• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 7,195
Next 10 →

Strong Isolation is a Weak Idea

by Luke Dalessandro, Michael L. Scott , 2009
"... In the transactional memory (TM) community, much debate has revolved around the choice of strong vs. weak isolation (SI vs. WI) between transactions and conflicting nontransactional accesses. In this position paper we argue that what programmers really want is the natural transactional extension of ..."
Abstract - Cited by 18 (3 self) - Add to MetaCart
In the transactional memory (TM) community, much debate has revolved around the choice of strong vs. weak isolation (SI vs. WI) between transactions and conflicting nontransactional accesses. In this position paper we argue that what programmers really want is the natural transactional extension

Systems Competition and Network Effects

by Michael L. Katz, Carl Shapiro - JOURNAL OF ECONOMIC PERSPECTIVES—VOLUME 8, NUMBER 2—SPRING 1994—PAGES 93–115 , 1994
"... Many products have little or no value in isolation, but generate value when combined with others. Examples include: nuts and bolts, which together provide fastening services; home audio or video components and programming, which together provide entertainment services; automobiles, repair parts and ..."
Abstract - Cited by 544 (6 self) - Add to MetaCart
Many products have little or no value in isolation, but generate value when combined with others. Examples include: nuts and bolts, which together provide fastening services; home audio or video components and programming, which together provide entertainment services; automobiles, repair parts

An effective hybrid transactional memory system with strong isolation guarantees

by Chi Cao Minh, Martin Trautmann, Jaewoong Chung, Austen Mcdonald, Nathan Bronson, Jared Casper, Christos Kozyrakis, Kunle Olukotun - In ISCA , 2007
"... We propose signature-accelerated transactional memory (SigTM), a hybrid TM system that reduces the overhead of software transactions. SigTM uses hardware signatures to track the read-set and write-set for pending transactions and perform conflict detection between concurrent threads. All other trans ..."
Abstract - Cited by 89 (7 self) - Add to MetaCart
the first hybrid TM system to provide strong isolation guarantees between transactional blocks and nontransactional accesses without additional read and write barriers in non-transactional code. Using a set of parallel programs that make frequent use of coarsegrain transactions, we show that Sig

lmbench: Portable Tools for Performance Analysis

by Carl Staelin, Hewlett-packard Laboratories - In USENIX Annual Technical Conference , 1996
"... lmbench: Portable tools for performance analysis lmbench is a micro-benchmark suite designed to focus attention on the basic building blocks of many common system applications, such as databases, simulations, software development, and networking. In almost all cases, the individual tests are the res ..."
Abstract - Cited by 464 (2 self) - Add to MetaCart
are the result of analysis and isolation of a customer’s actual performance problem. These tools can be, and currently are, used to compare different system implementations from different vendors. In several cases, the benchmarks have uncovered previously unknown bugs and design flaws. The results have shown a

Feedback-directed barrier optimization in a strongly isolated STM

by Nathan G. Bronson, Christos Kozyrakis, Kunle Olukotun - In POPL ’09: Proceedings of the 36th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages , 2009
"... Speed improvements in today’s processors have largely been delivered in the form of multiple cores, increasing the importance of abstractions that ease parallel programming. Software transactional memory (STM) addresses many of the complications of concurrency by providing a simple and composable mo ..."
Abstract - Cited by 5 (3 self) - Add to MetaCart
, consistency and isolation. Strongly isolated STMs preserve the safety properties of transactions for all memory operations in a program, not just those inside an atomic block. Isolation barriers are added to nontransactional loads and stores in such a system to prevent those

Bug Isolation via Remote Program Sampling

by Ben Liblit, Alex Aiken, Alice X. Zheng, Michael I. Jordan - In Proceedings of the ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation , 2003
"... We propose a low-overhead sampling infrastructure for gathering information from the executions experienced by a program 's user community. Several example applications illustrate ways to use sampled instrumentation to isolate bugs. Assertion-dense code can be transformed to share the cost of a ..."
Abstract - Cited by 335 (16 self) - Add to MetaCart
We propose a low-overhead sampling infrastructure for gathering information from the executions experienced by a program 's user community. Several example applications illustrate ways to use sampled instrumentation to isolate bugs. Assertion-dense code can be transformed to share the cost

Why faces are and are not special: An effect of expertise

by Rhea Diamond, Susan Carey - Journal of Experimental Psychology: General , 1986
"... Recognition memory for faces is hampered much more by inverted presentation than is memory for any other material so far examined. The present study demonstrates that faces are not unique with regard to this vulnerability to inversion. The experiments also attempt to isolate the source of the invers ..."
Abstract - Cited by 369 (2 self) - Add to MetaCart
Recognition memory for faces is hampered much more by inverted presentation than is memory for any other material so far examined. The present study demonstrates that faces are not unique with regard to this vulnerability to inversion. The experiments also attempt to isolate the source

An optimal graph theoretic approach to data clustering: Theory and its application to image segmentation

by Zhenyu Wu, Richard Leahy - IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE , 1993
"... A novel graph theoretic approach for data clustering is presented and its application to the image segmentation problem is demonstrated. The data to be clustered are represented by an undirected adjacency graph G with arc capacities assigned to reflect the similarity between the linked vertices. Cl ..."
Abstract - Cited by 360 (0 self) - Add to MetaCart
searching for closed contours of edge elements (equivalent to minimum cuts in G), which consist mostly of strong edges, while rejecting contours containing isolated strong edges. This method is able to accurately locate region boundaries and at the same time guarantees the formation of closed edge contours.

Visual Recognition of American Sign Language Using Hidden Markov Models

by Thad E. Starner, Alex Pentland , 1995
"... Using hidden Markov models (HMM's), an unobstrusive single view camera system is developed that can recognize hand gestures, namely, a subset of American Sign Language (ASL). Previous systems have concentrated on finger spelling or isolated word recognition, often using tethered electronic glov ..."
Abstract - Cited by 348 (14 self) - Add to MetaCart
Using hidden Markov models (HMM's), an unobstrusive single view camera system is developed that can recognize hand gestures, namely, a subset of American Sign Language (ASL). Previous systems have concentrated on finger spelling or isolated word recognition, often using tethered electronic

TAME FUNCTIONS WITH STRONGLY ISOLATED SINGULARITIES AT INFINITY: A TAME VERSION OF A PARUSIŃSKI’S THEOREM

by Vincent Grandjean , 2008
"... Let f: R n ↦ → R be a definable function, enough differentiable. Under the condition of having strongly isolated singularities at infinity at a regular value c, we give a sufficient condition expressed in terms of the total absolute curvature function to ensure the local triviality of f over a nei ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
Let f: R n ↦ → R be a definable function, enough differentiable. Under the condition of having strongly isolated singularities at infinity at a regular value c, we give a sufficient condition expressed in terms of the total absolute curvature function to ensure the local triviality of f over a
Next 10 →
Results 1 - 10 of 7,195
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University