Results 1  10
of
758,111
Algorithms for Scalable Synchronization on SharedMemory Multiprocessors
 ACM Transactions on Computer Systems
, 1991
"... Busywait techniques are heavily used for mutual exclusion and barrier synchronization in sharedmemory parallel programs. Unfortunately, typical implementations of busywaiting tend to produce large amounts of memory and interconnect contention, introducing performance bottlenecks that become marke ..."
Abstract

Cited by 573 (32 self)
 Add to MetaCart
new scalable algorithm for spin locks that generates O(1) remote references per lock acquisition, independent of the number of processors attempting to acquire the lock. Our algorithm provides reasonable latency in the absence of contention, requires only a constant amount of space per lock
Some Laws of a System With a Constant Amount of Energy
"... In this paper, different relationships and functional dependences of a system with a constant energy U=const.,have been analyzed. The combinatorial nature of this analysis enables the conclusion that a family of entropy curves i.e. σ (N, U), for U = const, have an envelope. The envelope theory is ve ..."
Abstract
 Add to MetaCart
In this paper, different relationships and functional dependences of a system with a constant energy U=const.,have been analyzed. The combinatorial nature of this analysis enables the conclusion that a family of entropy curves i.e. σ (N, U), for U = const, have an envelope. The envelope theory
Monopolistic competition and optimum product diversity. The American Economic Review,
, 1977
"... The basic issue concerning production in welfare economics is whether a market solution will yield the socially optimum kinds and quantities of commodities. It is well known that problems can arise for three broad reasons: distributive justice; external effects; and scale economies. This paper is c ..."
Abstract

Cited by 1911 (5 self)
 Add to MetaCart
is concerned with the last of these. The basic principle is easily stated.' A commodity should be produced if the costs can be covered by the sum of revenues and a properly defined measure of consumer's surplus. The optimum amount is then found by equating the demand price and the marginal cost
Provable Data Possession at Untrusted Stores
, 2007
"... We introduce a model for provable data possession (PDP) that allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it. The model generates probabilistic proofs of possession by sampling random sets of blocks from the serv ..."
Abstract

Cited by 302 (9 self)
 Add to MetaCart
the server, which drastically reduces I/O costs. The client maintains a constant amount of metadata to verify the proof. The challenge/response protocol transmits a small, constant amount of data, which minimizes network communication. Thus, the PDP model for remote data checking supports large data sets
New Directions in Traffic Measurement and Accounting
, 2001
"... Accurate network traffic measurement is required for accounting, bandwidth provisioning, and detecting DOS attacks. However, keeping a counter to measure the traffic sent by each of a million concurrent flows is too expensive (using SRAM) or slow (using DRAM). The current stateoftheart (e.g., Cis ..."
Abstract

Cited by 353 (11 self)
 Add to MetaCart
showing that a number of simple solutions based on cached counters and classical sampling do not work, we describe two novel and scalable schemes for this purpose which take a constant number of memory references per packet and use a small amount of memory. Further, unlike NetFlow estimates, we have
Response of a Coupled Ocean–Atmosphere Model to Increasing Atmospheric Carbon Dioxide: Sensitivity to the Rate of Increase
 JOURNAL OF CLIMATE
, 1999
"... The influence of differing rates of increase of the atmospheric CO 2 concentration on the climatic response is investigated using a coupled ocean–atmosphere model. Five transient integrations are performed each using a different constant exponential rate of CO 2 increase ranging from 4 % yr �1 to 0. ..."
Abstract

Cited by 334 (21 self)
 Add to MetaCart
The influence of differing rates of increase of the atmospheric CO 2 concentration on the climatic response is investigated using a coupled ocean–atmosphere model. Five transient integrations are performed each using a different constant exponential rate of CO 2 increase ranging from 4 % yr �1 to 0
An Analytical Constant Modulus Algorithm
, 1996
"... Iterative constant modulus algorithms such as Godard and CMA have been used to blindly separate a superposition of cochannel constant modulus (CM) signals impinging on an antenna array. These algorithms have certain deficiencies in the context of convergence to local minima and the retrieval of all ..."
Abstract

Cited by 166 (35 self)
 Add to MetaCart
Iterative constant modulus algorithms such as Godard and CMA have been used to blindly separate a superposition of cochannel constant modulus (CM) signals impinging on an antenna array. These algorithms have certain deficiencies in the context of convergence to local minima and the retrieval
Faulttolerant quantum computation
 In Proc. 37th FOCS
, 1996
"... It has recently been realized that use of the properties of quantum mechanics might speed up certain computations dramatically. Interest in quantum computation has since been growing. One of the main difficulties in realizing quantum computation is that decoherence tends to destroy the information i ..."
Abstract

Cited by 264 (5 self)
 Add to MetaCart
as originally believed. For any quantum computation with t gates, we show how to build a polynomial size quantum circuit that tolerates O(1 / log c t) amounts of inaccuracy and decoherence per gate, for some constant c; the previous bound was O(1 /t). We do this by showing that operations can be performed
Results 1  10
of
758,111