Results 21 to 30 of about 738,126 (291)
A Load-Buffer Semantics for Total Store Ordering [PDF]
We address the problem of verifying safety properties of concurrent programs running over the Total Store Order (TSO) memory model. Known decision procedures for this model are based on complex encodings of store buffers as lossy channels. These procedures assume that the number of processes is fixed.
arxiv +1 more source
Neural 3D Scene Compression via Model Compression [PDF]
Rendering 3D scenes requires access to arbitrary viewpoints from the scene. Storage of such a 3D scene can be done in two ways; (1) storing 2D images taken from the 3D scene that can reconstruct the scene back through interpolations, or (2) storing a representation of the 3D scene itself that already encodes views from all directions.
arxiv
Generation mechanism of cell assembly to store information about hand recognition [PDF]
A specific memory is stored in a cell assembly that is activated during fear learning in mice; however, research regarding cell assemblies associated with procedural and habit learning processes is lacking. In modeling studies, simulations of the learning process for hand regard, which is a type of procedural learning, resulted in the formation of cell
arxiv +1 more source
With the development of energy internet,it is necessary to lay the foundation for the integration of data between different energy departments,which can also adapt to the development trend of the internet.
GUO Lu+6 more
doaj +1 more source
Numerical and Experimental Location Detection of Through Defect in Homogenized Plates using Tomography of Surface Wave Method [PDF]
Using surface guided wave is one of the most reliable methods of structural health monitoring. Mostly the bulk wave is preferred for identification of internal defects, which is inefficient in localizing the surface cracks. In this paper the procedure of
Saeed Zohoori, saeed shakhesi
doaj +1 more source
Optimising Fine-Grained Access Control Policy Enforcement for Database Queries. A Model-Driven Approach [PDF]
Recently, we have proposed a model-driven approach for enforcing fine-grained access control (FGAC) policies when executing SQL queries. More concretely, we have defined a function SecQuery() that, given an FGAC policy S and a SQL select-statement q, generates a SQL stored-procedure SecQuery(S, q), such that: if a user u with role r is authorised ...
arxiv
A Sequential Procedure for Individual Identity Verification Using ECG
The electrocardiogram (ECG) is an emerging novel biometric for human identification. One challenge for the practical use of ECG as a biometric is minimizing the time needed to acquire user data.
John M. Irvine, Steven A. Israel
doaj +1 more source
Background: To assess the knowledge of obstetricians and expectant mothers towards UCB banking and their awareness regarding pros and cons of the process. Methods: Questionnaires from a previously published study were modified contextually and translated
Ayushi A Mistry+5 more
doaj +1 more source
LUDA: Boost LSM Key Value Store Compactions with GPUs [PDF]
Log-Structured-Merge (LSM) tree-based key value stores are facing critical challenges of fully leveraging the dramatic performance improvements of the underlying storage devices, which makes the compaction operations of LSM key value stores become CPU-bound, and slow compactions significantly degrade key value store performance.
arxiv
LHCPs are transported to the thylakoid membrane via the (cp)SRP pathway. This process involves a transit complex of (cp)SRP43, (cp)SRP54 and LHCP, which interacts with (cp)FtsY and Alb3 at the membrane. GTP hydrolysis by (cp)SRP54 and (cp)FtsY triggers complex dissociation.
Victor Zegarra+7 more
wiley +1 more source