نتایج جستجو برای: b lock e xogeneity

تعداد نتایج: 1819180  

1997
Magnus Karlsson

Synchronization overhead may limit the number of applications that can take advantage of a shared-memory abstraction on top of emerging network of workstation organizations. While the programmer could spend additional efforts into getting rid of such overhead by restructuring the computation, this paper focuses on a simpler approach where the overhead of lock operations is hidden through lock p...

2003
Feng Cheng Paul Ferring Christoph Meinel Gerhard Müllenheim Jochen Bern

The idea of data transfer by physically severed connections has been applied in a simple realization of the Lock-Keeper technology, the SingleGate Lock Keeper system. By means of it, the possibility of direct attacks to a protected network can be eliminated entirely and data can be exchanged between two networks through a completely secure and reliable way. As an advanced implementation of this...

1994
Laurent Daynès Olivier Gruber Patrick Valduriez

The exibility of nested transactions is generally provided at the expense of a more complex locking mechanism which must deal with expensive lock inheritance. In this paper, we give a solution for eecient lock inheritance. Our solution does not change the original nested transactions model but does revisit its locking rules using set-oriented semantics. This allows us to trade the cost of lock ...

2007
Richard L. Halpert Christopher J. F. Pickett Clark Verbrugge

The choice of lock objects in concurrent programs can affect both performance and correctness, a burden of complexity for programmers. Recently, various automated lock allocation and assignment techniques have been proposed, each aiming primarily to minimize the number of conflicts between critical sections. However, practical performance depends on a number of important factors, including the ...

2011
Einar Broch Johnsen Thi Mai Thuong Tran Olaf Owe Martin Steffen

There are many mechanisms for concurrency control in high-level programming languages. In Java, the original mechanism for concurrency control, based on synchronized blocks, is lexically scoped. For more flexible control, Java 5 introduced non-lexical operators, supporting lock primitives on re-entrant locks. These operators may lead to run-time errors and unwanted behavior; e.g., taking a lock...

Journal: :Infection control and hospital epidemiology 2010
Philip M Polgreen Susan E Beekmann Daniel J Diekema Robert J Sherertz

We surveyed infectious diseases physicians to determine their practice patterns with regard to both antimicrobial lock prophylaxis and antimicrobial lock therapy. Antimicrobial lock prophylaxis is relatively uncommon; only 19% of infectious diseases physicians reported using it at least once. Although antimicrobial lock therapy is more commonly used, we found a significant variation in practice...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه محقق اردبیلی - دانشکده ریاضی 1393

در این پایان نامه بر روی مفاهیمی همچون kb-فضا، عملگرهای به طور b-ضعیف فشرده و عملگرهای به طور ضعیف فشرده ترتیبی و مفاهیم مرتبط با مشبکه های باناخ را مطالعه خواهیم کرد و ثابت خواهیم کرد که اگر e یک مشبکه ی باناخ و x فضای باناخ باشد در این صورت عملگر به طور b-ضعیف فشرده است اگر و تنها اگر به طور ضعیف فشرده ی ترتیبی باشد.

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان - دانشکده علوم ریاضی 1386

حلقه r، آیکدا ناکایاما حلقه (حلقه –in) نامیده می شود هرگاه پوچ ساز چپ اشتراک هر دو ایده آل راست برابر با مجموع پوچ سازهای چپ آن دو ایده ال باشد. در این پایان نامه نشان داده می شود که اگر r یک in-حلقه راست باشد و a,b دو ایدآل راست r باشند که مکمل یکدیگرند، آن گاه خود توان e?r وجود دارد به طوری که a=er و b=(1-e)r. به عنوان یک نتیجه نشان داده می شود که r خود تزریقی راست است اگر و تنها اگر m2(r) یک...

2013
Stefan Kempf Ronald Veldema Michael Philippsen

An atomic block is a language construct that simplifies the programming of critical sections. In the past, software transactional memory (STM) and lock inference have been used to implement atomic blocks. Both approaches have strengths and weaknesses. STM provides fine-grained locking but has high overheads due to logging and potential rollbacks. Lock inference is a static analysis that compute...

2010
Nick Steklov Nam Chao Sudesh Srivastav

Micromotion has long been associated with wear of polyethylene tibial inserts, potentially causing failure of unicompartmental knee replacement systems. One cause of micromotion is the locking mechanism between the undersurface of the polyethylene and the tibial tray. The objective of this study was to investigate the use of new novel lock designs for reducing the micromotion associated with a ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید