نتایج جستجو برای: شارش lock exchange

تعداد نتایج: 203762  

Journal: :J. Sci. Comput. 2011
Luigi C. Berselli Paul F. Fischer Traian Iliescu Tamay M. Özgökmen

This paper presents analytical and numerical results for two new anisotropic modifications of the Rational and Clark-α LES models. The main difference from their standard form is that in this study horizontal (as opposed to isotropic) spatial filtering is used, which is appropriate for turbulent mixing in stratified flows. We present several mathematical results regarding the horizontal Rationa...

2016
Jiangang Jin

In the RFID system communication of Internet of things, the tag and the reader exchange data easy to collide, which makes the tag can be identified. Based on the study on the basis of binary arithmetic, by the collision process of the instruction set different status to lock collision bits, and these sample records locked position, then the paging process for sample collection the remaining col...

2001
Laurent Daynès Grzegorz Czajkowski

The paper studies the impact of several lock manager designs on the overhead imposed to a persistent programming language by automated object locking. Our study reveals that a lock management method based on lock state sharing outperforms more traditional lock management designs. Lock state sharing is a novel lock management method that represents all lock data structures with equal values with...

Journal: :Distributed Systems Engineering 1996
Eike Born

From a project on upgrading an existing commercially used operating system for support of a distributed system architecture, we present results and experience from a comprehensive analytical performance evaluation of a large number of different implementation strategies for distributed lock management. The various lock management policies we consider differ in the management of the lock databas...

2003
Dirk Krueger Harald Uhlig

This paper analyzes dynamic equilibrium risk sharing contracts between profit-maximizing intermediaries and a large pool of ex-ante identical agents that face idiosyncratic income uncertainty that makes them heterogeneous ex-post. In any given period, after having observed her income, the agent can walk away from the contract, while the intermediary cannot, i.e. there is one-sided commitment. W...

Journal: :The Lancet 1834

Journal: :ACM Transactions on Computer Systems 2019

Journal: :CLEI Electron. J. 2012
André L. Rossa Alvaro L. G. A. Coutinho

In this work we study coupled incompressible viscous flow and advective-diffusive transport of a scalar. Both the Navier-Stokes and transport equations are solved using an Eulerian approach. The SUPG/PSPG stabilized finite element formulation is applied for the governing equations. The implementation is held using the libMEsh finite element library which provides support for parallel adaptive m...

Journal: :CoRR 2013
Adamu Murtala Zungeru

The increasing rate of crime, attacks by thieves, intruders and vandals, despite all forms of security gadgets and locks still need the attention of researchers to find a permanent solution to the well being of lives and properties of individuals. To this end, we design a cheap and effective security system for buildings, cars, safes, doors and gates, so as to prevent unauthorized person from h...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید