نتایج جستجو برای: intensity running forced could prevent memory corruption

تعداد نتایج: 1469556  

Journal: :Proceedings of the Nutrition Society 2005

Journal: :Jurnal Magister Hukum Udayana (Udayana Master Law Journal) 2020

2016
Daniela Schiller

What do ice cream and running have in common? Consuming indulgence foods and running are two actions that typically achieve opposite results: ice cream leads to weight gain and running helps you lose it; high sugar intake is linked to diabetes, cholesterol, blood pressure, and heart disease, while exercise reduces those risks. Ice cream and running do have one thing in common though—both are se...

2015
Diogo Behrens Marco Serafini Flavio Paiva Junqueira Sergei Arnautov Christof Fetzer

In distributed systems, data corruption on a single node can propagate to other nodes in the system and cause severe outages. The probability of data corruption is already non-negligible today in large computer populations (e.g., in large datacenters). The resilience of processors is expected to decline in the near future, making it necessary to devise cost-effective software approaches to deal...

Journal: :Parallel Processing Letters 1993
Lisa Higham Eric Schenk

Two techniquesfor managing memory on a parallel randomaccess machine (PRAM) are presented. One is a scheme for an n/log n processor EREW PRAM that dynamically allocates and deallocates up to n records of the same size in O(log n) time. The other is a simulation of a PRAM with initialized memory by one with uninitialized memory. A CREW PRAM variant of the technique justifies the assumption that ...

Introduction: Corruption is one of the major obstacles to achieving progress and development in the communities and countries. Hence, understanding the phenomenon of corruption, types, and measurement parameters and negative consequences of corruption in various aspects of political, administrative, social, and economic fields may help strategies to fight with corruption. Therefore, the aim of ...

Journal: :CoRR 2012
Arundhati Walia Syed I. Ahson

Heap security has been a major concern since the past two decades. Recently many methods have been proposed to secure heap i.e. to avoid heap overrun and attacks. The paper describes a method suggested to secure heap at the operating system level. Major emphasis is given to Solaris operating system’s dynamic memory manager. When memory is required dynamically during runtime, the SysVmalloc acts...

2008
Zheng Zeng Panganamala Ramana Kumar

Wireless communication is inherently vulnerable in nature and packets can be corrupted due to various reasons. The network performance can potentially be improved if one is able to identify the reasons for packet corruption and react to them accordingly. However, none of the current wireless protocols do so. In this paper, we design a novel scheme to diagnose packet corruption in OFDM wireless ...

Journal: :IEEE Trans. Knowl. Data Eng. 2003
Philip Bohannon Rajeev Rastogi S. Seshadri Abraham Silberschatz S. Sudarshan

Increasingly, for extensibility and performance, special purpose application code is being integrated with database system code. Such application code has direct access to database system buffers, and as a result, the danger of data being corrupted due to inadvertent application writes is increased. Previously proposed hardware techniques to protect from corruption require system calls, and the...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید