Results 31 to 40 of about 273,955 (91)
Coo: Rethink Data Anomalies In Databases [PDF]
Transaction processing technology has three important contents: data anomalies, isolation levels, and concurrent control algorithms. Concurrent control algorithms are used to eliminate some or all data anomalies at different isolation levels to ensure data consistency.
arxiv
This paper proposes an improved itinerary recording protocol for securing distributed architectures based on mobile agents. The behavior of each of the cooperating agents is described, as well as the decision process establishing the identities of offenders when an attack is detected. Our protocol is tested on a set of potential attacks and the results
Guillaume Allée+3 more
wiley +1 more source
Wireless Power Transfer Analysis using Ansys [PDF]
In this report, methods of wireless power transfer of inside a cage is compared and simulated. Software Ansys Electronics Maxwell was used to simulate magnetic coupling of transmitter(s) and receiver with 10mA winding current in the mouse cage.
arxiv
Deductive Verification of Programs with Underspecified Semantics by Model Extraction [PDF]
We present a novel and well automatable approach to formal verification of programs with underspecified semantics, i.e., a language semantics that leaves open the order of certain evaluations. First, we reduce this problem to non-determinism of distributed systems, automatically extracting a distributed Active Object model from underspecified ...
arxiv
Findings of the 2nd Photonics and Electronics Technology for Extreme Scale Computing Workgroup (REPETE): Design Challenges for Socket Level Photonic I/O [PDF]
To inform research activities in HPC interconnect of strategic importance to the USG beyond 2018, in January of 2018, the DoD sponsored the 2nd Photonics and Electronics Technology for Extreme-scale Computing (REPETE) workgroup. REPETE investigated new challenges in the area of HPC interconnect inspired by technology trends and challenges of vital ...
arxiv
Emulating Hybrid Memory on NUMA Hardware [PDF]
Non-volatile memory (NVM) has the potential to disrupt the boundary between memory and storage, including the abstractions that manage this boundary. Researchers comparing the speed, durability, and abstractions of hybrid systems with DRAM, NVM, and disk to traditional systems typically use simulation, which makes it easy to evaluate different hardware
arxiv
Studies of Coupled Cavity Linac (CCL) Accelerating Structures with 3-D Codes [PDF]
The cw CCL being designed for the Accelerator Production of Tritium (APT) project accelerates protons from 96MeV to 211MeV. It consists of 99 segments each containing up to seven accelerating cavities. Segments are coupled by intersegment coupling cavities and grouped into supermodules.
arxiv
Characterisation of Large Area THGEMs and Experimental Measurement of the Townsend Coefficients for CF$_4$ [PDF]
Whilst the performance of small THGEMs is well known, here we consider the challenges in scaling these up to large area charge readouts. We first verify the expected gain of larger THGEMs by reporting experimental Townsend coefficients for a 10 cm diameter THGEM in low-pressure CF$_4$. Large area 50 cm by 50 cm THGEMs were sourced from a commercial PCB
arxiv +1 more source
OTTER 3.3 Reference Manual [PDF]
OTTER is a resolution-style theorem-proving program for first-order logic with equality. OTTER includes the inference rules binary resolution, hyperresolution, UR-resolution, and binary paramodulation. Some of its other abilities and features are conversion from first-order formulas to clauses, forward and back subsumption, factoring, weighting, answer
arxiv
Minerva and minepy: a C engine for the MINE suite and its R, Python and MATLAB wrappers [PDF]
We introduce a novel implementation in ANSI C of the MINE family of algorithms for computing maximal information-based measures of dependence between two variables in large datasets, with the aim of a low memory footprint and ease of integration within bioinformatics pipelines.
arxiv +1 more source