Results 31 to 40 of about 97,871 (297)
Survey on Blockchain-Based Smart Contracts: Technical Aspects and Future Research
The industrial and computing research context revolutionized in various directions during the last decades. The blockchain-based smart contract embraced as a significant research interest due to its distinguishing features such as decentralized storage ...
Tharaka Mawanane Hewa +4 more
doaj +1 more source
Couple relationship functioning impacts individual health and well-being, including HIV risk, but scant research has focused on emic understandings of relationship quality in African populations.
Allison Ruark +6 more
doaj +1 more source
Energy-efficient and high-performance lock speculation hardware for embedded multicore systems [PDF]
Embedded systems are becoming increasingly common in everyday life and like their general-purpose counterparts, they have shifted towards shared memory multicore architectures.
Bahar, R Iris +4 more
core +1 more source
Concurrence control for transactions with priorities [PDF]
Priority inversion occurs when a process is delayed by the actions of another process with less priority. With atomic transactions, the concurrency control mechanism can cause delays, and without taking priorities into account can be a source of priority
Marzullo, Keith
core +4 more sources
Proving Opacity of Transactional Memory with Early Release
Transactional Memory (TM) is an alternative way of synchronizing concurrent accesses to shared memory by adopting the abstraction of transactions in place of low-level mechanisms like locks and barriers.
Siek Konrad, Wojciechowski Paweł T.
doaj +1 more source
This paper will appear in "Operating Systems Engineering," M. Maekawa, ed., Springer-Verlag, 1982. This paper is a revised version of one published in Research Directions in Software Technology · , P. Wegner, editor. This research was supported by t~ National Science Foundation under grant DCR7 5-04060 and by the Advanced Research Projects Agency of ...
Bryant, Randal E., Dennis, Jack B.
openaire +2 more sources
Safe Concurrency Introduction through Slicing [PDF]
Traditional refactoring is about modifying the structure of existing code without changing its behaviour, but with the aim of making code easier to understand, modify, or reuse.
Bozó I. +4 more
core +2 more sources
The Unfolding: Origins, Techniques, and Applications within Discrete Event Systems
This article aims to provide a perspective on the foundations and developments of the net unfolding techniques and their applications to discrete event systems.
Younes Rouabah, Zhiwu Li
doaj +1 more source
Aspect-Oriented Programming (AOP) promises the modularization of so-called crosscutting functionalities in large applications. Currently, almost all approaches to AOP provide means for the description of sequential aspects that are to be applied to a sequential base program.
Douence, Rémi +3 more
openaire +3 more sources
A comparison of classical scheduling approaches in power-constrained block-test scheduling [PDF]
Classical scheduling approaches are applied here to overcome the problem of unequal-length block-test scheduling under power dissipation constraints. List scheduling-like approaches are proposed first as greedy algorithms to tackle the fore mentioned ...
Muresan, Valentin +3 more
core +1 more source

