Results 51 to 60 of about 4,058 (161)
Integrity constraints enforce consistency and completeness on data. The article discusses a newly developed validator for checking integrity constraints in Shapes Constraint Language (SHACL) through reduction to SPARQL Protocol and RDF Query Language (SPARQL) queries. It can be used with systems for ontology‐based database access.
Özgür L. Özçep +5 more
wiley +1 more source
Inefficiencies in the Cache Hierarchy: A Sensitivity Study of Cacheline Size with Mobile Workloads [PDF]
With the rising number of cores in mobile devices, the cache hierarchy in mobile application processors gets deeper, and the cache size gets bigger.
Emmons, C, Van Laer, A, Wang, W
core
Owner‐Occupied Housing, Inflation, and Monetary Policy
Abstract Owner‐occupied housing (OOH) is currently excluded from the harmonized index of consumer prices (HICP) in Europe. Using microlevel data for Sydney and aggregated data for the United States, France, and Germany, we compare the impact of alternative treatments of OOH on measured inflation.
ROBERT J. HILL +2 more
wiley +1 more source
Myth Busting in a Post‐Assad Syria
Abstract This article challenges common misconceptions about the fall of Syrian President Bashar al‐Assad. It debunks the notion of a simplistic rebel/regime dichotomy and instead delineates the diversity of actors and interests in a post‐Assad Syria.
Rob Geist Pinfold
wiley +1 more source
Fairly Decentralizing a Hybrid Concurrency Control Protocol for Real‐Time Database Systems
ABSTRACT Concurrency control protocols play a vital role in ensuring the correctness of databases when transactions are processed in parallel. Plor is a non‐real‐time concurrency control protocol based on the 2‐phase locking protocol. Plor utilizes the Wound‐Wait scheme, a timestamp‐based scheme for deadlock prevention, as it provides lower tail ...
Tung Nguyen, Hideyuki Kawashima
wiley +1 more source
Automatic Completion of Distributed Protocols with Symmetry
A distributed protocol is typically modeled as a set of communicating processes, where each process is described as an extended state machine along with fairness assumptions, and its correctness is specified using safety and liveness requirements ...
Alur, Rajeev +4 more
core +1 more source
Abstract Individuals diagnosed with autism, attachment disorders, emotionally unstable personality disorder (EUPD) or complex post‐traumatic stress disorder (CPTSD) can present with similar features. This renders differential and accurate diagnosis of these conditions difficult, leading to diagnostic overshadowing and misdiagnosis.
Rachel Sarr +14 more
wiley +1 more source
Many organisms leave evidence of their former occurrence, such as scat, abandoned burrows, middens, ancient eDNA or fossils, which indicate areas from which a species has since disappeared. However, combining this evidence with contemporary occurrences within a single modeling framework remains challenging.
Erik A. Beever +5 more
wiley +1 more source
Overcoming the IOTLB wall for multi-100-Gbps Linux-based networking. [PDF]
Farshin A +3 more
europepmc +1 more source
A Case for Fine-Grain Adaptive Cache Coherence [PDF]
As transistor density continues to grow geometrically, processor manufacturers are already able to place a hundred cores on a chip (e.g., Tilera TILE-Gx 100), with massive multicore chips on the horizon.
Devadas, Srinivas +2 more
core

