Academic literature on the topic 'Write lock'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Write lock.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Write lock"

1

Reddy, Bharath, and Richard Fields. "Techniques for Reader-Writer Lock Synchronization." International Journal of Electronics and Electrical Engineering 8, no. 4 (2020): 63–73. http://dx.doi.org/10.18178/ijeee.8.4.63-73.

Full text
Abstract:
A shared resource synchronization amongst many processes trying to acquire it is a major source of complexity in uniprocessor and multiprocessor systems. The common way of dealing with such complexity is to exclusively acquire the shared resource by a lock, work on it and then let go after the resource is no longer needed. A reader-writer lock paradigm is unique in a way that it allows multiple readers to share the resources amongst them as readers are not changing the state of the shared resource or allow a single writer exclusively to write into/or change the shared resource state from A–B. A reader-writer problem is a challenging topic and deserves its own identity. There are many reader-writer algorithms that try to solve and improve the efficiency of this synchronization. With great improvements in computer hardware and subsequently the synchronization methods in the last 2 decades, we attempt to bring all reader-writer locks together. The paper would first examine a general lock and later move on to different kinds of reader-writer locks in the literature to the best of our knowledge.
APA, Harvard, Vancouver, ISO, and other styles
2

Anshar, Khairul, Nanna Suryana, and Noraswaliza Noraswaliza. "Basic principles of blind write protocol." Bulletin of Electrical Engineering and Informatics 9, no. 3 (2020): 1198–207. http://dx.doi.org/10.11591/eei.v9i3.2032.

Full text
Abstract:
The current approach to handle interleaved write operation and preserve consistency in relational database system still relies on the locking protocol. If any entity is locked by any transaction, then it becomes temporary unavailable to other transaction until the lock is released. The temporary unavailability can be more often if the number of write operation increases as happens in the application systems that utilize IoT technology or smartphone devices to collect the data. To solve this problem, this research is proposed blind write protocol which does not lock the entity while the transaction is performing a write operation. This paper presents the basic principles of blind write protocol implementation in a relational database system
APA, Harvard, Vancouver, ISO, and other styles
3

BYUN, SIWOO, MOONHAENG HUH, and HOYOUNG HWANG. "FLASH MEMORY LOCK MANAGEMENT FOR PORTABLE INFORMATION SYSTEMS." International Journal of Cooperative Information Systems 15, no. 03 (2006): 461–79. http://dx.doi.org/10.1142/s0218843006001438.

Full text
Abstract:
Flash memory is becoming a major database storage in building embedded systems or portable devices because of its non-volatile, shock-resistant, power-economic nature, and fast access time for read operations. Flash memory, however, should be erased before it can be rewritten and the erase and write operations are very slow as compared to main memory. Due to this drawback, traditional database management schemes are not easy to apply directly to flash memory database for portable devices. Therefore, we improve the traditional schemes and propose a new scheme called Flash Two Phase Locking (F2PL) scheme for efficient transaction processing in a flash memory database environment. F2PL achieves high transaction performance by exploiting the notion of the Alternative Version Coordination which allows previous version reads and efficiently handles slow write/erase operations in lock management processes. We also propose a simulation model to show the performance of F2PL. Based on the results of the performance evaluation, we conclude that F2PL scheme outperforms the traditional schemes.
APA, Harvard, Vancouver, ISO, and other styles
4

Ngodigha, Sabina Alatari. "Artisanal Fishers Knowledge of Covid-19 and the Impact of Lock Down on Fishing in Igbomotoru Bayelsa State, Niger Delta." East Asian Journal of Multidisciplinary Research 2, no. 4 (2023): 1793–802. http://dx.doi.org/10.55927/eajmr.v2i4.3846.

Full text
Abstract:
The study was conducted with the aimed of identifying the impact of COVID-19 lock down on Artisanal Fishers and fishing operations. Data was collected through face-face interview. Fishers who had 15 years of fishing experience and above were involved in the research. Results showed that Fishers were well informed of COVID-19 pandemic. There was no case of COVID-19. Fishers could read and write as they had the basic primary education. Restriction on movement had major setback on the fishing operations of fishers and intermediaries given the low fish price and reduced movement of fish traders. Landings were very good during lock down. Poor before lock down dwindled down to good after the lock down due to human activities.
APA, Harvard, Vancouver, ISO, and other styles
5

WATANABE, KENICHI, YOUSUKE SUGIYAMA, TOMOYA ENOKIDO, and MAKOTO TAKIZAWA. "MODERATE CONCURRENCY CONTROL IN DISTRIBUTED OBJECT SYSTEMS." Journal of Interconnection Networks 05, no. 02 (2004): 181–91. http://dx.doi.org/10.1142/s021926590400109x.

