scispace - formally typeset
Search or ask a question

Answers from top 9 papers

More filters
Papers (9)Insight
Furthermore, the percentage of lock-waiting time can be reduced by up to 84%.
However, lock-in fit to endanger future people could be slowed or stopped through targeted governance.
Open accessProceedings ArticleDOI
28 Oct 2017
118 Citations
The processor lock seems a reasonable solution against such a powerful hardware attacker; however, if a software attacker has a way to trigger integrity violation, the lock could result in a severe denial-of-service (DoS) attack.
Proceedings ArticleDOI
A. Devulapalli, P. Wyckoff 
14 Jun 2005
27 Citations
In this paper, we demonstrate a novel way of delegating the lock management to the participating lock-requesting nodes, using advanced network primitives such as remote direct memory access (RDMA) and atomic operations.
This paper provides a low-cost solution that uses semi-automated trusted software publisher whitelisting to make it theoretically impossible for current-day malware to execute directly on Windows 10 and Windows Server 2016 systems.
We propose a new lock mechanism to handle this problem.
Open accessBook ChapterDOI
Hui Gao, Wim H. Hesselink 
13 Jul 2004
19 Citations
Lock-free algorithms can do without locking mechanisms, and are therefore desirable.
Open accessProceedings ArticleDOI
15 Jun 2009
21 Citations
We concentrate on lock-freedom and propose a variant of it denoted bounded lock-freedom, which is more suitable for guaranteeing progress in practical systems.
Open accessProceedings ArticleDOI
15 Jun 2009
21 Citations
We propose a means to argue that an underlying system supports lock-freedom.

See what other people are reading

What are the most common vulnerabilities discovered during compliance testing across different organizations and industries?
5 answers
What is major problems of plant height of bell?
5 answers
What is homogenization of tourist attraction??
5 answers
How does block scheduling?
5 answers
What is homogenization of tourist attraction??
5 answers
What are the computational complexities of calculating the Cheeger constant for different types of graphs?
5 answers
Calculating the Cheeger constant for various graphs involves different computational complexities. For finite graphs with edge weights from a real-closed ordered field, estimating the dual Cheeger constant and the largest eigenvalue for the Laplace operator can be done in terms of the number of vertices, showcasing the sharpness of the estimates. In geometric graphs with random points in a domain, the Cheeger constant converges for large n to a domain's Cheeger-type constant under specific conditions, with prior work focusing on dimensions d ≥ 3 and additional requirements for d = 2. Additionally, for large d-regular graphs and closed hyperbolic surfaces of significant genus, the Cheeger constant is bounded, showing distinct values compared to specific reference structures like the d-regular tree or the hyperbolic plane.
How do different modelling techniques compare in terms of safety and reliability for autonomous driving cars?
5 answers
Different modelling techniques for autonomous driving cars vary in their safety and reliability implications. Model-based testing frameworks utilizing semantic trees and 3D test tables offer a structured approach to simulate driving scenarios efficiently. Image processing models incorporating LiDAR and Non-LiDAR technologies, along with supervised learning, enhance the vehicle's awareness of its surroundings. Simulation platforms like CarSim, CarMaker, and AirSim play a crucial role in testing automated driving systems, each with its advantages and limitations in scenario creation and sensor support. Formal verification methods, such as model checking with NuSMV and Stateflow in MATLAB/SIMULINK, ensure safety critical features are not compromised by verifying system requirements through finite state machine models. These diverse techniques collectively contribute to enhancing the safety and reliability of autonomous driving cars.
How do CRMs assist in delivering programs to a wider audience and enhancing data management?
5 answers
CRMs, such as Cremophor EL (CRM), play a crucial role in enhancing data management and expanding program delivery reach. CRMs like CRM, Triton X-100, and Tween-80 modify lipoproteins, affecting their mobility and density. In a similar vein, cognitive radios (CRs) utilize efficient medium access control mechanisms to dynamically allocate spectrum, enhancing network throughput and reducing power consumption. Moreover, process management tools aid in visualizing data flow, identifying bottlenecks, and fostering collaborative solutions, as seen in civil registration and vital statistics systems. Additionally, the Community Radiative Transfer Model (CRTM) provides accurate satellite simulations and Jacobian outputs, improving weather predictions and data analysis. By leveraging CRMs, CRs, and process management tools, organizations can streamline data processes, optimize resource allocation, and effectively deliver programs to a broader audience.
Does the environmental concerns impact the decision makers un the EU regarding the GM crops?
5 answers
Environmental concerns do impact decision-makers in the EU regarding GM crops. The European Commission emphasizes the need for a high level of protection for human health and the environment when using new genomic techniques. Despite increasing societal acceptance of GMOs in the EU, concerns about GMOs in the environment have decreased over the years. The spread of genetically modified organisms (GMOs) once cultivated poses a challenge, urging Member States to carefully consider whether and how to restrict GM crops to maintain agrobiodiversity and agri-sustainability. The EU's decision-making process on authorizing GM crops is influenced by societal concerns about GMO risks, leading to a dilemma that requires a balance between individual freedom and public safety. Ultimately, environmental concerns play a significant role in shaping the decision-making landscape surrounding GM crops in the EU.
What is the Arctic?
4 answers
The Arctic is a unique region characterized by extreme climatic conditions, sparse population, and rich resources. It spans the Arctic Ocean and surrounding landmasses of Europe, Asia, and North America, attracting strategic interest due to its potential as an air route and waterway. The area is known for phenomena like polar day and polar night, magnetic storms, and extreme temperatures, making it a testing ground for human missions in harsh conditions. The Arctic's mineral resources have led to regional and global struggles, positioning it significantly in International Relations. The Arctic Ocean, bordered by five coastal states, has become a focal point for global attention, with concerns about resource-driven competition and geopolitical confrontation.
What is defintition of effect?
5 answers
The concept of "effect" can be understood in various contexts. In effect algebras, effects are defined as self-adjoint operators on a Hilbert space that model unsharp measurements, with specific algebraic properties such as uniqueness and partial order. In the realm of IT systems, effect specifications focus on the intended outcomes of using the system rather than detailed interactions, facilitating communication and cooperation among users, configurators, and developers. Affect theory explores the forces that motivate entities into relational existence, emphasizing the dynamic and diverse nature of affect as a concept that shapes bodies and worlds. In a management device scenario, an effect analyzing program assesses the impact of tasks on users based on resource and user information, aiding operators in efficiently determining user effects during operations. A denotational semantics approach in programming languages uses abstract effect systems to validate program equivalences and transformations, emphasizing the importance of effect annotations and refined types in capturing side-effects and enabling parallel composition.