منابع مشابه
Subscription-enhanced Content Delivery
In existing content delivery systems user accesses are popularly used for predicting the request pattern of contents. In novel web applications such as publish/subscribe services, users explicitly provide statements of interest in the form of subscriptions. These subscriptions provide another source of user information in addition to access patterns. This paper addresses the content delivery pr...
متن کاملFeed Subscription Management
An increasing number of data sources and services are made available on the Web, and in many cases these information sources are or easily could be made available as feeds. However, the more data sources and services are exposed through feed-based services, the more it becomes necessary to manage and be able to share those services, so that users and uses of those services can build on the foun...
متن کاملDiesel Particulate Filters [subscription]
● Diesel Filter Regeneration Abstract: Diesel particulate filters capture particle emissions through a combination of surface-type and deep-bed filtration mechanisms, such as diffusional deposition, inertial d positi , or flow-line interception. Collected particulates are removed from the filter, continuously or periodically, through thermal regeneration. Diesel filters are very effective in co...
متن کاملPitfalls of lazy subscription ∗
Transactional Lock Elision (TLE) uses Hardware Transactional Memory (HTM) to execute unmodified critical sections concurrently, even if they are protected by the same lock. To ensure correctness, the transactions used to execute these critical sections “subscribe” to the lock by reading it and checking that it is available. A recent paper proposed using the tempting “lazy subscription” optimiza...
متن کاملAnonymous Subscription Protocols
In this paper we discuss protocols that allow a user to subscribe to an electronic service, and then anonymously access the service. That is, the provider does not know who accesses the service at any time, and moreover he cannot link two accesses to the same person. On the other hand, the supplier obtains proof that the user is authorized to access the service. We formally define the problem, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Bulletin of the Royal College of Psychiatrists
سال: 1981
ISSN: 0140-0789,2514-9954
DOI: 10.1192/s0140078900012633