Results 91 to 100 of about 76,576 (286)

Reinforcing Meltdown Attack by Using a Return Stack Buffer

open access: yesIEEE Access, 2019
Meltdown is a microarchitectural side-channel attack that extracts sensitive data in the kernel space of operating systems (OSs). Meltdown deliberately creates transient executions by exploiting an out-of-order execution technique and obtains the ...
Taehyun Kim, Youngjoo Shin
doaj   +1 more source

Opacity: A Correctness Condition for Transactional Memory [PDF]

open access: yes, 2007
Transactional memory is perceived as an appealing alternative to critical sections for general purpose concurrent programming. Despite the large amount of recent work on transactional memory implementations, however, its actual specification has never ...
Guerraoui, Rachid, Kapalka, Michal
core  

Meisner Repetition Exercises as a Tool for Deliberate Practice in Psychotherapy: A Gestalt Therapy Exploration

open access: yesThe Journal of Humanistic Counseling, EarlyView.
ABSTRACT This article investigates the application of Sanford Meisner's pedagogical methodology for actors in the professional training of psychotherapists and counselors, with a specific focus on the role of repetition exercises within Meisner's system and their potential to enhance the competencies of gestalt therapists, psychotherapists, and ...
Tomáš Andrášik   +1 more
wiley   +1 more source

Energy Efficiency of Software Transactional Memory in a Heterogeneous Architecture [PDF]

open access: yes, 2016
Hardware vendors make an important effort creating low-power CPUs that keep battery duration and durability above acceptable levels. In order to achieve this goal and provide good performance-energy for a wide variety of applications, ARM designed the ...
Asenjo-Plaza, Rafael   +5 more
core  

The Bazaar as a Model for Knowledge Work

open access: yesKnowledge and Process Management, EarlyView.
ABSTRACT This paper presents fieldwork that extends existing metaphors of knowledge work as a process shaped by hierarchical or market forces. A qualitative, ethnographic study of six knowledge‐intensive businesses in two countries identifies striking parallels with the Middle Eastern bazaar in contrast to Western impersonal markets and hierarchies. We
Reed Elliot Nelson   +2 more
wiley   +1 more source

A highly efficient multi-core algorithm for clustering extremely large datasets

open access: yesBMC Bioinformatics, 2010
Background In recent years, the demand for computational power in computational biology has increased due to rapidly growing data sets from microarray and other high-throughput technologies. This demand is likely to increase.
Kraus Johann M, Kestler Hans A
doaj   +1 more source

The Rise of Human–Computer Integration in Marketing: A Theory Synthesis

open access: yesPsychology &Marketing, EarlyView.
ABSTRACT Human–computer integration (HCInt) technologies, which merge human bodily, cognitive, and sensory functions with computational processes, are reshaping the foundations of consumer experience. Unlike traditional human–computer interaction, HCInt entails adaptive and reciprocal coupling through AI‐driven augmentation, wearables, muscle–computer ...
Carlos Velasco   +5 more
wiley   +1 more source

Compact Representation of Association Rule With Sequential Item Mapping Rendering Approach

open access: yesIEEE Access
Association rule mining are widely used to uncover meaningful insights from real-world datasets. However, the complex nature of transactional data, especially when identifying frequent item patterns, poses significant challenges.
Puripat Thongkam   +1 more
doaj   +1 more source

Towards a Software Transactional Memory for heterogeneous CPU-GPU processors [PDF]

open access: yes, 2017
The heterogeneous Accelerated Processing Units (APUs) integrate a multi-core CPU and a GPU within the same chip. Modern APUs provide the programmer with platform atomics, used to communicate the CPU cores with the GPU using simple atomic datatypes ...
Asenjo-Plaza, Rafael   +3 more
core  

Where Have I Seen You Before? Networks, Trust and Reciprocity as a Source of Collaboration in the Public Service

open access: yesPublic Administration and Development, EarlyView.
ABSTRACT Although some studies focus on how bureaucrats' interactions with one another affect performance, they rarely focus on why these public servants collaborate. Bureaucrats' collaboration matters because it can significantly contribute to achieving policy goals.
Nathalie Mendez
wiley   +1 more source

Home - About - Disclaimer - Privacy