<--- Back to Details
First PageDocument Content
Concurrency control / Computing / Computer architecture / Computer programming / Ticket lock / Synchronization / Monitor / Parallel computing / Fetch-and-add / Compare-and-swap / Mutual exclusion / Lock
Date: 2006-09-23 12:40:39
Concurrency control
Computing
Computer architecture
Computer programming
Ticket lock
Synchronization
Monitor
Parallel computing
Fetch-and-add
Compare-and-swap
Mutual exclusion
Lock

Algorithms for scalable synchronization on shared-memory multiprocessors

Add to Reading List

Source URL: www.cs.rochester.edu

Download Document from Source Website

File Size: 2,88 MB

Share Document on Facebook

Similar Documents

Towards Illuminating a Censorship Monitor’s Model to Facilitate Evasion Sheharbano Khattak∗ ∗ Independent researcher  Philip D. Anderson∗ Vern Paxson†

Towards Illuminating a Censorship Monitor’s Model to Facilitate Evasion Sheharbano Khattak∗ ∗ Independent researcher Philip D. Anderson∗ Vern Paxson†

DocID: 1xVDw - View Document

CASE STUDY  PRTG Network Monitor helps PET-Xi keep a close eye on its network PET-Xi is one of the largest and most well-renowned education training

CASE STUDY PRTG Network Monitor helps PET-Xi keep a close eye on its network PET-Xi is one of the largest and most well-renowned education training

DocID: 1xUjN - View Document

Towards	
  illumina.ng	
  a	
  Censorship	
   Monitor’s	
  Model	
  to	
  Facilitate	
   Evasion	
   Sheharbano	
  Kha>ak*,	
  Mobin	
  Javed,	
  Philip	
  D.	
  Anderson*	
  and	
  	
   Vern	
  P

Towards  illumina.ng  a  Censorship   Monitor’s  Model  to  Facilitate   Evasion   Sheharbano  Kha>ak*,  Mobin  Javed,  Philip  D.  Anderson*  and     Vern  P

DocID: 1xTm1 - View Document

PDF Document

DocID: 1xPwF - View Document

DOC Document

DocID: 1xNmg - View Document