Results 71 to 80 of about 126,641 (259)

Snapshots and software transactional memory

open access: yesScience of Computer Programming, 2005
AbstractOne way that software transactional memory implementations attempt to reduce synchronization conflicts among transactions is by supporting different kinds of access modes. One such implementation, Dynamic Software Transactional Memory (DSTM), supports three kinds of memory access: WRITE access, which allows an object to be observed and modified,
Cole, Christopher, Herlihy, Maurice
openaire   +1 more source

Modeling software transactional memory with AnyLogic [PDF]

open access: yesProceedings of the Second International ICST Conference on Simulation Tools and Techniques, 2009
A flexible simulation model is presented to study different variants of software transactional memory (STM), like pessimistic STM or optimistic STM either with inplace memory updates or write buffering. The dynamic behavior of transactions is encoded in timed statecharts as provided by the simulation tool AnyLogic in its implementation of real-time ...
Armin Heindl, Gilles Pokam
openaire   +1 more source

Motive and Opportunity: Order Choice in a Limit Order Book With Dispersed Information

open access: yesInternational Journal of Finance &Economics, EarlyView.
ABSTRACT We test predictions of market microstructure theory relating to the determinants of order choice in a limit order book where information is dispersed among traders. Using an experimental limit order book, with a large state space, we find that informed traders exhibit patience, compatible with the ‘waiting game’ behaviour described in Foster ...
James Steeley   +2 more
wiley   +1 more source

The Rise of Human–Computer Integration in Marketing: A Theory Synthesis

open access: yesPsychology &Marketing, EarlyView.
ABSTRACT Human–computer integration (HCInt) technologies, which merge human bodily, cognitive, and sensory functions with computational processes, are reshaping the foundations of consumer experience. Unlike traditional human–computer interaction, HCInt entails adaptive and reciprocal coupling through AI‐driven augmentation, wearables, muscle–computer ...
Carlos Velasco   +5 more
wiley   +1 more source

Locality-Adaptive Parallel Hash Joins Using Hardware Transactional Memory [PDF]

open access: yes, 2016
Previous work [1] has claimed that the best performing implementation of in-memory hash joins is based on (radix-)partitioning of the build-side input.
Madden, S, Pirk, H, Shanbhag, A
core   +1 more source

All‐sky assimilation impacts of the Tomorrow.io microwave sounder constellation on global weather forecasts

open access: yesQuarterly Journal of the Royal Meteorological Society, EarlyView.
Key Findings: An assimilation methodology is established for the Tomorrow.io microwave sounder (TMS) flying on CubeSats in sun‐synchronous and inclined orbits, and in all cloud scenes. The TMS has a significant impact on weather forecast lead times up to 3 days in the Tropics in a research‐quality numerical weather prediction setting, and yields water ...
Jonathan J. Guerrette   +3 more
wiley   +1 more source

A simple deterministic algorithm for guaranteeing the forward progress of transactions [PDF]

open access: yes, 2018
This paper describes a remarkably simple deterministic (not probabilistic) contention-management algorithm for guaranteeing the forward progress of transactions - avoiding deadlocks, livelocks, and other anomalies.
Leiserson, Charles E
core   +1 more source

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, EarlyView.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

Hardware transactional memory with software-defined conflicts [PDF]

open access: yes, 2010
In this paper we propose conflict-defined blocks, a programming language construct that allows programmers to change the concept of conflict from one transaction to another, or even throughout the course of the same transaction.
Acacio, Manuel E.   +7 more
core  

Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy