نتایج جستجو برای: dimensional lock

تعداد نتایج: 412479  

2003
Michael P. Haustein Theo Härder

Storing, querying, and updating XML documents in multi-user environments requires data processing guarded by a transactional context to assure the well-known ACID properties, particularly with regard to isolate concurrent transactions. In this paper, we introduce the taDOM tree, an extended data model which allows finegrained lock acquisition for XML documents. For this reason, we design a tail...

Journal: :International Journal of Recent Technology and Applied Science 2021

Internet of Things (IoT) has become a phenomenon in many researchers. A smart digital automated system based on IoT plays major role which helps reducing human work by applying interaction technology daily life. This research introduces the Smart Door Lock where smartphone uses Wireless Fidelity (Wi-Fi) to activate door lock. By using Android software, will automatically lock within specific ra...

Journal: :Antimicrobial Agents and Chemotherapy 2012

Journal: :International Journal of Shipping and Transport Logistics 2014

Journal: :The Lancet 1891

Journal: :Undergraduate Journal of Mathematical Modeling: One + Two 2013

Journal: :The Musical Times and Singing Class Circular 1880

1999
Cormac Flanagan Martín Abadi

A race condition is a situation where two threads manipulate a data structure simultaneously, without synchronization. Race conditions are common errors in multithreaded programming. They often lead to unintended nondeterminism and wrong results. Moreover, they are notoriously hard to diagnose, and attempts to eliminate them can introduce deadlocks. In practice, race conditions and deadlocks ar...

2004
Tahir Azim

The concept of Grid computing has been in the making since the 1960’s, but it took quite some time up to the late 1990’s, with the advent of faster networks and better understanding of distributed computing, that some of those concepts were realized. Even now, the world’s computer networks are very primitive as compared to other networks, such as the electrical power grid, the telephone network...

2012
Harinandan Tunga Soumen Mukherjee

The paper aims at creating an authentication algorithm using visual cryptography that creates a fool-proof lock-key mechanism wherein a lock can be opened by its paired key only and the key cannot be duplicated. In our proposed mechanism we uses a lock and a key, both is one part of given secret image. Every lock-key pair has one associated unique image. The lock is just like a safe door which ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید