Results 61 to 70 of about 1,914,541 (354)
FASTM: a log-based hardware transactional memory with fast abort recovery [PDF]
Version management, one of the key design dimensions of Hardware Transactional Memory (HTM) systems, defines where and how transactional modifications are stored. Current HTM systems use either eager or lazy version management.
González Colás, Antonio María +2 more
core +1 more source
Permissiveness in Transactional Memories [PDF]
We introduce the notion of permissiveness in transactional memories (TM). Intuitively, a TM is permissive if it never aborts a transaction when it need not. More specifically, a TM is permissive with respect to a safety property pif the TM accepts every history that satisfies p.
Guerraoui R., Henzinger T.A., Singh V.
openaire +1 more source
Associating cognitive abilities with naturalistic search behavior
Abstract Differences in cognitive abilities affect search behaviors, but this has mostly been observed in laboratory experiments. There is limited research on how users search for information in real‐world, naturalistic settings and how real‐world search behaviors relate to cognitive abilities.
Tung Vuong +2 more
wiley +1 more source
An Efficient Spark-Based Hybrid Frequent Itemset Mining Algorithm for Big Data
Frequent itemset mining (FIM) is a common approach for discovering hidden frequent patterns from transactional databases used in prediction, association rules, classification, etc. Apriori is an FIM elementary algorithm with iterative nature used to find
Mohamed Reda Al-Bana +2 more
doaj +1 more source
The Transactional Conflict Problem
The transactional conflict problem arises in transactional systems whenever two or more concurrent transactions clash on a data item. While the standard solution to such conflicts is to immediately abort one of the transactions, some practical systems ...
Alistarh, Dan +3 more
core +1 more source
Transactional Tasks: Parallelism in Software Transactions (Artifact) [PDF]
Many programming languages support different concurrency models. In practice these models are often combined, however the semantics of the combinations are not always well-defined.
Swalens, Janwillem
core +1 more source
Sandboxing transactional memory [PDF]
Correct transactional memory systems (TMs) must address the possibility that a speculative transaction may read mutually inconsistent values from memory and then perform an operation that violates the underlying language semantics. TMs for managed languages can leverage type safety, just-in-time compilation, and fully monitored exceptions to sandbox ...
Luke Dalessandro, Michael L. Scott
openaire +1 more source
Abstract This research explored how young adults (ages 18–25) learn to use financial records and the roles financial records play in their experiences in coming to see themselves as financially mature social actors. The contribution of this paper is a revised model of transitions theory that includes personal information management (PIM) as an ...
Robert Douglas Ferguson +2 more
wiley +1 more source
Enhanced credit card fraud detection based on attention mechanism and LSTM deep model
As credit card becomes the most popular payment mode particularly in the online sector, the fraudulent activities using credit card payment technologies are rapidly increasing as a result.
Ibtissam Benchaji +3 more
doaj +1 more source
Communicating memory transactions [PDF]
Many concurrent programming models enable both transactional memory and message passing. For such models, researchers have built increasingly efficient implementations and defined reasonable correctness criteria, while it remains an open problem to obtain the best of both worlds.
Mohsen Lesani, Jens Palsberg
openaire +1 more source

