Results 251 to 260 of about 283,894 (302)
Some of the next articles are maybe not open access.

iNethi: locked down but not locked out

XRDS: Crossroads, The ACM Magazine for Students, 2020
A community-driven network seeks to overcome the digital divide in South African education by delivering e-learning to bandwidth-constrained learners.
André van Zyl, David Lloyd Johnson
openaire   +1 more source

What to Lock?

Proceedings of the Great Lakes Symposium on VLSI 2017, 2017
Logic locking is an intellectual property (IP) protection technique that prevents IP piracy, reverse engineering and overbuilding attacks by the untrusted foundry or end-users. Existing logic locking techniques are all based on locking the functionality; the design/chip is nonfunctional unless the secret key has been loaded.
Muhammad Yasin   +5 more
openaire   +1 more source

Serializability by Locking

Journal of the ACM, 1984
The power of locking as a primitive for controlling concurrency in database systems is examined. It is accepted that the concurrent execution (or schedule) of different transactions must be serializable; that is, it must behave like a serial schedule, one in which the transactions run one at a time.
openaire   +1 more source

Precision locks

Proceedings of the 1981 ACM SIGMOD international conference on Management of data - SIGMOD '81, 1981
This paper describes a new method for controlling data base concurrency, called precision locks (PL). The name is derived from the fact that they lock precisely the set of tuples required to guarantee data base consistency, phantoms included. This results in maximum concurrency among all tuple-level locking methods, including predicate locks.
J. R. Jordan, J. Banerjee, R. B. Batman
openaire   +1 more source

Altruistic locking

ACM Transactions on Database Systems, 1994
Long-lived transactions (LLTs) hold on to database resources for relatively long periods of time, significantly delaying the completion of shorter and more common transactions. To alleviate this problem we propose an extension to two-phase locking, called altruistic locking, whereby LLTs can release their locks early.
Kenneth Salem   +2 more
openaire   +1 more source

Lock Detection in Phase-Locked Loops

SIAM Journal on Applied Mathematics, 1992
The phase quadrature lock detector is used extensively to detect phase lock in phase-locked loops (PLLs). However, this lock detector's relationship to PLL closed-loop dynamics has never been established. A new theory is presented, which accomplishes this for a specified class of PLLs.
openaire   +2 more sources

Locke on measurement

Studies in History and Philosophy of Science Part A, 2016
Like many virtuosi in his day, the English philosopher John Locke maintained an active interest in metrology. Yet for Locke, this was no mere hobby: questions concerning measurement were also implicated in his ongoing philosophical project to develop an account of human understanding. This paper follows Locke's treatment of four problems of measurement
openaire   +2 more sources

Locks of love

Journal of PeriAnesthesia Nursing, 2000
Locks of Love is a nonprofit organization that provides custom hairpieces to financially disadvantaged children under age 18 across the United States who are suffering from long-term medical hair loss. This article will provide information to those readers who wish to cut their long hair and donate it to a needy child or to those who may simply be ...
openaire   +2 more sources

Lock-in Technique

2015
A lock-in amplifier measures a signal amplitude hidden in a noisy environment. An AC modulation is used to measure the signal in a very narrow frequency range. Using the lock-in technique the noise can be even much larger than the signal which can nevertheless be measured precisely.
openaire   +1 more source

Locked in care

Nursing Older People, 2007
It took a letter sent to a woman who had been dead for 27 years to unlock a life shut away for seven decades.
openaire   +3 more sources

Home - About - Disclaimer - Privacy