نتایج جستجو برای: شارش lock exchange

تعداد نتایج: 203762  

Journal: :Blood purification 2009
Hans-Dietrich Polaschegg

Although the above-cited measurements were done in vitro, the results are applicable in vivo because the processes are based on simple laws of physics. They are also corroborated by clinical observations. Increased aPTT has been reported when samples were taken shortly after locking [6–8] . The low gentamicin concentration measured by Zhang et al. prior to the next treatment does not reflect th...

2008
Vladimir Cakarevic Petar Radojkovic Javier Verdú Alejandro Pajuelo Roberto Gioiosa Francisco J. Cazorla Mario Nemirovsky Mateo Valero

Spin locks are a synchronization mechanisms used to provide mutual exclusion to shared software resources. Spin locks are used over other synchronization mechanisms in several situations, like when the average waiting time to obtain the lock is short, in which case the probability of getting the lock is high, or when it is no possible to use other synchronization mechanisms. In this paper, we s...

2002
Philip Holman James H. Anderson

We consider various techniques for implementing shared objects and for accounting for objectsharing overheads in Pfair-scheduled multiprocessor systems. We primarily focus on the use of lock-free objects, though some lock-based alternatives are briefly considered as well. Lock-free objects are more economical for implementing relatively simple objects such as buffers, stacks, queues, and lists;...

Journal: :JDFSL 2013
Gary C. Kessler

Although one is unlikely to ever want to brute-force an Android lock pattern, many do wonder about the relative strength of the lock pattern versus a multi-digit personal identification number (PIN). It becomes obvious pretty quickly that there are many more lock patterns than the 10,000 possible four-digit PINs. Figure 1 Android lock pattern screen But, how many lock patterns are there? The of...

2013
Anna Huysse-Gaytandjieva Wim Groot Milena Pavlova

Previous studies have paid little attention to the employees' ability to exit a job-lock situation and factors that determine this ability. It remains unclear why some employees who experience job lock are able to exit this state while others remain in job lock. We use longitudinal data to identify employees who have fallen in the state of job lock and their subsequent behavior-exiting or remai...

Journal: :Physics of fluids 2011
Adnan Qamar Robinson Seda Joseph L Bull

A fundamental study to characterize the flow around an oscillating cylinder in a pulsatile flow environment is investigated. This work is motivated by a new proposed design of the total artificial lung (TAL), which is envisioned to provide better gas exchange. The Navier-Stokes computations in a moving frame of reference were performed to compute the dynamic flow field surrounding the cylinder....

Journal: :J. Parallel Distrib. Comput. 1996
Pedro C. Diniz Martin C. Rinard

Atomic operations are a key primitive in parallel computing systems. The standard implementation mechanism for atomic operations uses mutual exclusion locks. In an object-based programming system the natural granularity is to give each object its own lock. Each operation can then make its execution atomic by acquiring and releasing the lock for the object that it accesses. But this ne lock gran...

2002
Adrian A. Dorrington Rainer Künnemeyer

Traditionally digital lock-in amplifiers sample the input signal at a rate much higher than the lock-in reference frequency and perform the lock-in algorithm with high-speed processors. We present a small and simple digital lock-in amplifier that uses a 20 bit current integrating analogue-to-digital converter interfaced to a microcontroller. The sample rate is set to twice the reference frequen...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید