{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T11:39:29Z","timestamp":1648899569925},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"1-4","license":[{"start":{"date-parts":[[1989,6,1]],"date-time":"1989-06-01T00:00:00Z","timestamp":612662400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Algorithmica"],"published-print":{"date-parts":[[1989,6]]},"DOI":"10.1007\/bf01553899","type":"journal-article","created":{"date-parts":[[2005,4,20]],"date-time":"2005-04-20T22:07:35Z","timestamp":1114034855000},"page":"417-436","source":"Crossref","is-referenced-by-count":5,"title":["Distributed deadlock resolution in store-and-forward networks"],"prefix":"10.1007","volume":"4","author":[{"given":"Jeffrey M.","family":"Jaffe","sequence":"first","affiliation":[]},{"given":"Moshe","family":"Sidi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"No. 6","key":"BF01553899_CR1","first-page":"512","volume":"29","author":"K. D. G\u00fcnther","year":"1981","unstructured":"K. D. G\u00fcnther, Prevention of Deadlocks in Packet-Switched Data Transport Systems,IEEE Transactions on Communications, Special issue on Congestion Control in Computer Networks, Vol. 29, No. 6, pp. 512\u2013524, June 1981.","journal-title":"Special issue on Congestion Control in Computer Networks"},{"issue":"No. 3","key":"BF01553899_CR2","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1109\/TCOM.1980.1094666","volume":"28","author":"P. M. Merlin","year":"1980","unstructured":"P. M. Merlin and P. J. Schweitzer, Deadlock Avoidance in Store-and-Forward Networks\u2014I: Store and Forward Deadlock,IEEE Transactions on Communications, Vol. 28, No. 3, pp. 345\u2013352, March 1980.","journal-title":"IEEE Transactions on Communications"},{"key":"BF01553899_CR3","doi-asserted-by":"crossref","first-page":"594","DOI":"10.1137\/0210044","volume":"10","author":"S. Toueg","year":"1981","unstructured":"S. Toueg and J. D. Ullman, Deadlock-Free Packet Switching Networks,SIAM Journal on Computing, Vol. 10, pp. 594\u2013611, August 1981.","journal-title":"SIAM Journal on Computing"},{"key":"BF01553899_CR4","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/978-1-4615-6698-4_11","volume-title":"Computer Network Architectures and Protocols","author":"J. D. Atkins","year":"1982","unstructured":"J. D. Atkins, Path Control\u2014The Network Layer of System Network Architecture, inComputer Network Architectures and Protocols (P. E. Green, Jr., ed.), pp. 297\u2013326, Plenum, New York, 1982."},{"key":"BF01553899_CR5","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1007\/978-1-4615-6698-4_10","volume-title":"Computer Network Architectures and Protocols","author":"S. Wecker","year":"1982","unstructured":"S. Wecker, DNA\u2014The Digital Network Architecture, inComputer Network Architectures and Protocols (P. E. Green, Jr., ed.), pp. 249\u2013296, Plenum, New York, 1982."},{"key":"BF01553899_CR6","first-page":"219","volume-title":"Performance of Computer-Communication Systems","author":"G. Gambosi","year":"1984","unstructured":"G. Gambosi, D. P. Bovet, and D. A. Menascoe, A Detection and Removal of Deadlocks in Store and Forward Communication Networks, inPerformance of Computer-Communication Systems (H. Rudin and W. Bux, eds.), pp. 219\u2013229, Elsevier (North-Holland), Amsterdam, 1984."},{"issue":"No. 3","key":"BF01553899_CR7","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1109\/TSE.1979.234181","volume":"5","author":"D. A. Menascoe","year":"1979","unstructured":"D. A. Menascoe and R. Muntz, Locking and Deadlock Detection in Distributed Databases,IEEE Transactions on Software Engineering, Vol. 5, No. 3, pp. 195\u2013202, May 1979.","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"No. 2","key":"BF01553899_CR8","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1145\/319702.319717","volume":"7","author":"R. Obermarck","year":"1982","unstructured":"R. Obermarck, Distributed Deadlock Detection Algorithm,ACM Transactions on Database Systems, Vol. 7, No. 2, pp. 187\u2013208, June 1982.","journal-title":"ACM Transactions on Database Systems"},{"key":"BF01553899_CR9","first-page":"157","volume-title":"A Distributed Algorithm for Detecting Resource Deadlocks in Distributed Systems","author":"K. M. Chandy","year":"1983","unstructured":"K. M. Chandy and J. Misra, A Distributed Algorithm for Detecting Resource Deadlocks in Distributed Systems, inProceedings of the ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (Ottawa, Aug. 1982), pp. 157\u2013164, ACM, New York, 1983."},{"issue":"No. 2","key":"BF01553899_CR10","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1145\/357360.357365","volume":"1","author":"K. M. Chandy","year":"1983","unstructured":"K. M. Chandy, J. Misra, and L. M. Haas, Distributed Deadlock Detection,ACM Transactions on Computer Systems, Vol. 1, No. 2, pp. 144\u2013156, May 1983.","journal-title":"ACM Transactions on Computer Systems"},{"key":"BF01553899_CR11","doi-asserted-by":"crossref","unstructured":"G. Bracha and S. Toueg, A Distributed Algorithm for Generalized Deadlock Detection,Proceedings of the Third Annual ACM Symposium on Principles of Distributed Computing, Vancouver, pp. 285\u2013301, 1984.","DOI":"10.1145\/800222.806756"},{"key":"BF01553899_CR12","doi-asserted-by":"crossref","unstructured":"I. Cidon, J. Jaffe, and M. Sidi, Local Distributed Deadlock Detection with Finite Buffers, IBM Technical Report 88.154, April 1985.","DOI":"10.1145\/18172.18214"},{"key":"BF01553899_CR13","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/TSE.1987.232560","volume":"13","author":"I. Cidon","year":"1987","unstructured":"I. Cidon, J. Jaffe, and M. Sidi, Local Distributed Deadlock Detection by Cycle Detection and Clustering,IEEE Transactions on Software Engineering, Vol. 13, pp. 3\u201314, January 1987.","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"No. 11","key":"BF01553899_CR14","doi-asserted-by":"crossref","first-page":"1139","DOI":"10.1109\/TCOM.1987.1096699","volume":"35","author":"I. Cidon","year":"1987","unstructured":"I. Cidon, J. Jaffe, and M. Sidi, Distributed Store-and-Forward Deadlock Detection and Resolution Algorithms,IEEE Transactions on Communications, Vol. 35, No. 11, pp. 1139\u20131145, November 1987.","journal-title":"IEEE Transactions on Communications"},{"key":"BF01553899_CR15","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1109\/TSE.1986.6312900","volume":"12","author":"N. Natarajan","year":"1986","unstructured":"N. Natarajan, A Distributed Scheme for Detecting Communication Deadlocks,IEEE Transactions on Software Engineering, Vol. 12, pp. 531\u2013537, April 1986.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"BF01553899_CR16","unstructured":"C. Chan and T. Yum, An Algorithm for Detecting and Resolving Store-and-Forward Deadlocks in Packet-Switched Networks,Proceedings of the IEEE International Conference on Communications, Toronto, pp. 114\u2013118, June 1986."},{"issue":"No. 5","key":"BF01553899_CR17","doi-asserted-by":"crossref","first-page":"490","DOI":"10.1109\/TCOM.1987.1096799","volume":"35","author":"J. Blazewick","year":"1983","unstructured":"J. Blazewick, J. Brzezinski, and G. Gambosi, Time-Stamp Approach to Store-and-Forward Deadlock Prevention,IEEE Transactions on Communications, Vol. 35, No. 5, pp. 490\u2013495, May 1983.","journal-title":"IEEE Transactions on Communications"},{"issue":"No. 6","key":"BF01553899_CR18","doi-asserted-by":"crossref","first-page":"756","DOI":"10.1109\/TCOM.1983.1095883","volume":"31","author":"P. A. Humblet","year":"1983","unstructured":"P. A. Humblet, A Distributed Algorithm for Minimum Weight Directed Spanning Trees,IEEE Transactions on Communications, Vol. 31, No. 6, pp. 756\u2013762, June 1983.","journal-title":"IEEE Transactions on Communications"},{"key":"BF01553899_CR19","doi-asserted-by":"crossref","unstructured":"E. Chang and R. Roberts, An Improved Algorithm for Decentralized Extrema-Finding in Circular Configurations of Processes,Communications of the ACM, pp. 281\u2013283, May 1979.","DOI":"10.1145\/359104.359108"},{"key":"BF01553899_CR20","doi-asserted-by":"crossref","unstructured":"G. L. Peterson, AnO(n log n) Unidirectional Algorithm for the Circular Extrema Problem,ACM Transactions on Programming Languages and Systems, pp. 758\u2013762, October 1982.","DOI":"10.1145\/69622.357194"},{"key":"BF01553899_CR21","doi-asserted-by":"crossref","unstructured":"D. P. Mitchell and M. Merrit, A Distributed Algorithm for Deadlock Detection and Resolution,Proceedings of the Third Annual ACM Symposium on Principles of Distributed Computing, Vancouver, pp. 282\u2013284, 1984.","DOI":"10.1145\/800222.806755"}],"container-title":["Algorithmica"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01553899.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF01553899\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01553899","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,7]],"date-time":"2020-04-07T01:16:42Z","timestamp":1586222202000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF01553899"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1989,6]]},"references-count":21,"journal-issue":{"issue":"1-4","published-print":{"date-parts":[[1989,6]]}},"alternative-id":["BF01553899"],"URL":"https:\/\/doi.org\/10.1007\/bf01553899","relation":{},"ISSN":["0178-4617","1432-0541"],"issn-type":[{"value":"0178-4617","type":"print"},{"value":"1432-0541","type":"electronic"}],"subject":[],"published":{"date-parts":[[1989,6]]}}}