Please wait a minute...
New Technology of Library and Information Service  2006, Vol. 1 Issue (5): 69-73    DOI: 10.11925/infotech.1003-3513.2006.05.18
Current Issue | Archive | Adv Search |
A New Distributed Deadlock Detection Algorithm
Zhang Cuiling
(Library of Guangdong Pharmaceutical University,Guangzhou 510310,China)
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  

This paper indroduces the two main deadlock models in the distributeddatabases, and analyzes four distributed deadlock detection algorithms. Then it presents an ameliorative deadlock detection algorithm- creating the dynamic DDA. This algorithm,which absorbs the advantages of existed deadlock detection algorithms and avoids their disadvantages, can well adapt the need of distributed database systems.

Key wordsDistributed database      Deadlock      Detection     
Received: 01 March 2006      Published: 25 May 2006
: 

TP274

 
Corresponding Authors: Zhang Cuiling     E-mail: zsuzcl@sohu.com
About author:: Zhang Cuiling

Cite this article:

Zhang Cuiling . A New Distributed Deadlock Detection Algorithm. New Technology of Library and Information Service, 2006, 1(5): 69-73.

URL:

https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2006.05.18     OR     https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2006/V1/I5/69

1邵佩英著.分布式数据库系统及其应用.北京:科学出版社,2000
2Knapp E . Deadlock detection in distributed databases.ACM Comput Surv,1987,19(4):303-328
3Gligor VD, Shattuck SH . On deadlock detection in distributed systems. IEEE Trans Software  Eng,1980, 6(5): 435–440
4Roesler M, Burkhard WA, Cooper KB . Efficient deadlock resolution for lock-based concurrency control schemes. In: Proceedings of the 8th International Conference on Distributed Computing Systems, San Jose, California, June 13–17, 1988. IEEE-CS Press, 1988, 224-233
5Choudhary AN, Kohler WH, Stankovic JA, Towsley D . A modified priority-based probe  algorithm for distributed deadlock detection and resolution. IEEE Trans Software Eng,1989, 15(1): 10-17
6Kshemkalyani AD, Singhal M. Invariant-based verification of a distributed deadlock detection algorithm. IEEE Trans Software Eng ,1991,17(8): 789-799
7Chandy KM, Lamport L. Distributed snapshots: Determining global states of distributed systems. ACM Trans Comput Syst ,1985,3(1): 63-75
8Bracha G, Toueg S. Distributed deadlock detection. Distrib Comput,1987, 2: 127-138
9Chen S, Deng Y, Attie P, Sun W. Optimal deadlock detection in distributed systems based on locally constructed wait-for-graphs. In: Proceedings of the 16th International Conference on Distributed Computing System, May 27–30, 1996.Hong Kong, IEEE Computer Society, pp 613-619
10Elmagarmid AK, Soundararajan N, Liu MT. A distributed deadlock detection and resolution algorithm and its correctness proof. IEEE Trans Software Eng,1988, 14(10):1443-1452
11Natalija Krivokapi , Alfons Kemper, Ehud Gudes. Deadlock detection in distributed database systems:a new algorithm and a comparative performance analysis. The VLDB Journal,1999(8): 79-100

[1] Li Wenna,Zhang Zhixiong. Research on Knowledge Base Error Detection Method Based on Confidence Learning[J]. 数据分析与知识发现, 2021, 5(9): 1-9.
[2] Yang Hanxun, Zhou Dequn, Ma Jing, Luo Yongcong. Detecting Rumors with Uncertain Loss and Task-level Attention Mechanism[J]. 数据分析与知识发现, 2021, 5(7): 101-110.
[3] Yin Pengbo,Pan Weimin,Zhang Haijun,Chen Degang. Identifying Clickbait with BERT-BiGA Model[J]. 数据分析与知识发现, 2021, 5(6): 126-134.
[4] Wu Xu,Chen Chunxu. Detecting Topics of Group Chats with Multiple Strategies[J]. 数据分析与知识发现, 2021, 5(5): 1-9.
[5] Zhang Guobiao,Li Jie. Detecting Social Media Fake News with Semantic Consistency Between Multi-model Contents[J]. 数据分析与知识发现, 2021, 5(5): 21-29.
[6] Lv Xueqiang,Luo Yixiong,Li Jiaquan,You Xindong. Review of Studies on Detecting Chinese Patent Infringements[J]. 数据分析与知识发现, 2021, 5(3): 60-68.
[7] Chen Yixin,Chen Xinyue,Liu Yi,Wang Hanzhen,Lai Yongqing,Xu Yang. Detecting Rumor Dissemination and Sources with SIDR Model[J]. 数据分析与知识发现, 2021, 5(1): 78-89.
[8] Qiu Erli,He Hongwei,Yi Chengqi,Li Huiying. Research on Public Policy Support Based on Character-level CNN Technology[J]. 数据分析与知识发现, 2020, 4(7): 28-37.
[9] Guo Xu,Qi Ruihua. Identifying Authorship with Novelty Detection Method[J]. 数据分析与知识发现, 2020, 4(4): 56-62.
[10] Sun Xinrui,Meng Yu,Wang Wenle. Identifying Traffic Events from Weibo with Knowledge Graph and Target Detection[J]. 数据分析与知识发现, 2020, 4(12): 136-147.
[11] Li Jiaquan,Li Baoan,You Xindong,Lü Xueqiang. Computing Similarity of Patent Terms Based on Knowledge Graph[J]. 数据分析与知识发现, 2020, 4(10): 104-112.
[12] Wei Jiaze,Dong Cheng,He Yanqing,Liu Zhihui,Peng Keyun. Detecting News Topics Based on Equalized Paragraph and Sub-topic Vector[J]. 数据分析与知识发现, 2020, 4(10): 70-79.
[13] Jiafen Wu,Feicheng Ma. Detecting Product Review Spam: A Survey[J]. 数据分析与知识发现, 2019, 3(9): 1-15.
[14] Jiaming Liang,Jie Zhao,Zhou Jianlong,Zhenning Dong. Detecting Collusive Fraudulent Online Transaction with Implicit User Behaviors[J]. 数据分析与知识发现, 2019, 3(5): 125-138.
[15] Gang Li,Sijing Chen,Jin Mao,Yansong Gu. Spatio-Temporal Comparison of Microblog Trending Topics on Natural Disasters[J]. 数据分析与知识发现, 2019, 3(11): 1-15.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn