Results 301 to 310 of about 163,748 (368)

Harmonic and Subharmonic RF Injection Locking of THz Metasurface Quantum-Cascade VECSEL. [PDF]

open access: yesACS Photonics
Wu Y   +5 more
europepmc   +1 more source

Utilizing Caenorhabditis Elegans as a Rapid and Precise Model for Assessing Amphetamine‐Type Stimulants: A Novel Approach to Evaluating New Psychoactive Substances Activity and Mechanisms

open access: yesAdvanced Science, EarlyView.
This study uses Caenorhabditis elegans to assess the activity of amphetamine‐type stimulants (ATS) and their analogs. The research highlights the roles of dopamine and serotonin pathways, distinguishes chiral forms of ATS, and identifies structure‐activity relationships. These findings provide a rapid and cost‐effective model for evaluating the effects
Yuanpeng Li   +3 more
wiley   +1 more source

Retiming dynamics of harmonically mode-locked laser solitons in a self-driven optomechanical lattice. [PDF]

open access: yesLight Sci Appl
Wang X   +8 more
europepmc   +1 more source

Multiplanar Semicircular New-Generation Implant System Developed for Proximal Femur Periprosthetic Fractures: A Biomechanical Study. [PDF]

open access: yesMedicina (Kaunas)
Satılmış AB   +7 more
europepmc   +1 more source

Semiconductor optical amplifier-based laser system for cold-atom sensors. [PDF]

open access: yesEPJ Quantum Technol
Kittlaus E   +7 more
europepmc   +1 more source

Spin-wave-mediated mutual synchronization and phase tuning in spin Hall nano-oscillators. [PDF]

open access: yesNat Phys
Kumar A   +7 more
europepmc   +1 more source

Engineering tunable fractional Shapiro steps in colloidal transport. [PDF]

open access: yesNat Commun
Stikuts AP   +4 more
europepmc   +1 more source

Controllable Two-Phase Locking Mechanisms

open access: yesControllable Two-Phase Locking Mechanisms
openaire  

Partitioned two-phase locking

ACM Transactions on Database Systems, 1986
In a large integrated database, there often exists an “information hierarchy,” where both raw data and derived data are stored and used together. Therefore, among update transactions, there will often be some that perform only read accesses from a certain (i.e., the “raw” data) portion of the database and write into another (i.e., the “derived” data ...
Meichun Hsu, Arvola Chan
openaire   +2 more sources

Home - About - Disclaimer - Privacy