Results 91 to 100 of about 76,576 (286)
Reinforcing Meltdown Attack by Using a Return Stack Buffer
Meltdown is a microarchitectural side-channel attack that extracts sensitive data in the kernel space of operating systems (OSs). Meltdown deliberately creates transient executions by exploiting an out-of-order execution technique and obtains the ...
Taehyun Kim, Youngjoo Shin
doaj +1 more source
Opacity: A Correctness Condition for Transactional Memory [PDF]
Transactional memory is perceived as an appealing alternative to critical sections for general purpose concurrent programming. Despite the large amount of recent work on transactional memory implementations, however, its actual specification has never ...
Guerraoui, Rachid, Kapalka, Michal
core
ABSTRACT This article investigates the application of Sanford Meisner's pedagogical methodology for actors in the professional training of psychotherapists and counselors, with a specific focus on the role of repetition exercises within Meisner's system and their potential to enhance the competencies of gestalt therapists, psychotherapists, and ...
Tomáš Andrášik +1 more
wiley +1 more source
Energy Efficiency of Software Transactional Memory in a Heterogeneous Architecture [PDF]
Hardware vendors make an important effort creating low-power CPUs that keep battery duration and durability above acceptable levels. In order to achieve this goal and provide good performance-energy for a wide variety of applications, ARM designed the ...
Asenjo-Plaza, Rafael +5 more
core
The Bazaar as a Model for Knowledge Work
ABSTRACT This paper presents fieldwork that extends existing metaphors of knowledge work as a process shaped by hierarchical or market forces. A qualitative, ethnographic study of six knowledge‐intensive businesses in two countries identifies striking parallels with the Middle Eastern bazaar in contrast to Western impersonal markets and hierarchies. We
Reed Elliot Nelson +2 more
wiley +1 more source
A highly efficient multi-core algorithm for clustering extremely large datasets
Background In recent years, the demand for computational power in computational biology has increased due to rapidly growing data sets from microarray and other high-throughput technologies. This demand is likely to increase.
Kraus Johann M, Kestler Hans A
doaj +1 more source
The Rise of Human–Computer Integration in Marketing: A Theory Synthesis
ABSTRACT Human–computer integration (HCInt) technologies, which merge human bodily, cognitive, and sensory functions with computational processes, are reshaping the foundations of consumer experience. Unlike traditional human–computer interaction, HCInt entails adaptive and reciprocal coupling through AI‐driven augmentation, wearables, muscle–computer ...
Carlos Velasco +5 more
wiley +1 more source
Compact Representation of Association Rule With Sequential Item Mapping Rendering Approach
Association rule mining are widely used to uncover meaningful insights from real-world datasets. However, the complex nature of transactional data, especially when identifying frequent item patterns, poses significant challenges.
Puripat Thongkam +1 more
doaj +1 more source
Towards a Software Transactional Memory for heterogeneous CPU-GPU processors [PDF]
The heterogeneous Accelerated Processing Units (APUs) integrate a multi-core CPU and a GPU within the same chip. Modern APUs provide the programmer with platform atomics, used to communicate the CPU cores with the GPU using simple atomic datatypes ...
Asenjo-Plaza, Rafael +3 more
core
ABSTRACT Although some studies focus on how bureaucrats' interactions with one another affect performance, they rarely focus on why these public servants collaborate. Bureaucrats' collaboration matters because it can significantly contribute to achieving policy goals.
Nathalie Mendez
wiley +1 more source

