نتایج جستجو برای: lock fastener
تعداد نتایج: 14465 فیلتر نتایج به سال:
Based on loosely coupled services in an XML engine, we describe how to realize fine-grained lock protocols, which can guarantee transaction isolation for applications using different language models. We illustrate the superiority of the taDOM lock protocol family and its tailormade lock modes and lock granules adjusted to the XML language model. We emphasize the importance of a prefix-based nod...
The 28 lock and dams sites on the upper Mississippi River is currently central to transporting U.S. agricultural commodities to the world market. This aging lock and dam system and slow double lockage process at the 600-foot locks have generated concern about its navigational efficiency. The objective of this study is to examine the determinants of delay occurred at the lock and dam system on t...
Synchronization overhead may limit the number of applications that can take advantage of a shared-memory abstraction on top of emerging network of workstation organizations. While the programmer could spend additional efforts into getting rid of such overhead by restructuring the computation, this paper focuses on a simpler approach where the overhead of lock operations is hidden through lock p...
Abstract Recent catastrophic events in Southeast Asia have emphasized that roofs made of wood/steel frames and lightweight metal roofing sheets are the most vulnerable component building envelope when subjected to typhoon-induced wind uplift. This also applies aging cultural heritage (CH) assets, which deserve special consideration because their intangible value for local communities, essential...
The idea of data transfer by physically severed connections has been applied in a simple realization of the Lock-Keeper technology, the SingleGate Lock Keeper system. By means of it, the possibility of direct attacks to a protected network can be eliminated entirely and data can be exchanged between two networks through a completely secure and reliable way. As an advanced implementation of this...
The exibility of nested transactions is generally provided at the expense of a more complex locking mechanism which must deal with expensive lock inheritance. In this paper, we give a solution for eecient lock inheritance. Our solution does not change the original nested transactions model but does revisit its locking rules using set-oriented semantics. This allows us to trade the cost of lock ...
The choice of lock objects in concurrent programs can affect both performance and correctness, a burden of complexity for programmers. Recently, various automated lock allocation and assignment techniques have been proposed, each aiming primarily to minimize the number of conflicts between critical sections. However, practical performance depends on a number of important factors, including the ...
There are many mechanisms for concurrency control in high-level programming languages. In Java, the original mechanism for concurrency control, based on synchronized blocks, is lexically scoped. For more flexible control, Java 5 introduced non-lexical operators, supporting lock primitives on re-entrant locks. These operators may lead to run-time errors and unwanted behavior; e.g., taking a lock...
We surveyed infectious diseases physicians to determine their practice patterns with regard to both antimicrobial lock prophylaxis and antimicrobial lock therapy. Antimicrobial lock prophylaxis is relatively uncommon; only 19% of infectious diseases physicians reported using it at least once. Although antimicrobial lock therapy is more commonly used, we found a significant variation in practice...
Abstract To explore the effect of canyon topography on seismic response railway irregular bridge–track system that crosses a V-shaped canyon, ground motions horizontal site and were simulated through theoretical analysis with 12 earthquake records selected from Pacific Earthquake Engineering Research Center (PEER) Strong Ground Motion Database matching condition bridge. Nonlinear analyses an ex...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید