: A Hierarchical Approach," Journal of Parallel and Distributed Computing, vol. 66, no. 1, January 2006, pp. 128-144.
DOI
ScienceOn
|
13 |
H. Taheri, P. Neamatollahi and M. Naghibzadeh, "A Hybrid Token-based Distributed Mutual Exclusion Algorithm using Wraparound Two-Dimensional Array Logical Topology," Information Processing Letters, vol. 111, no. 17, September 2011, pp. 841-847.
DOI
ScienceOn
|
14 |
M. Benchaiba, A. Bouabdallah, N. Badache and M. Ahmed-Nacer, "Distributed Mutual Exclusion Algorithms in Mobile Ad Hoc Networks: An Overview," ACM SIGOPS Operating Systems Review, vol. 38, no. 1, 2004, pp. 74-89.
|
15 |
P. Neamatollahi, H. Taheri and M. Naghibzadeh, "Info-based Approach in Distributed Mutual Exclusion Algorithms," Journal of Parallel and Distributed Computing, vol. 72, no. 5, May 2012, pp. 650-665.
DOI
ScienceOn
|
16 |
L. Rodrigues, J. Cohen, L. Arantes and E. Duarte, "A Robust Permission-based Hierarchical Distributed k-Mutual Exclusion Algorithm," IEEE 12th International Symposium on Parallel and Distributed Computing (ISPDC), 2013, pp. 151-158.
|