Author of the publication

Dekker's mutual exclusion algorithm made RW-safe.

, , and . Concurr. Comput. Pract. Exp., 28 (1): 144-165 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predicate Transformers for Recursive Procedures with Local Variables.. Formal Aspects Comput., 11 (6): 616-636 (1999)Lock-Free Parallel Garbage Collection., , and . ISPA, volume 3758 of Lecture Notes in Computer Science, page 263-274. Springer, (2005)A General Algorithm for Computing Distance Transforms in Linear Time., , and . ISMM, volume 18 of Computational Imaging and Vision, page 331-340. Springer, (2000)A Formal Reduction for Lock-Free Parallel Algorithms., and . CAV, volume 3114 of Lecture Notes in Computer Science, page 44-56. Springer, (2004)Eternity Variables to Simulate Specifications.. MPC, volume 2386 of Lecture Notes in Computer Science, page 117-130. Springer, (2002)Starvation-free mutual exclusion with semaphores., and . Formal Asp. Comput., 25 (6): 947-969 (2013)Initialisation with a Final Value, an Exercise in Program Transformation.. MPC, volume 375 of Lecture Notes in Computer Science, page 273-280. Springer, (1989)Knowledge-Based Asynchronous Programming., , and . Fundam. Informaticae, 63 (2-3): 259-281 (2004)Invariants for the Construction of a Handshake Register.. Inf. Process. Lett., 68 (4): 173-177 (1998)Temporal Preconditions of Recursive Procedures., and . REX Workshop, volume 666 of Lecture Notes in Computer Science, page 236-260. Springer, (1992)