نتایج جستجو برای: early abort technique

تعداد نتایج: 1270850  

Impossible differential cryptanalysis, the extension of differential cryptanalysis, is one of the most efficient attacks against block ciphers. This cryptanalysis method has been applied to most of the block ciphers and has shown significant results. Using structures, key schedule considerations, early abort, and pre-computation are some common methods to reduce complexities of this attack. In ...

1995
Hiroaki Takada Ken Sakamura

Making critical sections abortable is a promising approach to controlling priority inversions. To improve the schedulability of a system using abortions, the maximum number of abortions should be decreased. In this paper, we propose a real-time synchronization protocol named the selective abort protocol (SAP) which introduces a new abort scheme to the priority ceiling protocol. Our proposed sch...

2005
Bradley C. Kuszmaul Brian D. Carlstrom JaeWoong Chung Hassan Chafi Austen McDonald Chi Cao Minh Lance Hammond Christos Kozyrakis

JCilk extends the Java language to provide call-return semantics for multithreading, much as Cilk does for C. Java’s built-in thread model does not support the passing of exceptions or return values from one thread back to the “parent” thread that created it. JCilk imports Cilk’s fork-join primitives spawn and sync into Java to provide procedure-call semantics for concurrent subcomputations. Th...

1998
Yasser Hassan Said M Easa Speed

95 THE CANADIAN HIGHWAY NETwork consists mainly of two-lane highways where passing slower cars requires traveling in the lane assigned to the opposite traffic. Therefore, studying the mechanism of the passing maneuver is important for maintaining traffic safety, as well enhancing the highway’s level of service. Models for passing maneuvers are available in the design guides1,2 while different v...

2010
S. Agrawal Udai Shanker Abhay N. Singh A. Anand

This paper presents Shadow, Piggy bag, Elemental External Dependency Inversion and in Time Yielding (SPEEDITY) commit protocol for distributed real time database systems (DRTDBS). Here, only abort dependent cohort having deadline greater than a specific value (Tshadow_creation_time) needs to forks off a replica of itself called a shadow, whenever it borrows dirty value of a data item. Commit-on...

2008
Utku Aydonat Tarek S. Abdelrahman Edward S. Rogers

The use of two-phase locking (2PL) to enforce serialization in today’s Software Transactional Memory (STM) systems leads to poor performance for programs with long-running transactions and considerable data sharing. We propose the use of ConflictSerializability (CS) instead of 2PL. The use of CS allows transactions to complete when they would have either stalled or aborted with 2PL, potentially...

2001
R. Jiménez-Peris G. Alonso

Atomic commitment protocols are used to ensure the atomicity of atomic transactions. The best known and most widely used atomic commitment protocol is two phase commit (2PC). The main idea behind 2PC is to perform two rounds of voting under the guidance of a site acting as coordinator. The coordinator asks first for votes on whether to commit (yes vote) or abort (no vote) the transaction. The p...

Journal: :JILS (Journal of Indonesian Legal Studies) 2021

The research stems from Decision Number 224 PK/PID.SUS/2018 which grants the application for judicial review (hereinafter abbreviated as PK) by a suspected narcotics abuser with novum (new evidence) in form of previous judges' decisions. In this case, study aims to conceptualize how regulation PK legal remedies criminal cases should be. This is normative research, approach used case approach, c...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید