نتایج جستجو برای: early abort technique
تعداد نتایج: 1270850 فیلتر نتایج به سال:
Impossible differential cryptanalysis, the extension of differential cryptanalysis, is one of the most efficient attacks against block ciphers. This cryptanalysis method has been applied to most of the block ciphers and has shown significant results. Using structures, key schedule considerations, early abort, and pre-computation are some common methods to reduce complexities of this attack. In ...
Making critical sections abortable is a promising approach to controlling priority inversions. To improve the schedulability of a system using abortions, the maximum number of abortions should be decreased. In this paper, we propose a real-time synchronization protocol named the selective abort protocol (SAP) which introduces a new abort scheme to the priority ceiling protocol. Our proposed sch...
JCilk extends the Java language to provide call-return semantics for multithreading, much as Cilk does for C. Java’s built-in thread model does not support the passing of exceptions or return values from one thread back to the “parent” thread that created it. JCilk imports Cilk’s fork-join primitives spawn and sync into Java to provide procedure-call semantics for concurrent subcomputations. Th...
95 THE CANADIAN HIGHWAY NETwork consists mainly of two-lane highways where passing slower cars requires traveling in the lane assigned to the opposite traffic. Therefore, studying the mechanism of the passing maneuver is important for maintaining traffic safety, as well enhancing the highway’s level of service. Models for passing maneuvers are available in the design guides1,2 while different v...
This paper presents Shadow, Piggy bag, Elemental External Dependency Inversion and in Time Yielding (SPEEDITY) commit protocol for distributed real time database systems (DRTDBS). Here, only abort dependent cohort having deadline greater than a specific value (Tshadow_creation_time) needs to forks off a replica of itself called a shadow, whenever it borrows dirty value of a data item. Commit-on...
The use of two-phase locking (2PL) to enforce serialization in today’s Software Transactional Memory (STM) systems leads to poor performance for programs with long-running transactions and considerable data sharing. We propose the use of ConflictSerializability (CS) instead of 2PL. The use of CS allows transactions to complete when they would have either stalled or aborted with 2PL, potentially...
Atomic commitment protocols are used to ensure the atomicity of atomic transactions. The best known and most widely used atomic commitment protocol is two phase commit (2PC). The main idea behind 2PC is to perform two rounds of voting under the guidance of a site acting as coordinator. The coordinator asks first for votes on whether to commit (yes vote) or abort (no vote) the transaction. The p...
The research stems from Decision Number 224 PK/PID.SUS/2018 which grants the application for judicial review (hereinafter abbreviated as PK) by a suspected narcotics abuser with novum (new evidence) in form of previous judges' decisions. In this case, study aims to conceptualize how regulation PK legal remedies criminal cases should be. This is normative research, approach used case approach, c...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید