نتایج جستجو برای: file access pattern

تعداد نتایج: 713743  

Journal: :iranian endodontic journal 0
azar heydari mona rahmani mostafa heydari

instrument breakage during treatment can lead to serious complications and carries the risk of treatment failure. when a file breaks in the canal, bypassing or removal can be difficult and the long-term prognosis of the tooth may be compromised. sometimes surgery may be indicated for removal of the broken segment. often some part of the root cannot be cleaned because of blockage by the broken f...

2017
Shai Bergman Tanya Brokhman Tzachi Cohen Mark Silberstein

Recent GPUs enable Peer-to-Peer Direct Memory Access (P2P) from fast peripheral devices like NVMe SSDs to exclude the CPU from the data path between them for efficiency. Unfortunately, using P2P to access files is challenging because of the subtleties of low-level nonstandard interfaces, which bypass the OS file I/O layers and may hurt system performance. SPIN integrates P2P into the standard O...

2005
Ginés García-Mateos Andrés García-Meroño Cristina Vicente-Chicote Alberto Ruiz Pedro E. López-de-Teruel

Automatic recognition of time and date stamps in CCTV video enables the inclusion of time-based queries in video indexing applications. Such ability needs to deal with problems of low character resolution, non-uniform background, multiplexed video format, and random access to the video file. In this paper, we address these problems and propose a technique that solves the difficult task of chara...

Journal: :Journal of Physics: Conference Series 2021

2006
Stephen Smaldone Aniruddha Bohra Liviu Iftode

FileWall is a file access control framework that allows file system administrators to enforce file access policies based on dynamic access context such as access history, environment, etc. Similar to a firewall, which interposes on a network path and operates on packets to enforce network access policies, FileWall interposes on a client-server path and operates on network file system messages t...

Journal: :journal of dental research, dental clinics, dental prospects 0
shiva sadeghi masoomeh abolghasemi

background and aims. determining the proper length of the root canals is essential for successful endodontic treatment. the purpose of this in vitro study was to evaluate the effect of file size on the accuracy of the raypex 5 electronic apex locator for working length determination of uninstrumented canals. materials and methods. twenty maxillary central incisors with single straight canals we...

2012
Yifan Wang Garth Gibson Greg Ganger Meghan W. McClelland

ii Acknowledgements I would like to express my gratitude to my advisor Prof. Garth Gibson for working closely with me through the entire study, offering precious advice and guidance and helping connect with industrial and academic HPC sites. I would like to thank my academic adviser Prof. Greg Ganger for offering valuable advice on the paper and defense. I wish to acknowledge Meghan W. Abstract...

1989
Brent B. Welch John K. Ousterhout

This paper describes a facility that transparently extends the Sprite distributed file system to include foreign file systems and arbitrary user services. A pseudo-filesystem is a sub-tree of the distributed hierarchical name space that is implemented by a user-level server process. A pseudo-file-system fits naturally into the Sprite distributed system; the server runs on one host and access fr...

2003
Min-Shiang Hwang Wen-Guey Tzeng Wei-Pang Yang

In this paper we propose a new dynamic access control method for the computer system with frequently inserted, deleted and updated users/files. Our method, based on the concepts of the access control matrix, key-lock-pair, time stamp and Chinese remainder theorem, associates each user with a user key and a user lock and each file with a file key and a file lock. Our method can achieve the follo...

2001
Md. Rafiqul Islam Harihodin Selamat

A two-key access control scheme is proposed for implementing the access control matrix. The proposed scheme is based on binary form of access rights and time stamp concept. In this scheme each user is assigned one key and each file is also assigned one key. The key of a user or file can be used to derive the access rights to the files depending on the value of time stamp number. The scheme achi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید