Results 71 to 80 of about 597,682 (300)
Lock cohorting: A general technique for designing NUMA locks [PDF]
Multicore machines are quickly shifting to NUMA and CC-NUMA architectures, making scalable NUMA-aware locking algorithms, ones that take into account the machines' non-uniform memory and caching hierarchy, ever more important.
Dice, David +2 more
core +2 more sources
Evolutionary analysis across 32 placental mammals identified positive selection at residues H148 and W149 in the immune receptor FcγR1. Ancestral reconstruction combined with molecular dynamics simulations reveals how these mutations may influence receptor structure and dynamics, providing insight into the evolution of antibody recognition and immune ...
David A. Young +7 more
wiley +1 more source
Research on Draft Control Optimization of Ship Passing a Lock Based on CFD Method
Waterborne transportation serves as a critical pillar of trunk-line freight systems, offering unparalleled advantages in transport capacity, energy efficiency, and cost-effectiveness. As cargo throughput demands escalate, optimizing lock capacity becomes
Yuan Zhuang +3 more
doaj +1 more source
Uncovering noisy social signals: Using optimization methods from experimental physics to study social phenomena. [PDF]
Due to the ubiquitous presence of treatment heterogeneity, measurement error, and contextual confounders, numerous social phenomena are hard to study. Precise control of treatment variables and possible confounders is often key to the success of studies ...
Maurits Kaptein +2 more
doaj +1 more source
Bitcoin private key locked transactions [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Sergi Delgado-Segura +3 more
openaire +4 more sources
ABSTRACT Objective Status epilepticus (SE) is associated with significant mortality. Sleep architecture may reflect normal brain function. Impaired sleep architecture is associated with poorer outcomes in numerous conditions. Here we investigate the association of sleep architecture in continuous EEG (cEEG) with survival in SE.
Ran R. Liu +5 more
wiley +1 more source
Key Generation for Hardware Obfuscation Using Strong PUFs
As a result of the increased use of contract foundries, intellectual property (IP) theft, excess production and reverse engineering are major concerns for the electronics and defense industries.
Md Shahed Enamul Quadir +1 more
doaj +1 more source
ABSTRACT Background Emerging evidence suggests that low‐frequency neural oscillations are dynamically regulated by consciousness levels, with the recovery of low cortical activity potentially serving as a neurophysiological substrate for conscious emergence. Targeted enhancement of these low‐frequency rhythms in patients with disorders of consciousness
Chuan Xu +10 more
wiley +1 more source
A Systematic Review and Meta‐Analysis of the Recurrence of Autoimmune Encephalitis
ABSTRACT Objective Autoimmune encephalitis (AE) is a disease with a potential for recurrence, and patients receive immunotherapy to prevent it. However, there is no consensus on the duration of immunotherapy. This study aimed to determine the recurrence rate and identify the risk factors for AE to provide guidance on the duration of immunotherapy ...
Shangkai Bai +5 more
wiley +1 more source
Recent challenges such as sustainable development and climate change suggest engineers to focus on societal issues. However, as this case study of structural design shows, professional arrangements within the construction field constrain engineers ...
Andrew Chilvers, Sarah Bell
doaj +1 more source

