{"created":"2025-02-21T03:39:24.866639+00:00","id":2007036,"links":{},"metadata":{"_buckets":{"deposit":"3c3c0c93-7e81-4018-b52f-15ba853cceef"},"_deposit":{"created_by":41,"id":"2007036","owners":[41],"pid":{"revision_id":0,"type":"depid","value":"2007036"},"status":"published"},"_oai":{"id":"oai:hiroshima.repo.nii.ac.jp:02007036","sets":["1730444907710"]},"author_link":[],"item_1617186331708":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_title":"Improving the availability of mutual exclusion Systems on Incomplete Networks","subitem_title_language":"en"}]},"item_1617186419668":{"attribute_name":"Creator","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Harada, Takashi","creatorNameLang":"en"}],"familyNames":[{"familyName":"Harada","familyNameLang":"en"}],"givenNames":[{"givenName":"Takashi","givenNameLang":"en"}]},{"creatorNames":[{"creatorName":"Yamashita, Masafumi","creatorNameLang":"en"}],"familyNames":[{"familyName":"Yamashita","familyNameLang":"en"}],"givenNames":[{"givenName":"Masafumi","givenNameLang":"en"}]}]},"item_1617186476635":{"attribute_name":"Access Rights","attribute_value_mlt":[{"subitem_access_right":"open access","subitem_access_right_uri":"http://purl.org/coar/access_right/c_abf2"}]},"item_1617186499011":{"attribute_name":"Rights","attribute_value_mlt":[{"subitem_rights":"(c) 2004 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE."}]},"item_1617186609386":{"attribute_name":"Subject","attribute_value_mlt":[{"subitem_subject":"Availability","subitem_subject_scheme":"Other"},{"subitem_subject":"coteries","subitem_subject_scheme":"Other"},{"subitem_subject":"distributed systems","subitem_subject_scheme":"Other"},{"subitem_subject":"G-nondominatedness","subitem_subject_scheme":"Other"},{"subitem_subject":"graph theory","subitem_subject_scheme":"Other"},{"subitem_subject":"mutual exclusion problems","subitem_subject_scheme":"Other"},{"subitem_subject":"quorums","subitem_subject_scheme":"Other"},{"subitem_subject":"007","subitem_subject_scheme":"NDC"}]},"item_1617186626617":{"attribute_name":"Description","attribute_value_mlt":[{"subitem_description":"We model a distributed system by a graph G=(V, E), where V represents the set of processes and E the set of bidirectional communication links between two processes. G may not be complete. A popular (distributed) mutual exclusion algorithm on G uses a coterie C(⊆2v), which is a nonempty set of nonempty subsets of V (called quorums) such that, for any two quorums P, Q ∈ C, 1) P∩Q ≠φ and 2) P¢Q hold. The availability is the probability that the algorithm tolerates process and/or link failures, given the probabilities that a process and a link, respectively, are operational. The availability depends on the coterie used in the algorithm. This paper proposes a method to improve the availability by transforming a given coterie.","subitem_description_language":"en"}]},"item_1617186643794":{"attribute_name":"Publisher","attribute_value_mlt":[{"subitem_publisher":"IEEE"}]},"item_1617186702042":{"attribute_name":"Language","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_1617186920753":{"attribute_name":"Source Identifier","attribute_value_mlt":[{"subitem_source_identifier":"0018-9340","subitem_source_identifier_type":"ISSN"}]},"item_1617187024783":{"attribute_name":"Page Start","attribute_value_mlt":[{"subitem_start_page":"744"}]},"item_1617187056579":{"attribute_name":"Bibliographic Information","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"1999-07","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"7","bibliographicPageEnd":"747","bibliographicPageStart":"744","bibliographicVolumeNumber":"48","bibliographic_titles":[{"bibliographic_title":"IEEE transactions on computers"},{"bibliographic_title":"IEEE transactions on computers"}]}]},"item_1617258105262":{"attribute_name":"Resource Type","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_1617265215918":{"attribute_name":"Version Type","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_1617353299429":{"attribute_name":"Relation","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_id_text":"10.1109/12.780882","subitem_relation_type_select":"DOI"}},{"subitem_relation_type":"isVersionOf","subitem_relation_type_id":{"subitem_relation_type_id_text":"http://dx.doi.org/10.1109/12.780882","subitem_relation_type_select":"DOI"}}]},"item_1617605131499":{"attribute_name":"File","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2023-03-18"}],"displaytype":"simple","filename":"IEEE_1999_48_7_t0744.pdf","filesize":[{"value":"122.6 KB"}],"mimetype":"application/pdf","url":{"objectType":"fulltext","url":"https://hiroshima.repo.nii.ac.jp/record/2007036/files/IEEE_1999_48_7_t0744.pdf"},"version_id":"4d3c0ae6-d207-4a7f-88d0-898d2549e9ec"}]},"item_1732771732025":{"attribute_name":"旧ID","attribute_value":"14160"},"item_title":"Improving the availability of mutual exclusion Systems on Incomplete Networks","item_type_id":"40003","owner":"41","path":["1730444907710"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2023-03-18"},"publish_date":"2023-03-18","publish_status":"0","recid":"2007036","relation_version_is_last":true,"title":["Improving the availability of mutual exclusion Systems on Incomplete Networks"],"weko_creator_id":"41","weko_shared_id":-1},"updated":"2025-02-21T09:00:59.467636+00:00"}