Results 21 to 30 of about 15,372,779 (340)

Research on Edge-Computing-Based High Concurrency and Availability “Cloud, Edge, and End Collaboration” Substation Operation Support System and Applications

open access: yesEnergies, 2023
With the continuous promotion of digital transformation in the field of power transformation, the diversification of application scenarios, and the scale of pilot construction, the real-time, concurrency, and security requirements for data fusion and ...
Yun Long, Yude Bao, Linjun Zeng
doaj   +1 more source

Controlled Owicki-Gries Concurrency: Reasoning about the Preemptible eChronos Embedded Operating System [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2015
We introduce a controlled concurrency framework, derived from the Owicki-Gries method, for describing a hardware interface in detail sufficient to support the modelling and verification of small, embedded operating systems (OS's) whose run-time ...
June Andronick   +2 more
doaj   +1 more source

PyCSP - controlled concurrency [PDF]

open access: yesInternational Journal of Information Processing and Management, 2010
Producing readable and correct programs while at the same time taking advantage of multi-core architectures is a challenge. PyCSP is an implementation of Communicating Sequential Processes algebra (CSP) for the Python programming language, taking advantage of CSP’s formal and verifiable approach to controlling concurrency and the readability of Python ...
John Markus Bjrndalen   +2 more
openaire   +3 more sources

Spanner's concurrency control [PDF]

open access: yesACM SIGACT News, 2013
The Spanner project reports that one can build practical large-scale systems that combine strong semantics with geo-distribution. In this review manuscript, we provide insight on how Spanner's concurrency control provides both read-only transactions which avoid locking data, and strong consistency.
Dahlia Malkhi, Jean-Philippe Martin
openaire   +2 more sources

Transactional concurrency control for intermittent, energy-harvesting computing systems

open access: yesACM-SIGPLAN Symposium on Programming Language Design and Implementation, 2019
Batteryless energy-harvesting devices are computing platforms that operate in environments where batteries are not viable for energy storage. Energy-harvesting devices operate intermittently, only as energy is available.
E. Ruppel, Brandon Lucia
semanticscholar   +1 more source

Sundial: Harmonizing Concurrency Control and Caching in a Distributed OLTP Database Management System

open access: yesProceedings of the VLDB Endowment, 2018
Distributed transactions suffer from poor performance due to two major limiting factors. First, distributed transactions suffer from high latency because each of their accesses to remote data incurs a long network delay.
Xiangyao Yu   +5 more
semanticscholar   +1 more source

The Logical Timestamp Skew Anomaly in Event-Replicated Transaction Schedulers

open access: yesIEEE Access, 2021
To sidestep reasoning about the complex effects of concurrent execution, many system designers have conveniently embraced strict serializability on the strength of its claims, support from commercial and open-source database communities and ubiquitous ...
Emil Koutanov
doaj   +1 more source

Concurrently controlled grammars [PDF]

open access: yesKybernetika, 2018
This paper introduces a new variant of Petri net controlled grammars, namely a concurrently controlled grammar, where the control over the application of the productions of a grammar is realized by a Petri net with different parallel firing strategies.
Mavlankulov, Gairatzhan   +5 more
openaire   +2 more sources

Discrete-Time Systems Modeling and Verification With Alvis Language and Tools

open access: yesIEEE Access, 2018
Alvis is a formal modeling language intended for developing systems consisting of concurrently operating units (real-time, embedded, and distributed systems).
Marcin Szpyrka   +3 more
doaj   +1 more source

A new secure 2PL real-time concurrency control algorithm (ES2PL)

open access: yesInternational Journal of Intelligent Networks, 2022
A secure concurrency control algorithms must be devoid of covert channels originating from data conflicts between transactions, in addition to ensuring database integrity.
Ebrahim Abduljalil   +4 more
doaj  

Home - About - Disclaimer - Privacy