Full text
Abstract:
Objects are concurrently manipulated only through methods issued by multiple transactions in object-based systems. We first extend traditional read and write lock modes to methods on objects. We newly introduce availability and exclusion types of conflicting relations among methods. Then, we define a partially ordered relation on lock modes showing which modes are stronger than others. We newly propose a moderate concurrency control algorithm. Before manipulating an object through a method, the object is locked in a weaker mode than an intrinsic mode of the method. Then, the lock mode is escalated to the method mode. The weaker the initial mode is, the more concurrency is obtained but the more frequently deadlock occurs.
APA, Harvard, Vancouver, ISO, and other styles
6

Lee, Jongsung, Donguk Kim, and Jae W. Lee. "WALTZ: Leveraging Zone Append to Tighten the Tail Latency of LSM Tree on ZNS SSD." Proceedings of the VLDB Endowment 16, no. 11 (2023): 2884–96. http://dx.doi.org/10.14778/3611479.3611495.

Full text
Abstract:
We propose WALTZ, an LSM tree-based key-value store on the emerging Zoned Namespace (ZNS) SSD. The key contribution of WALTZ is to leverage the zone append command, which is a recent addition to ZNS SSD specifications, to provide tight tail latency. The long tail latency problem caused by the merging process of multiple parallel writes, called batch-group writes, is effectively addressed by the internal synchronization mechanism of ZNS SSD. To provide fast failover when the active zone becomes full for a write-ahead log (WAL) file during parallel append, WALTZ introduces a mechanism for WAL zone replacement and reservation. Finally, lazy metadata management allows a put query to be processed fast without requiring any other synchronizations to enable lock-free execution of individual append commands. For evaluation we use both mi-crobenchmarks (db_bench) with varying read/write ratios and key skewnesses, and realistic social-graph workloads (MixGraph from Facebook). Our evaluation demonstrates geomean reduction of tail latency by 2.19× and 2.45× for db_bench and MixGraph, respectively, with a maximum reduction of 3.02× and 4.73×. As a side effect of eliminating the overhead of batch-group writes, WALTZ also improves the query throughput (QPS) by up to 11.7%.
APA, Harvard, Vancouver, ISO, and other styles
7

Zhang, Bowen, Shengan Zheng, Zhenlin Qi, and Linpeng Huang. "NBTree." Proceedings of the VLDB Endowment 15, no. 6 (2022): 1187–200. http://dx.doi.org/10.14778/3514061.3514066.

Full text
Abstract:
Persistent memory (PM) promises near-DRAM performance as well as data persistency. Recently, a new feature called eADR is available on the 2 nd generation Intel Optane PM with the 3 rd generation Intel Xeon Scalable Processors. eADR ensures that data stored within the CPU caches will be flushed to PM upon the power failure. Thus, in eADR-enabled PM systems, the globally visible data is considered persistent, and explicit data flushes are no longer necessary. The emergence of eADR presents unique opportunities to build lock-free data structures and unleash the full potential of PM. In this paper, we propose NBTree, a lock-free PM-friendly B + -Tree, to deliver high scalability and low PM overhead. To our knowledge, NBTree is the first persistent index designed for eADR-enabled PM systems. To achieve lock-free, NBTree uses atomic primitives to serialize leaf node operations. Moreover, NBTree proposes four novel techniques to enable lock-free access to the leaf during structural modification operations (SMO), including three-phase SMO, sync-on-write, sync-on-read , and cooperative SMO. For inner node operations, we develop a shift-aware search algorithm to resolve read-write conflicts. To reduce PM overhead, NBTree decouples the leaf nodes into a metadata layer and a key-value layer. The metadata layer is stored in DRAM, along with the inner nodes, to reduce PM accesses. NBTree also adopts log-structured insert and in-place update/delete to improve cache utilization. Our evaluation shows that NBTree achieves up to 11X higher throughput and 43X lower 99% tail latency than state-of-the-art persistent B + -Trees under YCSB workloads.
APA, Harvard, Vancouver, ISO, and other styles
8

Pollock, Linda. "Journal Writing Leads to Connectivity." Issues in Language Instruction 1, no. 1 (2012): 26–27. http://dx.doi.org/10.17161/ili.v1i1.6947.

Full text
Abstract:
When I was 12, I wanted a diary with a lock and key; the kind little sisters can’t get into. Later in my teen years, I used to write each day’s event in a small calendar. Throughout the years I have seen the value of journaling in my own life and more recently I have read articles about its benefits in a classroom. Therefore, when my students in Reading and Writing level 2 said they wanted to write more, I thought this might be a good idea. So, armed with small blue exam books and markers for their names, I explained to my class what we were going to do.
APA, Harvard, Vancouver, ISO, and other styles
9

Roque, Ana, Fernando Pina, Sérgio Alves, Roberto Ballardini, Mauro Maestri, and Vincenzo Balzani. "Micelle effect on the ‘write–lock–read–unlock–erase’ cycle of 4′-hydroxyflavylium ion." Journal of Materials Chemistry 9, no. 9 (1999): 2265–69. http://dx.doi.org/10.1039/a902805f.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pina, Fernando, Maria João Melo, Mauro Maestri, Roberto Ballardini, and Vincenzo Balzani. "Photochromism of 4‘-Methoxyflavylium Perchlorate. A “Write−Lock−Read−Unlock−Erase” Molecular Switching System." Journal of the American Chemical Society 119, no. 24 (1997): 5556–61. http://dx.doi.org/10.1021/ja9704646.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Write lock"

1

Hernane, Soumeya-Leila. "Modèles et algorithmes de partage de données cohérents pour le calcul parallèle distribué à haut débit." Thesis, Université de Lorraine, 2013. http://www.theses.fr/2013LORR0042/document.

Full text
Abstract:
Data Handover est une librairie de fonctions adaptée aux systèmes distribués à grande échelle. Dho offre des routines qui permettent d'acquérir des ressources en lecture ou en écriture de façon cohérente et transparente pour l'utilisateur. Nous avons modélisé le cycle de vie de Dho par un automate d'état fini puis, constaté expérimentalement, que notre approche produit un recouvrement entre le calcul de l'application et le contrôle de la donnée. Les expériences ont été menées en mode simulé en utilisant la libraire GRAS de SimGrid puis, en exploitant un environnement réel sur la plate-forme Grid'5000. Par la théorie des files d'attente, la stabilité du modèle a été démontrée dans un contexte centralisé. L'algorithme distribué d'exclusion mutuelle de Naimi et Tréhel a été enrichi pour offrir les fonctionnalités suivantes: (1) Permettre la connexion et la déconnexion des processus (ADEMLE), (2) admettre les locks partagés (AEMLEP) et enfin (3) associer les deux propriétés dans un algorithme récapitulatif (ADEMLEP). Les propriétés de sûreté et de vivacité ont été démontrées théoriquement. Le système peer-to-peer proposé combine nos algorithmes étendus et le modèle originel Dho. Les gestionnaires de verrou et de ressource opèrent et interagissent mutuellement dans une architecture à trois niveaux. Suite à l'étude expérimentale du système sous-jacent menée sur Grid'5000, et des résultats obtenus, nous avons démontré la performance et la stabilité du modèle Dho face à une multitude de paramètres
Data Handover is a library of functions adapted to large-scale distributed systems. It provides routines that allow acquiring resources in reading or writing in the ways that are coherent and transparent for users. We modelled the life cycle of Dho by a finite state automaton and through experiments; we have found that our approach produced an overlap between the calculation of the application and the control of the data. These experiments were conducted both in simulated mode and in real environment (Grid'5000). We exploited the GRAS library of the SimGrid toolkit. Several clients try to access the resource concurrently according the client-server paradigm. By the theory of queues, the stability of the model was demonstrated in a centralized environment. We improved, the distributed algorithm for mutual exclusion (of Naimi and Trehel), by introducing following features: (1) Allowing the mobility of processes (ADEMLE), (2) introducing shared locks (AEMLEP) and finally (3) merging both properties cited above into an algorithm summarising (ADEMLEP). We proved the properties, safety and liveliness, theoretically for all extended algorithms. The proposed peer-to-peer system combines our extended algorithms and original Data Handover model. Lock and resource managers operate and interact each other in an architecture based on three levels. Following the experimental study of the underlying system on Grid'5000, and the results obtained, we have proved the performance and stability of the model Dho over a multitude of parameters
APA, Harvard, Vancouver, ISO, and other styles
2

Kiser, Charlene. "To Write or Not to Write: A Look at Faculty Use of Writing at a Small Liberal Arts College." Diss., Virginia Tech, 2006. http://hdl.handle.net/10919/28035.

Full text
Abstract:
Although it may not seem possible that a student could graduate from an Ivy League institution without basic writing skills, a 2003 Chronicle of Higher Education article concluded that it is not only possible, but that it does happen. Some students are actually suing colleges and universities because they do not believe they have been taught the skills necessary to succeed in the area of written communication. This deficiency reflects poorly on universities, and even small liberal arts colleges are not exempt from this problem. This dissertation was driven by a desire to learn how professors at one small liberal arts college viewed the use of writing in their courses. The professors were interviewed to determine how they viewed writing, how they viewed their students" writing, how familiar they were with writing-across-the-curriculum practices, and how much writing was assigned in their courses. The study results indicated that many professors use writing extensively in their courses, and that they considered their assignments appropriate and successful in achieving their goals. The study also revealed that some professors use little or no writing, and their reasons for doing so were varied. The most common explanation was a lack of time to create assignments and to read and assess written assignments. Some professors also concurred that they felt uncomfortable using writing because their own writing skills were lacking. Other professors were discouraged by poor student writing and had given up on using additional writing assignments. The most surprising result from this study was the professors" lack of knowledge concerning the use of writing as a learning and thinking tool. Most were comfortable with the standard research paper, case study type of writing assignments, but few used writing-across-the-curriculum methods or practices. Writing prompts, journals, and non-graded pieces were not part of their teaching repertoire. Even professors in the field of education reported that they have not adopted the newer teaching strategies. The concluding chapter addressed faculty concerns and provided suggestions for overcoming these concerns.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
3

Hernane, Soumeya-Leila. "Modèles et algorithmes de partage de données cohérents pour le calcul parallèle distribué à haut débit." Electronic Thesis or Diss., Université de Lorraine, 2013. http://www.theses.fr/2013LORR0042.

