نتایج جستجو برای: mechanism locks

تعداد نتایج: 567245  

2009

Locks are typically used to ensure exclusive access to shared memory locations. Unfortunately, lock operations are expensive, so much work has been done on optimizing their performance for common access patterns. One such pattern found for e.g., is in networking applications, where there is a single thread dominating lock accesses. An important trivial case of this occurs when a single-threaded...

1998
Rainer Unland

'Advanced database applications', such as CAD/CAM, CASE, large AI applications or image and voice processing, place demands on transaction management which differ substantially from those of traditional database applications. In particular, there is a need to support 'enriched' data models (which include, for example, complex objects or version and configuration management), 'synergistic' coope...

2006
Adam Welc Antony L. Hosking Suresh Jagannathan

Concurrent data accesses in high-level languages like Java and C# are typically mediated using mutual-exclusion locks. Threads use locks to guard the operations performed while the lock is held, so that the lock’s guarded operations can never be interleaved with operations of other threads that are guarded by the same lock. This way both atomicity and isolation properties of a thread’s guarded ...

Journal: :Wireless Networks 2023

Abstract Smart-locks have become increasingly popular for access to homes and businesses in many countries, because of their ease use adaptability. These locks offer a simple secure alternative traditional key-based entry, making them an attractive choice both residential commercial properties. Nevertheless, it is essential acknowledge the potential security threats that come with any new techn...

Journal: :Disability Studies Quarterly 2011

2004
Jan Vitek Suresh Jagannathan Adam Welc Antony L. Hosking

A transaction defines a locus of computation that satisfies important concurrency and failure properties; these so-called ACID properties provide strong serialization guarantees that allow us to reason about concurrent and distributed programs in terms of higher-level units of computation (e.g., transactions) rather than lower-level data structures (e.g., mutual-exclusion locks). This paper pre...

2002
Arun Gandhi Elizabeth Varki Swapnil Bhatia

Emerging large-scale data-storage technologies such as Storage Area Networks (SAN) and Network Attached Storage (NAS), being server-less, trade datasharing and security semantics for high throughput and availability. This paper addresses the issue of data-sharing by presenting a Reader-Writer locking mechanism that is controlled by the storage device. Shared-read and exclusive-write access to s...

2010
Farzan Nadim Shunbing Zhao Amitabha Bose

Using methods of geometric dynamical systems modeling, we demonstrate the mechanism through which inhibitory feedback synapses to oscillatory neurons stabilize the oscillation, resulting in a flattened phase-resetting curve. In particular, we use the concept of a synaptic phase-resetting curve to demonstrate that periodic inhibitory feedback to an oscillatory neuron locks at a stable phase wher...

Journal: :Comsep 2022

The door is an important component of the dwelling. need for security thing in everyday life. Home such as doors, cupboards, lockers and so on at this time still uses a manual system, namely by using conventional keys. Conventional locks usually consist key housing saddle to open it. demands that must be carried out schools implementing learning process utilize information communication technol...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید