Locks and Walks in Paul Auster’s Oracle Night
نویسندگان
چکیده
منابع مشابه
Oracle Continuous Time Random Walks
Abstract. In a continuous time random walk (CTRW), a random waiting time precedes each random jump. The CTRW model is useful in physics, to model diffusing particles. Its scaling limit is a time-changed process, whose densities solve an anomalous diffusion equation. Some applications require the anticipating version, an oracle continuous time random walk (OCTRW), where the next jump after any g...
متن کاملIranian Zoroastrians’ occupations and walks of life in Qajarid period
Religious minorities of Iran have mainly participated in constituting Iranian historical communal lifeworld and cultural enrichment. Their endeavors to retain their identity and existence among an other-religion majority have occasionally been reflected in occupational and professional domains. In the present article, the main and prominent occupations and walks of life of Qajarid Iranian Zoroa...
متن کاملtragic contradictions: a comparative study of characterization in eugene o’neill’s long day’s journey into night and mahmud dowlatabadi’s tangna
در طی چند دهه ی اخیر، مفهوم «تراژدی» و «قهرمان تراژدی» توجهی روزافرون را تقریباً در تمام حوزه های نقد ادبی به خود معطوف کرده است. برخی نظیر ارسطو، نیچه، و آرتور میلر به بازخوانی آن پرداخته و برخی دیگر نظیر سارتر، استریندبرگ، یوجین اُنیل، برتولت برشت، و آنتونین آرتود به افزودن ابعاد نوینی به این مبحث همت گماشته اند. آنچه قهرمان تراژدی مدرن را از مفهوم کلاسیک آن متمایز می کند نه لغزش تراژیک متداول ...
Factor Oracle, Suux Oracle
We introduce a new automaton on a word p, sequence of letters taken in an alphabet , that we call factor oracle. This automaton is acyclic, recognizes at least the factors of p, has m + 1 states and a linear number of transitions. We give an on-line construction algorithm of the factor oracle. The tight links between this structure and the suux automaton allows us to introduce a second structur...
متن کاملSimple and Fast Biased Locks
Locks are typically used to ensure exclusive access to shared memory locations. Unfortunately, lock operations are expensive, so much work has been done on optimizing their performance for common access patterns. One such pattern found for e.g., is in networking applications, where there is a single thread dominating lock accesses. An important trivial case of this occurs when a single-threaded...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: [sic]
سال: 2023
ISSN: ['1847-7755']
DOI: https://doi.org/10.15291/sic/2.13.lc.7