نتایج جستجو برای: memory protocol
تعداد نتایج: 500200 فیلتر نتایج به سال:
Emerging system-area networks provide a variety of features that can dramatically reduce network communication overhead. Such features include reduced latency, protected remote memory access, cheap broadcast, and ordering guarantees. In this paper, we evaluate the impact of these features on the implementation of Software Distributed Shared Memory (SDSM), and on the Cashmere system in particula...
Modern network interconnects that leverage Remote Directory Memory Access (RDMA) and OS bypass, such as Infiniband [2], Myrinet [9], and iWARP over TCP [3], can offer significant performance advantages over conventional send/receive network semantics. However, the high performance of RDMA often comes with hidden costs. RDMA based interconnects generally fail to provide true one-sided semantics,...
background: recently different studies suggested that discontinuation of gonadotrophin releasing hormone analogue (gnrha) at beginning of ovarian stimulation (improvement of ovarian response to gonadotrophins) may have some benefit to poor responder patients in invitro fertilization (ivf) cycles. objective:the efficacy of gnrha stop protocol in poor responder patients in ivf cycles was assessed...
objective: this study was conducted to compare the results of fixed versus flexible gnrh antagonist protocols in controlled ovarian stimulation for intra cytoplasmic sperm injection (icsi) in patients with pcos. materials and methods: a randomized clinical trial was performed on 100 pcos women, who were admitted to a tertiary infertility clinic and were candidate for ivf/icsi. they were divided...
Recently, distributed shared memory systems have received much attention because such an abstraction simpliies programming. In this paper , we present a simple protocol which implements the linearizability consistency criterion in a distributed shared memory system. Unlike previously implemented protocols, our protocol is based on an optimistic approach. The protocol eliminates the necessity of...
SCADA systems play key roles in monitor and control of the critical infrastructures, the vulnerabilities existed in them may destroy the controlled critical infrastructures. This paper proposes an analysis method of memory access vulnerability in SCADA protocol implementation. Firstly, the memory taintedness model of SCADA protocol implementation is formally defined. Based on this model, the de...
In this paper, we propose a new, efficient logging protocol, called lazy logging, and a fast crash recovery protocol, called the prefetch-based crash recovery (PCR), for software distributed shared memory (SDSM). Our lazy logging protocol minimizes failure-free overhead by logging only data indispensable for correct recovery, while our PCR protocol reduces the recovery time by prefetching data ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید