By Topic

Notice of Violation of IEEE Publication Principles
The Research on Mutual Exclusion Algorithm in Distributed System

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Wang Chengjun ; Dept. of Comput. Sci. & Technol., WeiFang Univ., Weifang, China

Notice of Violation of IEEE Publication Principles

"Research on Mutual Exclusion Algorithm in Distributed System"
by Wang Chengjun
in the Proceedings of the 2009 International Conference on Wireless Networks and Information Systems, December 2009

After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

This paper contains significant portions of original text from the paper cited below. The original text was copied without attribution (including appropriate references to the original author(s) and/or paper title) and without permission.

Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following book:

Distributed Systems,
by A. Tanenbaum and M. Van Steen,
Prentice Hall, pp. 253-260, 2007

Systems involving multiple processes are often most easily programmed using critical regions. When a process has to read or update certain shared data structures, it first enters a critical region to achieve mutual exclusion and ensure that no other process will use the shared data structures at the same time. In single-processor systems, critical regions are protected using semaphores, monitors, and similar constructs. In this paper, we will research how critical regions and mutual exclusion can be implemented in distributed systems.

Published in:

Wireless Networks and Information Systems, 2009. WNIS '09. International Conference on

Date of Conference:

28-29 Dec. 2009