Results 71 to 80 of about 126,641 (259)
Snapshots and software transactional memory
AbstractOne way that software transactional memory implementations attempt to reduce synchronization conflicts among transactions is by supporting different kinds of access modes. One such implementation, Dynamic Software Transactional Memory (DSTM), supports three kinds of memory access: WRITE access, which allows an object to be observed and modified,
Cole, Christopher, Herlihy, Maurice
openaire +1 more source
Modeling software transactional memory with AnyLogic [PDF]
A flexible simulation model is presented to study different variants of software transactional memory (STM), like pessimistic STM or optimistic STM either with inplace memory updates or write buffering. The dynamic behavior of transactions is encoded in timed statecharts as provided by the simulation tool AnyLogic in its implementation of real-time ...
Armin Heindl, Gilles Pokam
openaire +1 more source
Motive and Opportunity: Order Choice in a Limit Order Book With Dispersed Information
ABSTRACT We test predictions of market microstructure theory relating to the determinants of order choice in a limit order book where information is dispersed among traders. Using an experimental limit order book, with a large state space, we find that informed traders exhibit patience, compatible with the ‘waiting game’ behaviour described in Foster ...
James Steeley +2 more
wiley +1 more source
The Rise of Human–Computer Integration in Marketing: A Theory Synthesis
ABSTRACT Human–computer integration (HCInt) technologies, which merge human bodily, cognitive, and sensory functions with computational processes, are reshaping the foundations of consumer experience. Unlike traditional human–computer interaction, HCInt entails adaptive and reciprocal coupling through AI‐driven augmentation, wearables, muscle–computer ...
Carlos Velasco +5 more
wiley +1 more source
Locality-Adaptive Parallel Hash Joins Using Hardware Transactional Memory [PDF]
Previous work [1] has claimed that the best performing implementation of in-memory hash joins is based on (radix-)partitioning of the build-side input.
Madden, S, Pirk, H, Shanbhag, A
core +1 more source
Key Findings: An assimilation methodology is established for the Tomorrow.io microwave sounder (TMS) flying on CubeSats in sun‐synchronous and inclined orbits, and in all cloud scenes. The TMS has a significant impact on weather forecast lead times up to 3 days in the Tropics in a research‐quality numerical weather prediction setting, and yields water ...
Jonathan J. Guerrette +3 more
wiley +1 more source
A simple deterministic algorithm for guaranteeing the forward progress of transactions [PDF]
This paper describes a remarkably simple deterministic (not probabilistic) contention-management algorithm for guaranteeing the forward progress of transactions - avoiding deadlocks, livelocks, and other anomalies.
Leiserson, Charles E
core +1 more source
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong +13 more
wiley +1 more source
Hardware transactional memory with software-defined conflicts [PDF]
In this paper we propose conflict-defined blocks, a programming language construct that allows programmers to change the concept of conflict from one transaction to another, or even throughout the course of the same transaction.
Acacio, Manuel E. +7 more
core
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha +9 more
wiley +1 more source

