<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://debianws.lexgopc.com/wiki143/index.php?action=history&amp;feed=atom&amp;title=Ostrich_algorithm</id>
	<title>Ostrich algorithm - Revision history</title>
	<link rel="self" type="application/atom+xml" href="http://debianws.lexgopc.com/wiki143/index.php?action=history&amp;feed=atom&amp;title=Ostrich_algorithm"/>
	<link rel="alternate" type="text/html" href="http://debianws.lexgopc.com/wiki143/index.php?title=Ostrich_algorithm&amp;action=history"/>
	<updated>2026-05-04T22:24:51Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.43.1</generator>
	<entry>
		<id>http://debianws.lexgopc.com/wiki143/index.php?title=Ostrich_algorithm&amp;diff=1187295&amp;oldid=prev</id>
		<title>2601:444:601:4C10:C13B:F13C:C416:D36D: Someone added their name</title>
		<link rel="alternate" type="text/html" href="http://debianws.lexgopc.com/wiki143/index.php?title=Ostrich_algorithm&amp;diff=1187295&amp;oldid=prev"/>
		<updated>2024-09-11T18:41:01Z</updated>

		<summary type="html">&lt;p&gt;Someone added their name&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Short description|Strategy in computer science}}&lt;br /&gt;
In [[computer science]], the &amp;#039;&amp;#039;&amp;#039;ostrich algorithm&amp;#039;&amp;#039;&amp;#039; is a strategy of ignoring potential problems on the basis that they may be exceedingly rare. It is named after the [[ostrich effect]] which is defined as &amp;quot;to stick one&amp;#039;s head in the sand and pretend there is no problem&amp;quot;. It is used when it appears the situation may be more cost-effectively managed by allowing the problem to continue to occur rather than to attempt its prevention.&lt;br /&gt;
&lt;br /&gt;
==Use with deadlocks==&lt;br /&gt;
&lt;br /&gt;
This approach may be used in dealing with [[Deadlock (computer science)|deadlock]]s in [[concurrent programming]] if they are believed to be very rare and the cost of detection or prevention is high. A set of processes is deadlocked if each process in the set is waiting for an event that only another process in the set can cause. &lt;br /&gt;
&lt;br /&gt;
The ostrich algorithm pretends there is no problem and is reasonable to use if deadlocks occur very rarely and the cost of their prevention would be high. The [[UNIX]] and [[Windows]] operating systems take this approach.&amp;lt;ref&amp;gt;{{Cite book |last=English |first=John |url=https://books.google.com/books?id=vyJIEAAAQBAJ&amp;amp;dq=windows+use+ostrich+algorithm&amp;amp;pg=PA124 |title=Introduction to Operating Systems: Behind the Desktop |date=2017-09-16 |publisher=Bloomsbury Publishing |isbn=978-0-230-37408-9 |language=en |access-date=2022-09-30 |archive-date=2022-10-06 |archive-url=https://web.archive.org/web/20221006073624/https://books.google.com/books?id=vyJIEAAAQBAJ&amp;amp;dq=windows+use+ostrich+algorithm&amp;amp;pg=PA124 |url-status=live }}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite book |last1=Kaur |first1=Gurusharan |url=https://books.google.com/books?id=sJ-dDwAAQBAJ&amp;amp;dq=windows+use+ostrich+algorithm&amp;amp;pg=PA266 |title=Elements and Digitization of Computer |last2=Kaur |first2=Lakhbir |last3=Kaur |first3=Rajinder |publisher=Educreation Publishing |language=en |access-date=2022-09-30 |archive-date=2022-10-06 |archive-url=https://web.archive.org/web/20221006073624/https://books.google.com/books?id=sJ-dDwAAQBAJ&amp;amp;dq=windows+use+ostrich+algorithm&amp;amp;pg=PA266 |url-status=live }}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Although using the ostrich algorithm is one of the methods of dealing with [[Deadlock (computer science)|deadlock]]s, other effective methods exist such as dynamic avoidance, [[banker&amp;#039;s algorithm]], detection and recovery, and prevention.&amp;lt;ref&amp;gt;{{Cite web|url=http://www.ceng.metu.edu.tr/~genc/334/Ch_6_Deadlocks.ppt|title=Middle East Technical University. Deadlocks.|access-date=2016-12-09|archive-date=2012-04-12|archive-url=https://web.archive.org/web/20120412225937/http://www.ceng.metu.edu.tr/~genc/334/Ch_6_Deadlocks.ppt|url-status=live}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
*[[Crash-only software]]&lt;br /&gt;
*[[End-to-end principle]]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://www.cs.rpi.edu/academics/courses/fall04/os/c10/index.html Ostrich algorithm]&lt;br /&gt;
*[http://nohardlockrwlocker.codeplex.com/ Non-Hard Locking Read-Write Locker] {{Webarchive|url=https://web.archive.org/web/20111218194302/http://nohardlockrwlocker.codeplex.com/ |date=2011-12-18 }}&lt;br /&gt;
*[https://www.youtube.com/watch?v=g5rJwMQtDaY Deadlock Basics + Modelling + Ostrich Algorithm]&lt;br /&gt;
&lt;br /&gt;
[[Category:Concurrent algorithms]]&lt;/div&gt;</summary>
		<author><name>2601:444:601:4C10:C13B:F13C:C416:D36D</name></author>
	</entry>
</feed>