Results 31 to 40 of about 5,282,744 (302)

Book Review: Free Culture: How Big Media Uses Technology and the Law to Lock Down Culture and Control Creativity

open access: yesInformation Technology and Libraries, 2017
Book Review: Free Culture: How Big Media Uses Technology and the Law to Lock Down Culture and Control ...
Karen Coyle
doaj   +1 more source

Decoupling lock-free data structures from memory reclamation for static analysis [PDF]

open access: yesProc. ACM Program. Lang., 2018
Verification of concurrent data structures is one of the most challenging tasks in software verification. The topic has received considerable attention over the course of the last decade.
R. Meyer, Sebastian Wolff
semanticscholar   +1 more source

Decentralized lock-free distributed queue in MPI remote memory access model [PDF]

open access: yesE3S Web of Conferences
In parallel programming for distributed-memory systems in MPI standard, remote memory access model (also known as one-sided communications, MPI RMA or RMA) is used along with the messagepassing.
Paznikov Alexey A.   +2 more
doaj   +1 more source

EXIT FROM CONTRACT

open access: yesRussian Journal of Economics and Law, 2016
Objective: to study the procedure of exiting the contract, its costs and benefits. Methods: statistical method, comparative analysis. Results: free exit from contract is one of the most powerful tools for the consumer rights protection.
O. .. Bar-Gill, O. .. Ben-Shahar
doaj   +1 more source

An alternative to cylinder drums for entering supplies and maintaining germ-free rodent isolators

open access: yesSTAR Protocols, 2022
Summary: The cost of supply cylinders can be expensive for smaller gnotobiotic facilities on strict budgets. Here, we present an alternative approach to enter supplies into germ-free isolators that does not require large cylinder drums (supply cylinders).
Samay Trec   +2 more
doaj   +1 more source

LOCK-FREE DINING PHILOSOPHER

open access: yesInternational Journal of Computer and Communication Technology, 2017
The past few years have marked the start of a historic transition from sequential to parallel computation.The necessity to write parallel programs is increasing as systems are getting more complex while processor speed increases are slowing down.
VENKATAKASH RAJ RAOJILLELAMUDI   +3 more
openaire   +1 more source

Hyaline: Fast and Transparent Lock-Free Memory Reclamation

open access: yesACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing, 2019
We present a new lock-free safe memory reclamation algorithm, Hyaline, which is fast, scalable, and transparent to the underlying data structures. Hyaline easily handles virtually unbounded number of threads that can be created and deleted dynamically ...
R. Nikolaev, B. Ravindran
semanticscholar   +1 more source

Effectiveness of Thread-Safe Queues on Devices with an Asymmetric Set of Cores

open access: yesСовременные информационные технологии и IT-образование
In the article we studied the dependence of the throughput of thread-safe queues on the number of push and pop threads at various loads for each element.
Mikhail Molotkov
doaj   +1 more source

Field-frequency lock approach for 21.3-MHz high-performance NMR relaxation analyzer

open access: yesAIP Advances, 2018
Low-field NMR (LF-NMR) relaxation analyzers have been more and more widely used in food science, biomedicine, and petroleum exploration in recent years.
Shanshan Chen   +3 more
doaj   +1 more source

Lock-Free Bucketized Cuckoo Hashing

open access: yes, 2023
AbstractConcurrent hash tables are one of the fundamental building blocks for cloud computing. In this paper, we introduce lock-free modifications to in-memory bucketized cuckoo hashing. We present a novel concurrent strategy in designing a lock-free hash table, called LFBCH, that paves the way towards scalability and high space efficiency. To the best
Wenhai Li   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy