Zobrazeno 1 - 10
of 34
pro vyhledávání: '"File locking"'
Publikováno v:
2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS).
Steganography is the practise of concealing information in another type. Many different carrier file formats may be used, but digital images are most popular. This involved with the stronger and weaker image hiding, file compression, file locking, fi
Autor:
Sminu Paul, Jisha P Abraham
Publikováno v:
Proceedings of ICETIT 2019 ISBN: 9783030305765
The adaptability of parallel processes is regularly limited by the execution of critical section. Effective management of locking algorithms shows significant changes in performance. Round robin delegation algorithm can be used to assign lock to boos
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1f2d376f23996ce5a0828cca15ae16d4
https://doi.org/10.1007/978-3-030-30577-2_7
https://doi.org/10.1007/978-3-030-30577-2_7
Autor:
James R. Strickland
Publikováno v:
Raspberry Pi for Arduino Users ISBN: 9781484234136
The ability to add processes, especially to load different applications in them (which you can with commands we didn’t talk about last chapter), is a useful capability. But there are some downsides. Getting one process to communicate with another,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9069646e8f900a737074bb352c3d3df3
https://doi.org/10.1007/978-1-4842-3414-3_8
https://doi.org/10.1007/978-1-4842-3414-3_8
Publikováno v:
ISPDC
More and more massive parallel codes running on several hundreds of thousands of cores enter the computational science and engineering domain, allowing high-fidelity computations up to trillions of unknowns for very detailed analyses of the underlyin
Publikováno v:
IEEE Transactions on Parallel and Distributed Systems. 23:271-279
Massively parallel applications often require periodic data checkpointing for program restart and post-run data analysis. Although high performance computing systems provide massive parallelism and computing power to fulfill the crucial requirements
Autor:
Wei-keng Liao
Publikováno v:
IEEE Transactions on Parallel and Distributed Systems. 22:260-272
MPI collective I/O has been an effective method for parallel shared-file access and maintaining the canonical orders of structured data in files. Its implementation commonly uses a two-phase I/O strategy that partitions a file into disjoint file doma
Publikováno v:
The International Journal of High Performance Computing Applications. 21:144-154
Client-side file caching is one of many I/O strategies adopted by today's parallel file systems that were initially designed for distributed systems. Most of these implementations treat each client independently because clients' computations are seld
Publikováno v:
2015 12th International Conference on Information Technology - New Generations.
The world of Operating Systems has evolved a lot, especially these late years, mainly due to technology in hardware, but also because of ever growing user and market requirements. Anyway, some basic concepts and implementations are still stuck around
Publikováno v:
IEEE Transactions on Parallel and Distributed Systems. 17:1264-1276
We investigate the message passing interface input/output (MPI I/O) implementation issues for two overlapping access patterns: the overlaps among processes within a single I/O operation and the overlaps across a sequence of I/O operations. The former
Publikováno v:
Concurrency and Computation: Practice and Experience. 29:e4165
More and more massive parallel codes running on several hundreds of thousands of cores enter the computational science and engineering domain, allowing high-fidelity computations on up to trillions of unknowns for very detailed analyses of the underl