Full text
Abstract:
Data Handover est une librairie de fonctions adaptée aux systèmes distribués à grande échelle. Dho offre des routines qui permettent d'acquérir des ressources en lecture ou en écriture de façon cohérente et transparente pour l'utilisateur. Nous avons modélisé le cycle de vie de Dho par un automate d'état fini puis, constaté expérimentalement, que notre approche produit un recouvrement entre le calcul de l'application et le contrôle de la donnée. Les expériences ont été menées en mode simulé en utilisant la libraire GRAS de SimGrid puis, en exploitant un environnement réel sur la plate-forme Grid'5000. Par la théorie des files d'attente, la stabilité du modèle a été démontrée dans un contexte centralisé. L'algorithme distribué d'exclusion mutuelle de Naimi et Tréhel a été enrichi pour offrir les fonctionnalités suivantes: (1) Permettre la connexion et la déconnexion des processus (ADEMLE), (2) admettre les locks partagés (AEMLEP) et enfin (3) associer les deux propriétés dans un algorithme récapitulatif (ADEMLEP). Les propriétés de sûreté et de vivacité ont été démontrées théoriquement. Le système peer-to-peer proposé combine nos algorithmes étendus et le modèle originel Dho. Les gestionnaires de verrou et de ressource opèrent et interagissent mutuellement dans une architecture à trois niveaux. Suite à l'étude expérimentale du système sous-jacent menée sur Grid'5000, et des résultats obtenus, nous avons démontré la performance et la stabilité du modèle Dho face à une multitude de paramètres
Data Handover is a library of functions adapted to large-scale distributed systems. It provides routines that allow acquiring resources in reading or writing in the ways that are coherent and transparent for users. We modelled the life cycle of Dho by a finite state automaton and through experiments; we have found that our approach produced an overlap between the calculation of the application and the control of the data. These experiments were conducted both in simulated mode and in real environment (Grid'5000). We exploited the GRAS library of the SimGrid toolkit. Several clients try to access the resource concurrently according the client-server paradigm. By the theory of queues, the stability of the model was demonstrated in a centralized environment. We improved, the distributed algorithm for mutual exclusion (of Naimi and Trehel), by introducing following features: (1) Allowing the mobility of processes (ADEMLE), (2) introducing shared locks (AEMLEP) and finally (3) merging both properties cited above into an algorithm summarising (ADEMLEP). We proved the properties, safety and liveliness, theoretically for all extended algorithms. The proposed peer-to-peer system combines our extended algorithms and original Data Handover model. Lock and resource managers operate and interact each other in an architecture based on three levels. Following the experimental study of the underlying system on Grid'5000, and the results obtained, we have proved the performance and stability of the model Dho over a multitude of parameters
APA, Harvard, Vancouver, ISO, and other styles
4

Vallejo, Gutiérrez Enrique. "Soporte arquitectónico a la sincronización imparcial de lectores y escritores en computadores paralelos." Doctoral thesis, Universidad de Cantabria, 2010. http://hdl.handle.net/10803/10637.

Full text
Abstract:
La evolución tecnológica en el diseño de microprocesadores ha conducido a sistemas paralelos con múltiples hilos de ejecución. Estos sistemas son más difíciles de programar y presentan overheads mayores que los sistemas uniprocesadores tradicionales, que pueden limitar su rendimiento y escalabilidad: sincronización, coherencia, consistencia y otros mecanismos requeridos para garantizar una ejecución correcta. La programación paralela tradicional se basa en primitivas de sincronización como barreras y locks de lectura/escritura, con alta tendencia a fallos de programación. La Memoria Transaccional (TM) oculta estos problemas de sincronización al programador; sin embargo, múltiples sistemas TM aún se basan en locks, y se beneficiarían de una implementación eficiente de los mismos.Esta tesis presenta nuevas técnicas hardware para acelerar la ejecución de estos programas paralelos. Proponemos un sistema TM híbrido basado en locks de lectura/escritura, que minimiza los overheads del software cuando la aceleración hardware está presente. Desarrollamos un mecanismo para garantizar fairness entre transacciones hardware y software. Introducimos un mecanismo distribuido de aceleración de locks de lectura/escritura, llamado Lock Control Unit. Finalmente, proponemos una organización de multiprocesadores basadas en Kilo-Instruction Processors que garantiza Consistencia Secuencial y permite especulación en secciones críticas.
Technological evolution in microprocessor design has led to parallel systems with multiple execution threads. These systems are more difficult to program and present higher performance overheads than the traditional uniprocessor systems, what may limit their performance and scalability: synchronization, coherence, consistency and other mechanisms required to guarantee a correct execution. Traditional parallel programming is based on synchronization primitives such as barriers, critical sections and reader/writer locks, highly prone to programming errors. Transactional Memory (TM) removes the synchronization problems from the programmer. However, many TM systems still rely on reader/writer locks, and would get benefited from an efficient implementation.This thesis presents new hardware techniques to accelerate the execution of such parallel programs. We propose a Hybrid TM system based on reader/writer locks, which minimizes the software overheads when acceleration hardware is present, still allowing for correct software-only execution. We propose a mechanism to guarantee fairness between hardware and software transactions is provided. We introduce a low-cost distributed mechanism named the Lock Control Unit to handle fine-grain reader-writer locks. Finally, we propose an organization of a mutiprocessor based on Kilo-Instruction Processors, which guarantees Sequential Consistency while allowing for speculation in critical sections.
APA, Harvard, Vancouver, ISO, and other styles
5

Saied, Mariem. "Automatic code generation and optimization of multi-dimensional stencil computations on distributed-memory architectures." Thesis, Strasbourg, 2018. http://www.theses.fr/2018STRAD036/document.

Full text
Abstract:
Nous proposons Dido, un langage dédié (DSL) implicitement parallèle qui capture les spécifications de haut niveau des stencils et génère automatiquement du code parallèle de haute performance pour les architectures à mémoire distribuée. Le code généré utilise ORWL en tant que interface de communication et runtime. Nous montrons que Dido réalise un grand progrès en termes de productivité sans sacrifier les performances. Dido prend en charge une large gamme de calculs stencils ainsi que des applications réelles à base de stencils. Nous montrons que le code généré par Dido est bien structuré et se prête à de différentes optimisations possibles. Nous combinons également la technique de génération de code de Dido avec Pluto l'optimiseur polyédrique de boucles pour améliorer la localité des données. Nous présentons des expériences qui prouvent l'efficacité et la scalabilité du code généré qui atteint de meilleures performances que les implémentations ORWL et MPI écrites à la main
In this work, we present Dido, an implicitly parallel domain-specific language (DSL) that captures high-level stencil abstractions and automatically generates high-performance parallel stencil code for distributed-memory architectures. The generated code uses ORWL as a communication and synchronization backend. We show that Dido achieves a huge progress in terms of programmer productivity without sacrificing the performance. Dido supports a wide range of stencil computations and real-world stencil-based applications. We show that the well-structured code generated by Dido lends itself to different possible optimizations and study the performance of two of them. We also combine Dido's code generation technique with the polyhedral loop optimizer Pluto to increase data locality and improve intra-node data reuse. We present experiments that prove the efficiency and scalability of the generated code that outperforms both ORWL and MPI hand-crafted implementations
APA, Harvard, Vancouver, ISO, and other styles
6

McGarry, Michael Gerard. ""To read, write and cast accounts": Foucault, Governmentality, and Education in Upper Canada/Canada West." Thesis, 2013. http://hdl.handle.net/1807/35903.

Full text
Abstract:
Contributing to the work of philosophers of education who have been examining issues of economy and emancipation, this dissertation employs a set of critical lenses drawn from Foucault’s investigation of governmentality to trace correspondences between economic liberalism and public schooling in Upper Canada/Canada West, the historical antecedent of present day Ontario. The analysis adheres to Foucault’s advice that philosophical critique involves a question asked of the present but answered in history. Thus through a Foucauldian genealogy it is argued that a series of transformations in the deployment of governmental power occurred in Upper Canada/Canada West that entailed the entry of an economic rationality into deliberations over the creation of a school system. To support this argument evidence is presented that demonstrates how race, biopolitics, and the burgeoning science of political economy combined in the first half of the nineteenth century to form the conditions of possibility for governmental control of schooling. In particular, it is illustrated how these conditions favoured a pedagogy based in Locke’s epistemology, and were legitimized by the providential status accorded political economy. This pedagogy, which was promoted as mild and so conducive to student engagement, and the authority of political economy are revealed as integral to the methods of instruction and curriculum of the province’s common schools, and indicative of the legacy of economic liberalism that persists, albeit transformed, in Ontario education to this day. The result of this critical analysis is a redescription or, in Foucault’s terminology, a “countermemory” of Ontario educational history that challenges the presumed naturalism of the ideals characteristic of economic liberalism, such as autonomy, accountability, entrepreneurialism, and consumer choice. The dissertation contends that these ideals are active in local educational regimes long legitimized by economy, and dangerously aimed at fostering political consent by manipulating subjects into locations of restricted agency. Providing insight into the historical role played by liberal governmentality and economy in the local context contributes to the study of Foucault and the philosophy of education, and also suggests a change in approach to questions regarding the corporatization or marketization of education.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Write lock"

1

Laurel, Brucker, and Bolling Vickey, eds. Look, look! I wrote a book!: Reproducible little books for emergent readers. Good Year Books, 1998.

APA, Harvard, Vancouver, ISO, and other styles
2

Leedy, Loreen. Look at my book: How kids can write & illustrate terrific books. Holiday House, 2003.

APA, Harvard, Vancouver, ISO, and other styles
3

Leedy, Loreen. Look at my book: How kids can write & illustrate terrific books. Holiday House, 2004.

APA, Harvard, Vancouver, ISO, and other styles
4

Leavitt, Hart Day. Look, think & write: Using pictures to stimulate thinking and improve your writing. National Textbook Co., 1985.

APA, Harvard, Vancouver, ISO, and other styles
5

Brecht, Martin. Doctor Luther's bulla and reformation: A look at Luther the writer. Valparaiso University Press, 1991.

APA, Harvard, Vancouver, ISO, and other styles
6

Brecht, Martin. Dr. Luther's bulla and Reformation: A look at Luther the writer. Valparaiso University Press, 1991.

APA, Harvard, Vancouver, ISO, and other styles
7

Cappello, Eve. The new professional touch: How to think, act, write, and look like a professional. Kendall/Hunt, 1988.

APA, Harvard, Vancouver, ISO, and other styles
8

Anne, Burt, and Kline Christina Baker 1964-, eds. About face: Women write about what they see when they look in the mirror. Seal Press, 2008.

APA, Harvard, Vancouver, ISO, and other styles
9

What editors look for: How to write compelling queries, cover letters, synopses, & book proposals. Cougar Imprints, 1995.

APA, Harvard, Vancouver, ISO, and other styles
10

New York (N.Y.). Board of Education., ed. Look, listen, do! Read and write too: A manual of ESL activities for beginner level. Board of Education, 1985.

APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Write lock"

1

Sen, Sangeeta, and Rituparna Chaki. "Handling Write Lock Assignment in Cloud Computing Environment." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-27245-5_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sheehan, Kym. "A Snapshot Look." In Reflect & Write. Routledge, 2021. http://dx.doi.org/10.4324/9781003237686-27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Thomas, Christopher. "Look Beyond the Ocean." In Reflect & Write. Routledge, 2021. http://dx.doi.org/10.4324/9781003237686-58.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Riley, Philip. "‘Look in Thy Heart and Write’." In Academic Writing. John Benjamins Publishing Company, 1996. http://dx.doi.org/10.1075/pbns.41.10ril.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gustedt, Jens, and Emmanuel Jeanvoine. "Relaxed Synchronization with Ordered Read-Write Locks." In Euro-Par 2011: Parallel Processing Workshops. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29737-3_43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Greetham, Bryan. "Searching the Literature 1: Knowing What to Look for." In How to Write Your Undergraduate Dissertation. Macmillan Education UK, 2014. http://dx.doi.org/10.1007/978-1-137-38977-0_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wagner, Claus, and Frank Mueller. "Token-Based Read/Write-Locks for Distributed Mutual Exclusion." In Euro-Par 2000 Parallel Processing. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-44520-x_167.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Holub, Allen. "Singletons, Critical Sections, and Reader/Writer Locks." In Taming Java Threads. Apress, 2000. http://dx.doi.org/10.1007/978-1-4302-1129-7_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jayanti, Prasad, and Zhiyu Liu. "Abortable Reader-Writer Locks Are No More Complex Than Abortable Mutex Locks." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33651-5_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bhatt, Vibhor, and Prasad Jayanti. "Specification and Constant RMR Algorithm for Phase-Fair Reader-Writer Lock." In Distributed Computing and Networking. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-17679-1_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Write lock"

1

Felber, Pascal, Shady Issa, Alexander Matveev, and Paolo Romano. "Hardware read-write lock elision." In EuroSys '16: Eleventh EuroSys Conference 2016. ACM, 2016. http://dx.doi.org/10.1145/2901318.2901346.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bavarsad, Amir Ghanbari, and Ehsan Atoofian. "Read-Write Lock Allocation in Software Transactional Memory." In 2013 42nd International Conference on Parallel Processing (ICPP). IEEE, 2013. http://dx.doi.org/10.1109/icpp.2013.81.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shirako, Jun, Nick Vrvilo, Eric G. Mercer, and Vivek Sarkar. "Design, verification and applications of a new read-write lock algorithm." In Proceedinbgs of the 24th ACM symposium. ACM Press, 2012. http://dx.doi.org/10.1145/2312005.2312015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wilschut, T., L. F. P. Etman, J. E. Rooda, and J. A. Vogel. "Multi-Level Function Specification and Architecture Analysis Using ESL: A Lock Renovation Pilot Study." In ASME 2018 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/detc2018-85191.

Full text
Abstract:
In this paper, we present a pilot study to show the first proof-of-principle of the recently developed Elephant Specification Language (ESL). The Prinses Marijke locks in the Netherlands are due for a major renovation. To effectively organize the renovation project, engineers need insight into the network of dependencies between components that are due for renewal and components that remain, to ensure that the replacement parts will fit and function properly in the existing structure. ESL is used to write a structured multi-level function specification for the Prinses Marijke locks. From this specification, multi-domain matrix (MDM) models of the system architecture are automatically derived at multiple levels of granularity. These models show dependencies between components, between functions, and combinations thereof. The MDM models are used to gain insight in the system architecture, to visualize which parts of the lock system are affected by the renovation, and to determine which dependencies have to be accounted for during the renovation process. This information is required to effectively organize the renovation project.
APA, Harvard, Vancouver, ISO, and other styles
5

Griffin, Richard D., Alan E. Craig, and John N. Lee. "Synchronous 2-D feature extraction using a microchannel spatial light modulator." In OSA Annual Meeting. Optica Publishing Group, 1987. http://dx.doi.org/10.1364/oam.1987.ml4.

Full text
Abstract:
Although 2-D optical signal processors inherently have a higher bandwidth than 1-D processors, the postprocessing load is also higher. In particular, nonuniformities and buildup in the background level often must be corrected dynamically before feature extraction processing. A microchannel spatial light modulator (MSLM) operating in its synchronous detection mode can detect features oscillating periodically against a quasistatic background. In this mode of operation the MSLM erase-field is identical to the write-field except that during the erase cycle the intensity of the oscillating feature is near its minimum. Thus, background features are alternately written and erased, while the feature of interest is repeatedly written. Two-dimensional optical output fields are often used in radar and sonar processing, e.g., to display both range and Doppler information. We use a coherent optical processor that displays correlations as blinking lights due to a periodic phase modulation.1 When synchronized to this signal the MSLM becomes a sensitive 2-D photodetector (0.001 μJ/cm2) that employs lock-in detection on every pixel in parallel. The SNR is proportional to integration time and inversely proportional to effective noise bandwidth.
APA, Harvard, Vancouver, ISO, and other styles
6

Issa, Shady, Paolo Romano, and Tiago Lopes. "Speculative Read Write Locks." In Middleware '18: 19th International Middleware Conference. ACM, 2018. http://dx.doi.org/10.1145/3274808.3274825.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Liu, Yanning, Sean Kang, Bo Li, and Tung Nguyen. "Characteristics of Ramp Load of Hard Disk Drive With Magnetic Bias and Inertia Latch." In ASME 2007 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2007. http://dx.doi.org/10.1115/detc2007-34288.

Full text
Abstract:
Hard disk drive (HDD) is a standard component of computer systems for data storage. With the advance of technology, increase of capacity and reduction of price, it is now used more and more in non-traditional computing systems, such as camcorders, portable video and music players, etc. These new applications have different emphasis on HDD performance compared to computers. They might not require very large storage capacity, super fast read access, but need high reliability under operational and non-operational conditions. In particularly, for portable devices, HDD has to survive common non-operational shocks during the daily usage of the devices. One design to improve HDD non-operational shock resistance is to unload read-write heads from media to a ramp after power off instead of leaving them on the medial at a special landing zone. A latch mechanism, such as the pawl latch studied in this paper, is then used to lock them on the ramp. During shock events, all the heads are well separated or limited by the ramp to protect them from hitting each other. Since the heads are off the media, they will not contact the media and cause data loss either. The reliability of load/unload (L/UL) drives, however, does not come free. Other than some design changes, which tend to increase cost, extra care also needs to be taken to load the heads to the media or unload them from the media to the ramp. This paper takes a close look at the inertia/magnetic latch non-operational shock performance and the actuator load process. Mechanical, servo and electronic systems are considered together to create a closed-loop simulation model. The effects of voice coil motor Kt drop off, magnetic latch torque bias, IR sensing circuit on load velocity variation are examined. The physical insights provided in the paper should facilitate the design of HDD.
APA, Harvard, Vancouver, ISO, and other styles
8

Jang, Hyunchul, Dae-Hyun Kim, Madhusuden Agrawal, et al. "A Joint-Industry Effort to Develop and Verify CFD Modeling Practice for Vortex-Induced Motion of a Deep-Draft Semi-Submersible." In ASME 2021 40th International Conference on Ocean, Offshore and Arctic Engineering. American Society of Mechanical Engineers, 2021. http://dx.doi.org/10.1115/omae2021-63785.

