نتایج جستجو برای: lock

تعداد نتایج: 14013  

2016
Dave Dice Tim Harris

In this short paper we show that hardware-based transactional lock elision can provide benefit by reducing the incidence of lock holder preemption, decreasing lock hold times and promoting improved scalability.

1988

openshapedoor within door { booleanopen int size point hinge , lock line door open = true size = 200 hinge = \NW + {10, 0} lock = if open then hinge-{0, size} else hinge+{size, 0} door = [hinge,lock] } width = 800 length = 800 centre = {500, 500} .

2013

The objective of the thesis is to address the problem of clock skew between two different clock domains in modern day microprocessors due to the process, voltage and temperature (PVT) variations. In order to mitigate the misalignment of the clocks in the different clock domains, a delay line is added in all but the reference clock domain. These delay lines add or subtract the delay (as necessar...

1992
C. Mohan Inderpal Narang

This paper describes a technique for use when multiple instances of a data base management system (DBMS), each with its own cache (buffer pool), can directly read and modify any data stored on a set of shared disks. Global locking and coherency control protocols are necessary in this context for assuring transaction consistency and for maintaining coherency of the data cached in the multiple ca...

Journal: :The Lancet 1871

2013

The objective of the thesis is to address the problem of clock skew between two different clock domains in modern day microprocessors due to the process, voltage and temperature (PVT) variations. In order to mitigate the misalignment of the clocks in the different clock domains, a delay line is added in all but the reference clock domain. These delay lines add or subtract the delay (as necessar...

2014
Serafettin Tasci Murat Demirbas

For datacenter applications that require tight synchronization, transactions are commonly employed for achieving concurrency while preserving correctness. Unfortunately, distributed transactions are hard to scale due to the decentralized lock acquisition and coordination protocols they employ. In this paper, we show that it is possible to achieve scalability for distributed transactions by usin...

This study was conducted to investigate the effects of age and sex on the fleece characteristics of 40 Iranian indigenous Khorasan goats. Goats were divided into two different sex and age (kids and adults) groups. Fiber characteristics under study were: fleece weight, fiber length, lock length, fiber diameter, coefficient of fiber diameter, breaking load, resistance, elongation, hair percentage...

2003
Yair Linn

This paper introduces a new lock detector for symbol timing recovery PLLs in QPSK receivers operating in AWGN channels. The detector necessitates only two samples per symbol, and these samples correspond to those required by the popular Gardner[1] timing error detector. The lock detector is characterized theoretically and through simulations. It transpires that the lock detector is selfnormaliz...

Journal: :Journal of managed care & specialty pharmacy 2014
Andrew W Roberts Asheley Cockrell Skinner

Nonmedical use of prescription medications--particularly controlled substances--has risen dramatically in recent decades, resulting in alarming increases in overdose-related health care utilization, costs, and mortality. The Centers for Disease Control and Prevention estimate that 80% of abused and misused controlled substances originate as legal prescriptions. As such, policymakers and payers ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید