This article has an unclear citation style.April 2017) (Learn how and when to remove this template message)(
In computer science, the ostrich algorithm is a strategy of ignoring potential problems on the basis that they may be exceedingly rare. It is named for the ostrich effect which is defined as "to stick one's head in the sand and pretend there is no problem". It is used when it is more cost-effective to allow the problem to occur than to attempt its prevention.
Use with deadlocks
This approach may be used in dealing with deadlocks in concurrent programming if they are believed to be very rare and the cost of detection or prevention is high. For example, if each PC deadlocks once per 10 years, the one reboot may be less painful than the restrictions needed to prevent it.
A set of processes is deadlocked if each process in the set is waiting for an event that only another process in the set can cause. Usually the event is release of a currently held resource and none of the processes can run, release resources, and be awakened.
The ostrich algorithm pretends there is no problem and is reasonable to use if deadlocks occur very rarely and the cost of their prevention would be high. The UNIX and Windows operating systems take this approach.
Although using the ostrich algorithm is one of the methods of dealing with deadlocks, other effective methods exist such as dynamic avoidance, banker's algorithm, detection and recovery, and prevention.
Although efficient, using the Ostrich algorithm trades correctness for convenience. Yet since the algorithm directly deals with extreme cases it is not a large trade-off. In fact, the simplest and most used method to recover from a deadlock is a reboot.
Some algorithms with poor worst-case performance are commonly used because they only exhibit poor performance on artificial cases that do not occur in practice; typical examples are the simplex algorithm and the type-inference algorithm for Standard ML. Issues like integer overflow in programming languages with fixed-width integers are also frequently ignored because they occur only in exceptional cases that do not arise for practical inputs.
- Ostrich algorithm
- Non-Hard Locking Read-Write Locker
- Deadlock Basics + Modelling + Ostrich Algorithm
- Gottlieb, Allan. "Operating Systems." OS Lecture Notes. N.p., 2015. Fri. 8 Jan. 2015. http://cs.nyu.edu/~gottlieb/courses/os/class-notes.html#ostrich
- The University of New South Wales. https://cgi.cse.unsw.edu.au/~cs3231/14s1/lectures/lect05.pdf
- Florida International University. Computing & Information Sciences. http://users.cis.fiu.edu/~sadjadi/Teaching/Operating%20Systems/Lectures/Chapter-03.ppt
- Middle East Technical University. http://www.ceng.metu.edu.tr/~genc/334/Ch_6_Deadlocks.ppt Deadlocks.