Results 301 to 310 of about 613,046 (357)
Connected map-induced resource allocation scheme for cognitive radio network quality of service maximization. [PDF]
Saravanan K+3 more
europepmc +1 more source
Analyzing Healthcare Processes with Incremental Process Discovery: Practical Insights from a Real-World Application. [PDF]
Schuster D+3 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
What do concurrency developers ask about?: a large-scale study using stack overflow
International Symposium on Empirical Software Engineering and Measurement, 2018Background Software developers are increasingly required to write concurrent code. However, most developers find concurrent programming difficult. To better help developers, it is imperative to understand their interest and difficulties in terms of ...
Syed Ahmed, M. Bagherzadeh
semanticscholar +1 more source
An Empirical Evaluation of In-Memory Multi-Version Concurrency Control
Proceedings of the VLDB Endowment, 2017Multi-version concurrency control (MVCC) is currently the most popular transaction management scheme in modern database management systems (DBMSs). Although MVCC was discovered in the late 1970s, it is used in almost every major relational DBMS released ...
Yingjun Wu+4 more
semanticscholar +1 more source
Detecting concurrency memory corruption vulnerabilities
ESEC/SIGSOFT FSE, 2019Memory corruption vulnerabilities can occur in multithreaded executions, known as concurrency vulnerabilities in this paper. Due to non-deterministic multithreaded executions, they are extremely difficult to detect.
Yan Cai+6 more
semanticscholar +1 more source
An Evaluation of Distributed Concurrency Control
Proceedings of the VLDB Endowment, 2017Increasing transaction volumes have led to a resurgence of interest in distributed transaction processing. In particular, partitioning data across several servers can improve throughput by allowing servers to process transactions in parallel.
R. Harding+3 more
semanticscholar +1 more source
A Heuristic Framework to Detect Concurrency Vulnerabilities
Asia-Pacific Computer Systems Architecture Conference, 2018With a growing demand of concurrent software to exploit multi-core hardware capability, concurrency vulnerabilities have become an inevitable threat to the security of today's IT industry.
Changming Liu+4 more
semanticscholar +1 more source
Concurrency and Concurrent Constraint Programming
1995The intent of this paper is to provide the basic ideas and the possible alternatives underlying the task of giving a semantics to a concurrent system/language, and to describe a particular approach which makes some specific choices in order to give a semantics to the class of CC languages.
U. Montanari, ROSSI, FRANCESCA
openaire +3 more sources
SSRN Electronic Journal, 2020
Abstract In Chapter 10, Niamh Dunne tackles a key and developing enforcement issue which had not been dealt with in either of the preceding collections: ‘Concurrency’. The concurrency regime empowers certain sector regulators in the UK to apply the competition rules in tandem with the Competition and Markets Authority.
openaire +1 more source
Abstract In Chapter 10, Niamh Dunne tackles a key and developing enforcement issue which had not been dealt with in either of the preceding collections: ‘Concurrency’. The concurrency regime empowers certain sector regulators in the UK to apply the competition rules in tandem with the Competition and Markets Authority.
openaire +1 more source