نتایج جستجو برای: lock in
تعداد نتایج: 16977860 فیلتر نتایج به سال:
Micromotion has long been associated with wear of polyethylene tibial inserts, potentially causing failure of unicompartmental knee replacement systems. One cause of micromotion is the locking mechanism between the undersurface of the polyethylene and the tibial tray. The objective of this study was to investigate the use of new novel lock designs for reducing the micromotion associated with a ...
In this short paper we show that hardware-based transactional lock elision can provide benefit by reducing the incidence of lock holder preemption, decreasing lock hold times and promoting improved scalability.
The objective of the thesis is to address the problem of clock skew between two different clock domains in modern day microprocessors due to the process, voltage and temperature (PVT) variations. In order to mitigate the misalignment of the clocks in the different clock domains, a delay line is added in all but the reference clock domain. These delay lines add or subtract the delay (as necessar...
هدف از این پایان نامه بررسی منطق mcml و مقایسه آن از لحاظ توان مصرفی و سرعت با منطقهای دیگر از جمله cpl، coms و domino می باشد.نتایج بدست آمده نشان می دهد ، جمع کننده های 8بیتی با تکنیک carry-lock-ahead(cla) و منطقهای cpl,modl و dymcml طراحی شده و آنها را از لحاظ توان مصرفی و سرعت مقایسه شده اند.
Fine-grained lock protocols with lock modes and lock granules adjusted to the various XML processing models, allow for highly concurrent transaction processing on XML trees, but require locking facilities that efficiently support large and deep hierarchies with varying fan-out characteristics. We discuss these and also further requirements like prefix-based node labels, and present a lock manag...
We consider a model of social coordination and network formation where agents decide on an action in game whom to establish costly links to. study the role passive connections; these are that other form given agent. Such connections may create endogenously arising lock-in don't switch actions links, as this result loss payoff received through them. When constrained number they form, set Nash eq...
This paper describes a technique for use when multiple instances of a data base management system (DBMS), each with its own cache (buffer pool), can directly read and modify any data stored on a set of shared disks. Global locking and coherency control protocols are necessary in this context for assuring transaction consistency and for maintaining coherency of the data cached in the multiple ca...
Hardware lock elision (HLE) concurrently executes lock critical sections as hardware transactions, but fallbacks to the original sequential lock fallback path when some hardware transaction fails. Recent software-assisted lock-removal based schemes provide a better concurrency by sacrificing safety (opacity). Hardware transactions can execute at the same time with the lock fallback path as long...
The objective of the thesis is to address the problem of clock skew between two different clock domains in modern day microprocessors due to the process, voltage and temperature (PVT) variations. In order to mitigate the misalignment of the clocks in the different clock domains, a delay line is added in all but the reference clock domain. These delay lines add or subtract the delay (as necessar...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید