Results 31 to 40 of about 5,282,744 (302)
Book Review: Free Culture: How Big Media Uses Technology and the Law to Lock Down Culture and Control ...
Karen Coyle
doaj +1 more source
Decoupling lock-free data structures from memory reclamation for static analysis [PDF]
Verification of concurrent data structures is one of the most challenging tasks in software verification. The topic has received considerable attention over the course of the last decade.
R. Meyer, Sebastian Wolff
semanticscholar +1 more source
Decentralized lock-free distributed queue in MPI remote memory access model [PDF]
In parallel programming for distributed-memory systems in MPI standard, remote memory access model (also known as one-sided communications, MPI RMA or RMA) is used along with the messagepassing.
Paznikov Alexey A. +2 more
doaj +1 more source
Objective: to study the procedure of exiting the contract, its costs and benefits. Methods: statistical method, comparative analysis. Results: free exit from contract is one of the most powerful tools for the consumer rights protection.
O. .. Bar-Gill, O. .. Ben-Shahar
doaj +1 more source
An alternative to cylinder drums for entering supplies and maintaining germ-free rodent isolators
Summary: The cost of supply cylinders can be expensive for smaller gnotobiotic facilities on strict budgets. Here, we present an alternative approach to enter supplies into germ-free isolators that does not require large cylinder drums (supply cylinders).
Samay Trec +2 more
doaj +1 more source
The past few years have marked the start of a historic transition from sequential to parallel computation.The necessity to write parallel programs is increasing as systems are getting more complex while processor speed increases are slowing down.
VENKATAKASH RAJ RAOJILLELAMUDI +3 more
openaire +1 more source
Hyaline: Fast and Transparent Lock-Free Memory Reclamation
We present a new lock-free safe memory reclamation algorithm, Hyaline, which is fast, scalable, and transparent to the underlying data structures. Hyaline easily handles virtually unbounded number of threads that can be created and deleted dynamically ...
R. Nikolaev, B. Ravindran
semanticscholar +1 more source
Effectiveness of Thread-Safe Queues on Devices with an Asymmetric Set of Cores
In the article we studied the dependence of the throughput of thread-safe queues on the number of push and pop threads at various loads for each element.
Mikhail Molotkov
doaj +1 more source
Field-frequency lock approach for 21.3-MHz high-performance NMR relaxation analyzer
Low-field NMR (LF-NMR) relaxation analyzers have been more and more widely used in food science, biomedicine, and petroleum exploration in recent years.
Shanshan Chen +3 more
doaj +1 more source
Lock-Free Bucketized Cuckoo Hashing
AbstractConcurrent hash tables are one of the fundamental building blocks for cloud computing. In this paper, we introduce lock-free modifications to in-memory bucketized cuckoo hashing. We present a novel concurrent strategy in designing a lock-free hash table, called LFBCH, that paves the way towards scalability and high space efficiency. To the best
Wenhai Li +4 more
openaire +1 more source

