نتایج جستجو برای: critical section

تعداد نتایج: 628354  

2017
Christopher P. Chambers Nicolas S. Lambert

This Supplementary Appendix includes additional results and the proofs omitted from the main text. Throughout, references are to the main text and to the appendix of the main text, unless they include the prefix “SA.” It proceeds as follows. In Section SA.1, we provide several examples that illustrate the general method of the main text to special environments. In Section SA.2, we consider the ...

2014
Todd D. Murphey Brenna D. Argall

Software-enabled rehabilitation techniques hold the promise of revolutionizing continuous, at-home, and remote care, both on-going and immediately post-trauma. However, critical challenges arise when automating the schedule of therapy and when automating tasks. Challenges include the software needs for dynamic tasks versus those of static tasks, human-in-the-loop control/safety, and interface d...

2016
Satya Gautam Vadlamudi Sailik Sengupta Marthony Taguinod Ziming Zhao Adam Doupé Gail-Joon Ahn Subbarao Kambhampati

Vulnerabilities in web applications allow hackers to access and/or modify restricted data. Here the hackers have the opportunity to perform reconnaissance so as to gain knowledge about the web application layout before launching an attack, whereas the defender (administrator of the web application) must secure the application even with its potential vulnerabilities. In order to mask such vulner...

2006
Waseem Ahmad Ashfaq A. Khokhar

Overlay networks have been very useful in solving large scale data dissemination problems. In this paper, we consider the case of data gathering which is the inverse of dissemination problem. In particular, we focus on a scenario where an organization or a constellation of organizations is interested in gathering data from large number of nodes spread across the administrative boundaries. Provi...

2014
ABRAMO HEFEZ Maria Lucia

We develop the theory of duality for projective varieties defined over fields of arbitrary characteristic. A central concept in this work is that of reflexivity and our main tool is the rank of certain local Hessians which provides a numerical criterion for reflexivity. Many of our results are necessary and sufficient conditions for reflexivity. We also analyze the reflexivity of a general hype...

2009
Amanda Burls

Critical appraisal is the process of carefully and systematically examining research to judge its trustworthiness, and its value and relevance in a particular context. G The Critical Appraisal Skills Programme aims to help people develop the necessary skills to make sense of scientific evidence, and has produced appraisal checklists covering validity, results and relevance. G Different research...

2011
A. Roebel S. Maller

This paper describes research into signal transformation operators allowing to modify the vibrato extent in recorded sound signals. A number of operators are proposed that deal with the problem taking into account different levels of complexity. The experimental validation shows that the operators are effective in removing existing vibrato in real world recordings at least for the idealized cas...

Journal: :Electr. Notes Theor. Comput. Sci. 2006
Richard Bornat Cristiano Calcagno Hongseok Yang

Separation logic [20,21,14] began life as an extended formalisation of Burstall’s treatment of list-mutating programs [8]. It rapidly became clear that there was more that it could say: O’Hearn’s discovery [13] of ownership transfer of buffers between threads and Boyland’s suggestion [5] of permissions to deal with variable and heap sharing pointed the way to a treatment of safe resource manage...

2005
Neeraj Mittal Prajwal K. Mohan

In the group mutual exclusion problem, each critical section has a type or a group associated with it. Processes requesting critical sections of the same type may execute their critical sections concurrently. However, processes requesting critical sections of different types must execute their critical sections in a mutually exclusive manner. Most algorithms for group mutual exclusion that have...

1998
S. D. Lang L. J. Mao

We extend a torus-based coterie structure for distributed mutual exclusion to allow k multiple entries in a critical section. In the original coterie, the system nodes are logically arranged in a rectangle, called a torus, in which the last row (column) is followed by the first row (column) using end wraparound. A torus quorum consists of a head and a tail, where the head contains one entire ro...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید