全文获取类型
收费全文 | 63篇 |
免费 | 9篇 |
国内免费 | 3篇 |
专业分类
综合类 | 4篇 |
化学工业 | 2篇 |
机械仪表 | 1篇 |
矿业工程 | 3篇 |
无线电 | 6篇 |
原子能技术 | 2篇 |
自动化技术 | 57篇 |
出版年
2024年 | 1篇 |
2023年 | 2篇 |
2022年 | 1篇 |
2021年 | 1篇 |
2019年 | 2篇 |
2017年 | 1篇 |
2016年 | 1篇 |
2015年 | 2篇 |
2014年 | 2篇 |
2012年 | 6篇 |
2011年 | 5篇 |
2010年 | 4篇 |
2009年 | 1篇 |
2008年 | 3篇 |
2007年 | 8篇 |
2006年 | 5篇 |
2005年 | 4篇 |
2004年 | 11篇 |
2003年 | 3篇 |
2002年 | 3篇 |
2001年 | 4篇 |
2000年 | 1篇 |
1998年 | 1篇 |
1995年 | 2篇 |
1993年 | 1篇 |
排序方式: 共有75条查询结果,搜索用时 0 毫秒
1.
We extend the notion of Store Atomicity [Arvind and Jan-Willem Maessen. Memory model = instruction reordering + store atomicity. In ISCA '06: Proceedings of the 33rd annual International Symposium on Computer Architecture, 2006] to a system with atomic transactional memory. This gives a fine-grained graph-based framework for defining and reasoning about transactional memory consistency. The memory model is defined in terms of thread-local Instruction Reordering axioms and Store Atomicity, which describes inter-thread communication via memory. A memory model with Store Atomicity is serializable: there is a unique global interleaving of all operations which respects the reordering rules and serializes all the operations in a transaction together. We extend Store Atomicity to capture this ordering requirement by requiring dependencies which cross a transaction boundary to point in to the initiating instruction or out from the committing instruction. We sketch a weaker definition of transactional serialization which accounts for the ability to interleave transactional operations which touch disjoint memory. We give a procedure for enumerating the behaviors of a transactional program—noting that a safe enumeration procedure permits only one transaction to read from memory at a time. We show that more realistic models of transactional execution require speculative execution. We define the conditions under which speculation must be rolled back, and give criteria to identify which instructions must be rolled back in these cases. 相似文献
2.
由新型非易失存储介质构成的持久性内存(persistent memory,PM)具有扩展性强、按字节访问与静态能耗低等特性,为未来主存与辅存融合提供了强大的契机.然而由于LLC(last level cache)具有易失性且与主存交互粒度通常为64B,而PM的原子持久化操作粒度为8B.因此,数据从LLC更新到PM的过程中,若发生故障,则可能破坏更新操作的失败原子性,进而影响原始数据的完整性.为了保证更新操作的失败原子性,目前研究主要采用显式调用持久化指令与内存屏障指令,将数据有序地持久化到PM上,但该操作会造成显著的开销,在索引更新中尤为明显.在对索引进行更新时,往往会涉及到索引结构的变化,该变化需要大量的有序持久化开销.研究旨在减少基于PM的B+树在更新过程中为保证失败原子性而引入的持久化开销.通过分析B+树节点利用率、不同更新模式下持久化开销以及更新操作之间的关系,提出了一种基于节点内数据真实分布的数据单向移动算法.通过原地删除的方式,减少删除带来的持久化开销.利用删除操作在节点内留下的空位,减少后续插入操作造成的数据移动,进而减少数据持久化开销.基于上述算法,对B+树的重均衡操作进行优化.最后通过实验证明,相较于最新基于PM的B+树,提出的单向移动B+树能够显著提高单一负载与混合负载性能. 相似文献
3.
4.
安全支付协议的设计与验证研究 总被引:2,自引:0,他引:2
安全支付协议是实现电子商务在线支付的关键。目前缺乏同时支持电子商品和实物商品的在线支付协议,基于此,该文给出了一种同时支持这两类商品交易的安全支付协议,最后使用SMV工具对协议的原子性进行了分析并验证了其可行性。 相似文献
5.
Yong-Jik KimJames H. Anderson 《Information Processing Letters》2002,84(1):47-55
A simple code transformation is presented that reduces the space complexity of Yang and Anderson's local-spin mutual exclusion algorithm. In both the original and the transformed algorithm, only atomic read and write instructions are used; each process generates Θ(logN) remote memory references per lock request, where N is the number of processes. The transformed algorithm uses Θ(N) distinct variables, which is clearly optimal. 相似文献
6.
Concurrency bugs, such as atomicity‐violation bugs, are difficult to detect due to the uncertainty of thread‐scheduling. It is particularly difficult to conduct a thorough bug fix when an atomicity‐violation bug can be triggered by different buggy interleavings. This paper proposes a prediction‐based approach to comprehensively detect atomicity‐violation bugs. A bug fix can be incomplete when the developer cannot have all the buggy interleavings. Based on the candidate interleavings, this approach can predict unmanifested atomicity‐violation bugs from a non‐buggy execution and comprehensively display all the buggy interleavings for the same bug to assist a thorough fix. We use a monitored execution to record execution traces and predict potential buggy interleavings based on the candidate interleavings identified from the trace. Then, we use controlled executions to verify the predicted buggy interleavings by controlling the thread‐scheduling. We implemented a prototype tool called AVPredictor and evaluated it with real‐world tests. Experiments show that AVPredictor can effectively find all the known atomicity‐violation bugs as well as a previously unknown bug together with all the buggy interleavings for each bug. The runtime overhead is 13x for the monitored execution and 18x for the controlled execution. 相似文献
7.
Global ACID properties (Atomicity, Consistency, Isolation and Durability) may be implemented by using a DDBMS (Distributed Data Base Management System.) However, in this solution data availability is low. Further, data may be blocked, i.e. if some data are locked from a remote location, the data cannot always be unlocked when the connection to the data fails. This is not a problem when client/server technology is used because client/server technology only uses local locks, a reason why multidatabases and client/server technology are widely used in real-life distributed systems. However, the trouble with such systems is that they have no inherent global ACID properties. The objective of this paper is to illustrate how global semantic ACID properties, enforced by the transactions themselves, may be implemented on top of client/server technology. This is done to preserve high data availability. The global atomicity property is implemented by using retriable and compensatable subtransactions. The global consistency property must be implemented by the transactions themselves. The global isolation property is implemented by using countermeasures to isolation anomalies. The global durability property is implemented by using the durability property of the local DBMSs. The largest bank in Denmark, Den Danske Bank, has implemented all its applications using methods described in this paper. © 1998 John Wiley & Sons, Ltd. 相似文献
8.
9.
This paper describes a parameterized distributed algorithm applicable to any directed graph topology. The function parameter
of our algorithm is instantiated to produce distributed algorithms for both fundamental and high level applications, such
as shortest path calculus and depth-first-search tree construction. Due to fault resilience properties of our algorithm, the
resulting protocols are self-stabilizing at no additional cost. Self-stabilizing protocols can resist transient failures and
guarantee system recovery in a finite time. Since the condition on the function parameter (being a strictly idempotent r-operator) permits a broad range of applications to be implemented, the solution presented in our paper can be useful for
a large class of distributed systems.
Received: August 1999 / Accepted: January 2001 相似文献
10.
Atomicity and anonymity are desirable properties for reliable and security e-Cash transaction and the guarantee of the participants‘ interests. But there are cotdlicts between these two properties. In this paper, an atomic and anonymous e-Cash transaction protocol with off-line TTP (Trust Third Party) based on the extended CEMBS is presented. The novel protocol is analyzed for its atomicity and anonymity. The results of the analysis show that it not only provides atomicity and anonymity under unreliable communication and dishonest participants, but also features high efficiency and practicability. The new protocol also avoids transaction from an ambiguous state. Furthermore, it will be referenced often for the application of the atomic e-Cash transaction protocol. 相似文献