Full text
Abstract:
Abstract Platform Vortex Induced Motion (VIM) is an important cause of fatigue damage on risers and mooring lines connected to deep-draft semi-submersible floating platforms. The VIM design criteria have been typically obtained from towing tank model testing. Recently, computational fluid dynamics (CFD) analysis has been used to assess the VIM response and to augment the understanding of physical model test results. A joint industry effort has been conducted for developing and verifying a CFD modeling practice for the semi-submersible VIM through a working group of the Reproducible Offshore CFD JIP. The objectives of the working group are to write a CFD modeling practice document based on existing practices validated for model test data, and to verify the written practice by blind calculations with five CFD practitioners acting as verifiers. This paper presents the working group’s verification process, consisting of two stages. In the initial verification stage, the verifiers independently performed free-decay tests for 3-DOF motions (surge, sway, yaw) to check if the mechanical system in the CFD model is the same as in the benchmark test. Additionally, VIM simulations were conducted at two current headings with a reduced velocity within the lock-in range, where large sway motion responses are expected,. In the final verification stage, the verifiers performed a complete set of test cases with small revisions of their CFD models based on the results from the initial verification. The VIM responses from these blind calculations are presented, showing close agreement with the model test data.
APA, Harvard, Vancouver, ISO, and other styles
9

Lev, Yossi, Victor Luchangco, and Marek Olszewski. "Scalable reader-writer locks." In the twenty-first annual symposium. ACM Press, 2009. http://dx.doi.org/10.1145/1583991.1584020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Krieger, Orran, Michael Stumm, Ron Unrau, and Jonathan Hanna. "A Fair Fast Scalable Rea,der-Writer Lock." In 1993 International Conference on Parallel Processing - ICPP'93 Vol2. IEEE, 1993. http://dx.doi.org/10.1109/icpp.1993.21.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Write lock"

1

Hsieh, Wilson C., and William E. Weihl. Scalable Reader-Writer Locks for Parallel Systems. Defense Technical Information Center, 1991. http://dx.doi.org/10.21236/ada243147.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Das, Jishnu, Joanna Härmä, Lant Pritchett, and Jason Silberstein. Forum: Why and How the Public vs. Private Schooling Debate Needs to Change. Research on Improving Systems of Education (RISE), 2023. http://dx.doi.org/10.35489/bsg-rise-misc_2023/12.

Full text
Abstract:
“Are private schools better than public schools?” This ubiquitous debate in low- and middle-income countries is the wrong one to have. The foreword and three essays collected in this Forum each explore how to move past the stuck “public vs. private” binary. Jason Silberstein is a Research Fellow at RISE. His foreword is titled “A Shift in Perspective: Zooming Out from School Type and Bringing Neighborhood Education Systems into Focus.” It summarizes the current state of the “public vs. private” debate, outlines an alternative approach focused on neighborhood education systems, and then synthesizes key findings from the other essays. Jishnu Das has conducted decades of research on school systems in low-income countries, including in Zambia, India, and Pakistan. His essay is titled “The Emergence and Consequence of Schooling Markets.” It describes exactly what schooling markets look like in Pakistan, including the incredible variance in school quality in both public and private schools within the same village. Das then reviews the evidence on how to engineer local education markets to improve learning in all schools, including polices that have underdelivered (e.g., vouchers) and more promising policies (e.g., finance and information structured to take advantage of inter-school competition, and a focus on the lowest performing public schools). Das’ research on Pakistan is available through leaps.hks.harvard.edu, which also houses the data and documentation for the project. Lant Pritchett writes from a global lens grounded in his work on systems thinking in education. His essay is titled “Schooling Ain’t Just Learning: Controlling the Means of Producing Citizens.” It observes that governments supply, and families demand, education for many reasons. The academic emphasis on one of these reasons, producing student learning, has underweighted the critical importance of other features of education, in particular the socialization function of schooling, which more persuasively explain patterns of provision of both public school and different kinds of private schools. With this key fact in mind, Pritchett argues that there is a strong liberty case for allowing private schools, but that calls for governments to fund them are either uncompelling or “aggressively missing the point”. Joanna Härmä has done mixed-methods research on private schools across many cities and rural areas in sub-Saharan Africa and India, and has also founded a heavily-subsidized private school in Uttar Pradesh, India. Her essay responds to both Das and Pritchett and is titled “Why We Need to Stop Worrying About People’s Coping Mechanism for the ‘Global Learning Crisis’—Their Preference for Low-Fee Private Schools”. It outlines the different forces behind the rise of low-fee private schools and asserts that both the international development sector and governments have failed to usefully respond. Policy toward these private schools is sometimes overzealous, as seen in regulatory regimes that in practice are mostly used to extract bribes, and at other times overly solicitous, as seen in government subsidies that would usually be better spent improving the worst government schools. Perhaps, Härmä concludes, “we should leave well enough alone.”
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography