Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Simple and efficient bounded concurrent timestamping or bounded concurrent timestamp systems are comprehensible!
Dwork C., Waarts O.  Theory of computing (Proceedings of the twenty-fourth annual ACM symposium, Victoria, British Columbia, Canada, May 4-6, 1992)655-666.1992.Type:Proceedings
Date Reviewed: May 1 1993

The problem of bounded concurrent timestamping systems (CTSS) is developing an algorithmic and bounded data storage support for a system in which processors repeatedly choose labels whose order reflects the real-time order in which the labels have been selected. The operations concerned are scan, to read the current labels and determine their order, and label, to generate a label. The basic technique of first obtaining an unbounded CTSS and then finding a way of recycling the labels is inherited from previous work.

This paper provides an important advance in CTSS. It contains two major results. One, of a comparative character, is that the proposed bounded CTSS requires O ( n ) steps (accesses to shared memory) for both scan and label.

The other result, which is more methodological and of greater importance, is that the authors have departed from a standard approach to the unbounded case, which was based on a shared joint pool of labels and a recursively defined precedence graph. Avoiding the precedence graph, the paper draws on the idea of each processor having a local pool of values and a label being a vector of values, one for each processor. Quite naturally, this solution leads to the worsening of the other characteristic bound, the size of registers, from O ( n ) to O ( n log n ) .

The proposed method uses an interesting concept, called the traceable use abstraction, which has reportedly yielded positive results in other contexts aimed at boundedness. This mechanism allows the processor to track which of its own values are currently being used in the system. The scan and label operations are implemented through more basic constructs, consume, update, and garbage collection. A set of semantic restrictions, called continuity, limited indirection, and limited mobility, imposed on the implementation help ensure that the basic primitive RWRWR (R stands for “read” and W for “write” operations on a single-writer-multi-reader shared register) satisfies the following correctness properties of the CTSS: regularity, monotonicity, detectability, and boundedness.

The paper’s style is good: it begins with a clear outline of the key idea and sharply delineates the previous work. The reader might encounter minor difficulties caused by a certain amount of juggling of the subscripts and indices (such as the transposition of b, c, and k in Sections 4.3 and 4.4). I also found the usage of “owner,” “belongs to,” and “producer” confusing: the authors distinguish the first two terms, while the second and third are defined identically. Some proofs of lemmas involving proving and using the definition of regularity are not totally clear, involving a lot of supposedly equivalent “linguistic transformations” (done behind the scenes) of statements built from words like “before,” “after,” “terminates,” and “begins.”

Reviewer:  A. Yakovlev Review #: CR116498
Bookmark and Share
 
Parallelism And Concurrency (F.1.2 ... )
 
 
Process Management (D.4.1 )
 
Would you recommend this review?
yes
no
Other reviews under "Parallelism And Concurrency": Date
Combinatorics on traces
Diekert V., Springer-Verlag New York, Inc., New York, NY, 1990. Type: Book (9780387530314)
Aug 1 1991
Concurrent bisimulations in Petri nets
Best E., Devillers R., Kiehn A., Pomello L. Acta Informatica 28(3): 231-264, 1991. Type: Article
May 1 1992
Improved upper and lower time bounds for parallel random access machines without simultaneous writes
Parberry I. (ed), Yan P. SIAM Journal on Computing 20(1): 88-99, 1991. Type: Article
May 1 1992
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy