نتایج جستجو برای: dimensional lock

تعداد نتایج: 412479  

Journal: :Infection control and hospital epidemiology 2010
Philip M Polgreen Susan E Beekmann Daniel J Diekema Robert J Sherertz

We surveyed infectious diseases physicians to determine their practice patterns with regard to both antimicrobial lock prophylaxis and antimicrobial lock therapy. Antimicrobial lock prophylaxis is relatively uncommon; only 19% of infectious diseases physicians reported using it at least once. Although antimicrobial lock therapy is more commonly used, we found a significant variation in practice...

2013
Stefan Kempf Ronald Veldema Michael Philippsen

An atomic block is a language construct that simplifies the programming of critical sections. In the past, software transactional memory (STM) and lock inference have been used to implement atomic blocks. Both approaches have strengths and weaknesses. STM provides fine-grained locking but has high overheads due to logging and potential rollbacks. Lock inference is a static analysis that compute...

2010
Nick Steklov Nam Chao Sudesh Srivastav

Micromotion has long been associated with wear of polyethylene tibial inserts, potentially causing failure of unicompartmental knee replacement systems. One cause of micromotion is the locking mechanism between the undersurface of the polyethylene and the tibial tray. The objective of this study was to investigate the use of new novel lock designs for reducing the micromotion associated with a ...

2004
Bin Zhang Hongjun Wu Dengguo Feng Feng Bao

In this paper we break a knapsack based two-lock cryptosystem proposed at ICICS’03 [7]. The two-lock cryptosystem is a commutative encryption algorithm that is very useful for the construction of the general t-out-of-n oblivious transfers and millionaire protocol. However, our analysis shows that the proposed knapsack based two-lock cryptosystem is extremely insecure. The serious flaw is that t...

2014
Yehuda Afek Alexander Matveev Nir Shavit

Hardware lock elision (HLE) concurrently executes lock critical sections as hardware transactions, but fallbacks to the original sequential lock fallback path when some hardware transaction fails. Recent software-assisted lock-removal based schemes provide a better concurrency by sacrificing safety (opacity). Hardware transactions can execute at the same time with the lock fallback path as long...

2016
Dave Dice Tim Harris

In this short paper we show that hardware-based transactional lock elision can provide benefit by reducing the incidence of lock holder preemption, decreasing lock hold times and promoting improved scalability.

1988

openshapedoor within door { booleanopen int size point hinge , lock line door open = true size = 200 hinge = \NW + {10, 0} lock = if open then hinge-{0, size} else hinge+{size, 0} door = [hinge,lock] } width = 800 length = 800 centre = {500, 500} .

2013

The objective of the thesis is to address the problem of clock skew between two different clock domains in modern day microprocessors due to the process, voltage and temperature (PVT) variations. In order to mitigate the misalignment of the clocks in the different clock domains, a delay line is added in all but the reference clock domain. These delay lines add or subtract the delay (as necessar...

1992
C. Mohan Inderpal Narang

This paper describes a technique for use when multiple instances of a data base management system (DBMS), each with its own cache (buffer pool), can directly read and modify any data stored on a set of shared disks. Global locking and coherency control protocols are necessary in this context for assuring transaction consistency and for maintaining coherency of the data cached in the multiple ca...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید