Results 41 to 50 of about 20,930 (183)

Achieving Consistent Real-Time Latency at Scale in a Commodity Virtual Machine Environment Through Socket Outsourcing-Based Network Stacks

open access: yesIEEE Access, 2018
It is challenging to achieve a consistent real-time (RT) response time in commodity virtual machine (VM) environments because they have longer and more complex network protocol stacks.
Oscar F. Garcia   +2 more
doaj   +1 more source

Design Principles for Scaling Multi-core OLTP Under High Contention

open access: yes, 2016
Although significant recent progress has been made in improving the multi-core scalability of high throughput transactional database systems, modern systems still fail to achieve scalable throughput for workloads involving frequent access to highly ...
Abadi, Daniel J.   +2 more
core   +1 more source

Embedding Multi-Task Address-Event- Representation Computation [PDF]

open access: yes, 2009
Address-Event-Representation, AER, is a communication protocol that is intended to transfer neuronal spikes between bioinspired chips. There are several AER tools to help to develop and test AER based systems, which may consist of a hierarchical ...
Civit Balcells, Antón   +3 more
core   +1 more source

Static locality analysis for cache management [PDF]

open access: yes, 1997
Most memory references in numerical codes correspond to array references whose indices are affine functions of surrounding loop indices. These array references follow a regular predictable memory pattern that can be analysed at compile time.
González Colás, Antonio María   +2 more
core   +1 more source

From Ecosystem Threats to Balance Sheets: Biodiversity Risks Exposure and Corporate Cash Policies

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT This study investigates how firms strategically respond to biodiversity risk by examining their cash holding decisions. Using firm‐level data from China, we find that firm‐level biodiversity risk exposure significantly increases corporate cash holdings.
Jing Hao   +4 more
wiley   +1 more source

Reputational Risk: An Investigation Into How Environmental Failures Drive Stock Price Crashes

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT The study examines the relationship between stock price crashes and firm environment reputational risk. Using a large sample of US listed firms, covering a time span from 2007 to 2021, we test the effect of environmental reputation risk on three measures for the stock price crash risk (NEGCSK, DRUV, and CRASH).
Man Dang   +4 more
wiley   +1 more source

Biologically Significant Illinois Streams: An Evaluation of the Streams of Illinois based on Aquatic Biodiversity: Part 1 [PDF]

open access: yes, 1991
Part 1: Text. See Reference ID-1365 for Part 2: AtlasReport issued on: December 31, 1991INHS Technical Report prepared for Illinois Dept. of Conservation, Illinois Dept.
Cummings, Kevin S., Page, Lawrence M.
core  

Barriers and Enablers of Circular Economy in Electrical and Electronic Equipment: A Systematic Literature Review

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT Rapid technological change, shorter lifecycles and rising demand for electrical and electronic equipment (EEE) are increasing waste electrical and electronic equipment (WEEE) and emphasise the need for a circular economy. This paper identifies barriers and enablers of the circular transition in EEE and outlines interventions.
Aya Abdelmeguid, Lucia Corsini
wiley   +1 more source

Advances in Triboelectric Nanogenerators With Rotating Structure

open access: yesCarbon Energy, EarlyView.
The rotating TENG has been widely studied for its superiorities of simple structure, high efficiency, and stable output. This review introduced the four different principles of rotating TENG and offered a thorough summary for performance and application research through three‐level classification. Importantly, the current existing problems, challenges,
Chuguo Zhang   +4 more
wiley   +1 more source

Worst-case Bounds and Optimized Cache on $M^{th}$ Request Cache Insertion Policies under Elastic Conditions

open access: yes, 2018
Cloud services and other shared third-party infrastructures allow individual content providers to easily scale their services based on current resource demands. In this paper, we consider an individual content provider that wants to minimize its delivery
Carlsson, Niklas, Eager, Derek
core   +1 more source

Home - About - Disclaimer - Privacy