نتایج جستجو برای: lock
تعداد نتایج: 14013 فیلتر نتایج به سال:
In this short paper we show that hardware-based transactional lock elision can provide benefit by reducing the incidence of lock holder preemption, decreasing lock hold times and promoting improved scalability.
openshapedoor within door { booleanopen int size point hinge , lock line door open = true size = 200 hinge = \NW + {10, 0} lock = if open then hinge-{0, size} else hinge+{size, 0} door = [hinge,lock] } width = 800 length = 800 centre = {500, 500} .
The objective of the thesis is to address the problem of clock skew between two different clock domains in modern day microprocessors due to the process, voltage and temperature (PVT) variations. In order to mitigate the misalignment of the clocks in the different clock domains, a delay line is added in all but the reference clock domain. These delay lines add or subtract the delay (as necessar...
This paper describes a technique for use when multiple instances of a data base management system (DBMS), each with its own cache (buffer pool), can directly read and modify any data stored on a set of shared disks. Global locking and coherency control protocols are necessary in this context for assuring transaction consistency and for maintaining coherency of the data cached in the multiple ca...
The objective of the thesis is to address the problem of clock skew between two different clock domains in modern day microprocessors due to the process, voltage and temperature (PVT) variations. In order to mitigate the misalignment of the clocks in the different clock domains, a delay line is added in all but the reference clock domain. These delay lines add or subtract the delay (as necessar...
For datacenter applications that require tight synchronization, transactions are commonly employed for achieving concurrency while preserving correctness. Unfortunately, distributed transactions are hard to scale due to the decentralized lock acquisition and coordination protocols they employ. In this paper, we show that it is possible to achieve scalability for distributed transactions by usin...
This study was conducted to investigate the effects of age and sex on the fleece characteristics of 40 Iranian indigenous Khorasan goats. Goats were divided into two different sex and age (kids and adults) groups. Fiber characteristics under study were: fleece weight, fiber length, lock length, fiber diameter, coefficient of fiber diameter, breaking load, resistance, elongation, hair percentage...
This paper introduces a new lock detector for symbol timing recovery PLLs in QPSK receivers operating in AWGN channels. The detector necessitates only two samples per symbol, and these samples correspond to those required by the popular Gardner[1] timing error detector. The lock detector is characterized theoretically and through simulations. It transpires that the lock detector is selfnormaliz...
Nonmedical use of prescription medications--particularly controlled substances--has risen dramatically in recent decades, resulting in alarming increases in overdose-related health care utilization, costs, and mortality. The Centers for Disease Control and Prevention estimate that 80% of abused and misused controlled substances originate as legal prescriptions. As such, policymakers and payers ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید