1 |
A. Silberschatz, P. B. Galvin, and G. Gagne, "Operating System Concepts," 9th Ed., pp.278-280, Wiley, 2013.
|
2 |
Young-Suk Lee, Young-Ho Nam, "A Study on Instruction Method for Mutual Exclusion Using Simulation Based on Graphic," The Journal of Korean Association of Computer Education, Vol.13, No.6, pp.9-21, 2010.
|
3 |
Microsoft, "Lockless Programming Considerations for Xbox 360 and Microsoft Windows," [Internet], https://msdn.microsoft.com/en-us/library/windows/desktop/ee418650(v=vs.85).aspx (accessed at May 15th, 2017).
|
4 |
Geoff Langdale, "Lock-Free Programming," [Internet], https://www.cs.cmu.edu/-410-s05/lectures/L31_LockFree.pdf (accessed at May 15th, 2017).
|
5 |
E. W. Dijkstra, "About the sequentiality of process descriptions (EWD-35)," E.W. Dijkstra Archive. Center for American History, University of Texas at Austin, 1962-1963 (http://www.cs.utexas.edu/users/EWD/translations/EWD35-English.html, accessed at May 15th, 2017).
|
6 |
G. L. Peterson, "Myths About the Mutual Exclusion Problem," Information Processing Letters, Vol.12, No.3, pp.115-116, 1981. (http://cs.nyu.edu/-lerner/spring12/Read03-Mutual Exclusion.pdf, accessed at May 15th, 2017).
DOI
|
7 |
S. H. Park and S. H. Lee, "Token-Based Mutual Exclusion Algorithm in Mobile Cellular Networks," Proc. of 26th International Conference on Advanced Information Networking and Applications Workshops, pp.460-465, 2012.
|
8 |
S. H. Park, Y. M. Kim, and S. C. Yoo, "A Design of Mutual Exclusion Protocol for Mobile Game in Cellular Wireless Networks," Journal of the Korea Entertainment Industry Association, Vol.10, No.6, pp.431-438, 2016.
DOI
|
9 |
A. Luo, W. Wu, J. Cao, and M. Raynal, "A Generalized Mutual Exclusion Problem and Its Algorithm," Proc. of 42nd International Conference on Parallel Processing(ICPP), IEEE, pp.300-309, 2013.
|
10 |
F. Cicirelli and L. Nigro, "Modelling and Verification of Mutual Exclusion Algorithms," Proc. of IEEE/ACM 20th International Symposium on Distributed Simulation and Real Time Applications(DS-RT), pp. 136-144, 2016.
|
11 |
S. M. Choi and H. B. Lee, "A Study on Mutual Exclusion Algorithms," Proc. of the KIPS Fall Conference 2016, Vol. 23, No.2, pp.38-39, 2016.
|
12 |
H. W. Cain and M. H. Lipasti, "Memory Ordering: A Value-Based Approach," Proc. of 1st Annual International Symposium on Computer Architecture(ISCA), 2004.
|
13 |
X. Ji and L. Song, "Mutual Exclusion Verification of Peterson's Solution in Isabelle/HOL," Proc. of third International Conference on Trustworthy Systems and Their Applications(TSA), IEEE, pp.81-86, 2016.
|