نتایج جستجو برای: block transactions
تعداد نتایج: 182131 فیلتر نتایج به سال:
“Transactional memory” means that, instead of using explicit locks to protect from data races (like the Java synchronized construct), a programmer could declare a block of code atomic and rely on the underlying software and hardware system to ensure that code within the block executes as if atomic. The transactional memory system might use any of several concurrency control protocols, with some...
WELCOME to the middle-of-the year update on the state of the journal, where, as usual, you’ll find information about current and new initiatives as well as the presentation of the new associate editors and the farewell to those whose term has expired. Today, July 2016, the IEEE Transactions on Computers (TC) is just in the middle of their 65th year of continued and successful publication, and t...
In the era of information technology, security is essential to transmit confidential information (like credit card details, banking transactions etc) over the unsecured network like internet. It is possibility that the information that is being transferred through network of computers or internet being read by other people. For this we need an efficient and secure way to protect our data. Crypt...
Financial institutions increasingly rely upon data-driven methods for developing fraud detection systems, which are able to automatically detect and block fraudulent transactions. From a machine learning perspective, the task of detecting suspicious transactions is binary classification problem therefore many techniques can be applied. Interpretability however utmost importance management have ...
The present study aims to investigate the association between political connections and related-party transactions for the firms listed on the Tehran Stock Exchange (TSE). Sample includes the 485 firm-year observations from companies listed on the Tehran Stock Exchange during the years 2013 to 2017 and research hypothesis was tested using multivariate regression model based on panel data.We fin...
Blockchain systems are designed to produce blocks at a constant average rate. The most popular systems currently employ a Proof of Work (PoW) algorithm as a means of creating these blocks. Bitcoin produces, on average, one block every 10minutes. An unfortunate limitation of all deployed PoW blockchain systems is that the time between blocks has high variance. For example, 5% of the time, Bitcoi...
Several studies have shown that the performance of coherent caches depends on the relationship between the cache block size and the granularity of sharing and locality exhibited by the program. Large cache blocks exploit processor and spatial locality, but may cause unnecessary cache invalidations due to false sharing. Small cache blocks can reduce the number of cache invalidations, but increas...
Recently, blockchain technology accumulates and stores all transactions. Therefore, in order to verify the contents of transactions, data itself is compressed, but scalability limited. In addition, since a separate verification algorithm used for each type transaction, burden increases as size transaction increases. Existing cannot participate network because it does not become block sink by us...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید