نتایج جستجو برای: receive buffer blocking

تعداد نتایج: 182806  

2015
J. Haruyama I. Kawano T. Iwata T. Nishibori Y. Yamamoto M. Otsuki M. Sakurai K. Shimada

Introduction: In 2009, deep-hole structures were discovered in the Moon’s Marius Hills (Fig.1), Mare Tranquillitatis, and Mare Ingenii in the images acquired by the SELENE cameras aboard Japan’s Selenological and Engineering Explorer (SELENE, nicknamed KAGUYA). They were very similar to several pits on Mars that were discovered in 2007 and reported as possible “skylights” opened on subsurface v...

2013
C. Thomas Vangsness Jack Farr Joel Boyd David T. Dellaero C. Randal Michelle LeRoux - Williams

Investigation performed at the University of Southern California Orthopaedic Surgery Associates, Keck School of Medicine, Los Angeles, California, Unlimited Research, San Antonio, Texas, Triangle Orthopaedic Associates, Durham, North Carolina, Orthopaedic Center of Vero Beach, Vero Beach, Florida, OrthoIndy, Indianapolis, Indiana, TRIA Orthopaedic Center, Bloomington Minnesota, and Greater Ches...

Journal: :Violence and victims 2006
Sarah K Spilman

This study examines how parents of family and nonfamily abducted children cope with stress due to the disappearance of their child. The results show that all parents experience distress, regardless of whether it was a family or nonfamily abduction. Associated with parental distress are factors such as prior family stress, age of the child, recovery status of the child, and measures of social su...

2010
Thomas B. Jablin Yun Zhang James A. Jablin Jialu Huang Hanjun Kim David I. August

Core-to-core communication bandwidth is critical for high-performance pipeline-parallel programs. Hardware communication queues are unlikely to be implemented and are perhaps unnecessary. This paper presents Liberty Queues, a high-performance lock-free software-only ring buffer, and describes the porting effort from the original x86-64 implementation to IA-64. Liberty Queues achieve a bandwidth...

2006
Robert Niewiadomski José Nelson Amaral

Research on the performance of implicit k-heaps has shown that aligning data with cache lines and increasing heap arity are effective techniques for improving the data reference locality of heap operations. The technique of tree blocking has long been used to enhance the data reference locality of tree-based search methods. In this paper we propose c-clustered tree blocking, a new tree blocking...

Journal: :caspian journal of enviromental sciences 0
al. et o. rafieyan*1, a. a. darvishsefat2, s. babaii1, a. mataji1 m. saeed sabaee

in the past 25 years, rising of the caspian sea level, part of a natural treat to the sea, has inundated and destroyed many buildings and arable lands and threatened many inhabitations in coastal areas. the main reason for these damages is that the law-setback has lost its efficiency and human activities have proceeded seaward. the goal of this study is to introduce a proper setback line for th...

2007
Naoyuki Karasawa Kyoko Yamori Kenji Donkai Yoshiaki Tanaka

In ad hoc networks, relay nodes use their limited resources such as battery capacity, CPU, buffer, etc. to support other nodes' communications. This discourages users from joining an ad hoc network and becoming a relay node. Receiving a reward for supporting relay may encourage users to join such networks. This research focuses on the factors of residual battery power, and time during which AC ...

Journal: :BMC Veterinary Research 2021

Abstract Background Klebsiella pneumonia , a Gram-negative bacterium belonging to the genus Enterobacter causes many human and livestock diseases. Notably, infected goats may develop pneumonia, septicemia, which can lead occasional death, resulting in great economic losses goat-farming industry. However, there are little systematic methods for detection of goat pneumoniae production. Results In...

Journal: :Computer Communications 2007
Wenji Wu Matt Crawford Mark Bowden

The computing models for HEP experiments are becoming ever more globally distributed and grid-based, both for technical reasons (e.g., to place computational and data resources near each other and the demand) and for strategic reasons (e.g., to leverage technology investments). To support such computing models, the network and end systems (computing and storage) face unprecedented challenges. O...

1992
H. Jonathan Chao Donald E. Smith

In order to take advantage of the low entry cost of the future public ATM (asynchronous transfer mode) network with shared facilities, it is highly desirable to interconnect different hosts and local area networks (LANs) to the ATM network. The interface between the computer hosts or LANs and the ATM network, commonly called a broadband terminal adaptor (BTA), provides the necessary format conv...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید