Control lock

Results: 1096



#Item
171High Performance Dynamic Lock-Free Hash Tables and List-Based Sets Maged M. Michael IBM Thomas J. Watson Research Center P.O. Box 218 Yorktown Heights NYUSA

High Performance Dynamic Lock-Free Hash Tables and List-Based Sets Maged M. Michael IBM Thomas J. Watson Research Center P.O. Box 218 Yorktown Heights NYUSA

Add to Reading List

Source URL: www.research.ibm.com

Language: English - Date: 2004-08-02 14:09:15
172Testing Atomicity of Composed Concurrent Operations Ohad Shacham Nathan Bronson  Alex Aiken

Testing Atomicity of Composed Concurrent Operations Ohad Shacham Nathan Bronson Alex Aiken

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2011-08-29 13:53:58
173Automated Concurrency-Bug Fixing Guoliang Jin Abstract  Wei Zhang

Automated Concurrency-Bug Fixing Guoliang Jin Abstract Wei Zhang

Add to Reading List

Source URL: people.cs.uchicago.edu

Language: English - Date: 2012-09-10 16:24:23
174Applying Dataflow and Transactions to Lee Routing Chris Seaton, Daniel Goodman, Mikel Luj´an, and Ian Watson University of Manchester {seatonc,goodmand,mikel.lujan,watson}@cs.man.ac.uk

Applying Dataflow and Transactions to Lee Routing Chris Seaton, Daniel Goodman, Mikel Luj´an, and Ian Watson University of Manchester {seatonc,goodmand,mikel.lujan,watson}@cs.man.ac.uk

Add to Reading List

Source URL: www.chrisseaton.com

Language: English - Date: 2013-03-27 03:32:35
175Using Efficient Steering Techniques Page 1 of 2 Crash statistics indicate that driver errors involving steering techniques are the main causes of crashes where drivers run off the road. Methods used to control steering i

Using Efficient Steering Techniques Page 1 of 2 Crash statistics indicate that driver errors involving steering techniques are the main causes of crashes where drivers run off the road. Methods used to control steering i

Add to Reading List

Source URL: www.safercar.gov

Language: English - Date: 2015-03-08 19:40:09
176Click on product name or image for more information  Access and Egress Solutions Complete Component Considerations™ 1 Locking Device

Click on product name or image for more information Access and Egress Solutions Complete Component Considerations™ 1 Locking Device

Add to Reading List

Source URL: sdcsecurity.com

Language: English - Date: 2015-05-18 09:44:52
177CGCExplorer: A Semi-Automated Search Procedure for Provably Correct Concurrent Collectors Martin T. Vechev Cambridge University  Eran Yahav

CGCExplorer: A Semi-Automated Search Procedure for Provably Correct Concurrent Collectors Martin T. Vechev Cambridge University Eran Yahav

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2007-04-10 10:02:52
178Automated Atomicity-Violation Fixing ∗ Guoliang Jin Linhai Song  Wei Zhang

Automated Atomicity-Violation Fixing ∗ Guoliang Jin Linhai Song Wei Zhang

Add to Reading List

Source URL: people.cs.uchicago.edu

Language: English - Date: 2011-07-05 11:53:12
179COLORADO BRANCH TRAINING Your Everyday Resource Image of product or training classroom  The World of Retrofit:

COLORADO BRANCH TRAINING Your Everyday Resource Image of product or training classroom The World of Retrofit:

Add to Reading List

Source URL: www.sdcsecurity.com

Language: English - Date: 2015-05-20 19:51:48
180Programming Language Memory Models: What do Shared Variables Mean? Hans-J. Boehm

Programming Language Memory Models: What do Shared Variables Mean? Hans-J. Boehm

Add to Reading List

Source URL: hboehm.info

Language: English - Date: 2014-02-06 19:37:32