Branding/Logomark Created with Sketch. minus Created with Sketch. arrow-point-to-down Created with Sketch. Citation Created with Sketch. Combined Shape Created with Sketch. Icon/Bookmark Created with Sketch. Icon/Bookmark-empty Created with Sketch. Icon/Copy Created with Sketch. 2AC24B92-E380-4A24-A7FB-E0AC4B6F468D Created with sketchtool. ADDA8D13-C2F5-4358-9B0E-1C359912CA41 Created with sketchtool. Icon/Collection Icon/Close Copy 7 Icon/List Created with Sketch.
Loading Scinapse...
1 page of 5,810 pages (58.1k results)
Sort by : Relevance
Did you mean local computer science ?
Ravi Rajwar27
Estimated H-index: 27
(University of Wisconsin-Madison),
James R. Goodman26
Estimated H-index: 26
(University of Wisconsin-Madison)
This paper is motivated by the difficulty in writing correct high-performance programs. Writing shared-memory multi-threaded programs imposes a complex trade-off between programming ease and performance, largely due to subtleties in coordinating access to shared data. To ensure correctness programmers often rely on conservative locking at the expense of performance. The resulting serialization of ...
Ref 42Cited 276 Download Pdf Cite this paper
Guang-Huei Chiou1
Estimated H-index: 1
(National Tsing Hua University),
Wen-Tsuen Chen28
Estimated H-index: 28
(National Tsing Hua University)
The authors discuss secure broadcasting, effected by means of a secure lock, on broadcast channels, such as satellite, radio, etc. This lock is implemented by using the Chinese Remainder theorem (CRT). The secure lock offers the following advantages: only one copy of the ciphertext is sent; the deciphering operation is efficient; and the number of secret keys held by each user is minimized. Protoc...
Ref 3Cited 246 Source Cite this paper
James C. Vaughan1
Estimated H-index: 1
A computer access system includes a password generator (10) and an lock computer (50) connected to receive passwords generated by the password generator and grant access to a host computer (52) when a password from the password generator (10) matches a password separately generated by the lock computer (50). The password generator (10) and the lock computer (50) have corresponding pseudo-random nu...
Ref 12Cited 107 Source
2016 in Progress in Brain Research [IF: 2.68]
Andrea Kübler66
Estimated H-index: 66
(University of Tübingen),
Nicola Neumann19
Estimated H-index: 19
(University of Tübingen)
Abstract Brain–computer interfaces (BCIs) are systems that allow us to translate in real-time the electrical activity of the brain in commands to control devices. They do not rely on muscular activity and can therefore provide communication and control for those who are severely paralyzed (locked-in) due to injury or disease. It has been shown that locked-in patients are able to achieve EEG-contro...
Ref 79Cited 69 Source Cite this paper
Petra Ahrweiler11
Estimated H-index: 11
(University of Hamburg),
G. Nigel Gilbert19
Estimated H-index: 19
(University of Surrey)
This chapter outlines the history of a growing research community: the “invisible college” (Mullins 1973) of scientists who work on computer simulations in Science and Technology Studies (STS). Their common interest enables at least two possible research areas which are only just emerging.
Cited 19 Download Pdf Cite this paper
James H. Anderson47
Estimated H-index: 47
(University of North Carolina at Chapel Hill),
Srikanth Ramamurthy15
Estimated H-index: 15
(University of North Carolina at Chapel Hill),
Kevin Jeffay31
Estimated H-index: 31
(University of North Carolina at Chapel Hill)
This article considers the use of lock-free shared objects within hard real-time systems. As the name suggests, lock-free shared objects are distinguished by the fact that they are accessed without locking. As such, they do not give rise to priority inversions, a key advantage over conventional, lock-based object-sharing approaches. Despite this advantage, it is not immediately apparent that lock-...
Ref 33Cited 118 Source Cite this paper
Pedro C. Diniz24
Estimated H-index: 24
("University of California, Santa Barbara"),
Martin C. Rinard53
Estimated H-index: 53
("University of California, Santa Barbara")
Atomic operations are a key primitive in parallel computing systems. The standard implementation mechanism for atomic operations uses mutual exclusion locks. In an object-based programming system the natural granularity is to give each object its own lock. Each operation can then make its execution atomic by acquiring and releasing the lock for the object that it accesses. But this fine lock granu...
Ref 11Cited 52 Download Pdf Cite this paper
O.S. Saydjari1
Estimated H-index: 1
,
J.M. Beckman1
Estimated H-index: 1
,
J.R. Leaman1
Estimated H-index: 1
The design principles of the logical coprocessing kernel (LOCK) project are considered. LOCK is an advanced development of hardware-based computer security and cryptographic service modules. Much of the design and some of the implementation specifications are complete. The formal top level specification (FTLS) also is complete and the advanced noninterference proofs are beginning. This hardware-ba...
Ref 18Cited 29 Source Cite this paper
Neil R. Storey1
Estimated H-index: 1
From the Publisher: Increasingly, microcomputers are being used in applications where their correct operation is vital to ensure the safety of the public and the environment: from anti-lock braking systems in automobiles, to fly-by-wire aircraft, to shut-down systems at nuclear power plants. It is, therefore, vital that engineers are aware of the safety implications of the systems they develop. Th...
Ref 4Cited 487 Source
Nathan R. Tallent13
Estimated H-index: 13
(Rice University),
John M. Mellor-Crummey39
Estimated H-index: 39
(Rice University),
Allan Porterfield12
Estimated H-index: 12
(Renaissance Computing Institute)
Many programs exploit shared-memory parallelism using multithreading. Threaded codes typically use locks to coordinate access to shared data. In many cases, contention for locks reduces parallel efficiency and hurts scalability. Being able to quantify and attribute lock contention is important for understanding where a multithreaded program needs improvement. This paper proposes and evaluates thre...
Ref 19Cited 54 Download Pdf Cite this paper