Zobrazeno 1 - 10
of 340
pro vyhledávání: '"Non-blocking algorithm"'
Publikováno v:
IEEE Transactions on Cloud Computing. 10:2508-2520
The pervasive deployment of cloud services poses an ever-increasing demand for cross-client deduplication solutions to save network bandwidth, lower storage costs, and improve backup speeds. However, existing solutions typically depend on lock based
Publikováno v:
SPAA
Concurrent data structures provide fundamental building blocks for concurrent programming. Standard concurrent data structures may be extended by allowing a sequence of operations to be submitted as a batch for later execution. A sequence of such ope
Publikováno v:
ICDCN
The Nearest neighbour search (NNS) is a fundamental problem in many application domains dealing with multidimensional data. In a concurrent setting, where dynamic modifications are allowed, a linearizable implementation of the NNS is highly desirable
Publikováno v:
Journal of Parallel and Distributed Computing. 155:1-13
Hash tries are a trie-based data structure with nearly ideal characteristics for the implementation of hash maps. Starting from a particular lock-free hash map data structure, named Lock-Free Hash Tries, we focus on solving the problem of memory recl
Publikováno v:
ACM Transactions on Parallel Computing. 8:1-38
Concurrent key-value stores with range query support are crucial for the scalability and performance of many applications. Existing lock-free data structures of this kind use a fixed synchronization granularity. Using a fixed synchronization granular
Autor:
Miguel Areias, Ricardo Rocha
Publikováno v:
Journal of Parallel and Distributed Computing. 150:184-195
Hash tries are a trie-based data structure with nearly ideal characteristics for the implementation of hash maps. In this paper, we present a novel, simple and scalable hash trie map design that fully supports the concurrent search, insert and remove
Autor:
Sang-gi Lee, NaiHoon Jung
Publikováno v:
Journal of Korea Game Society. 20:53-63
Publikováno v:
Proceedings of the VLDB Endowment. 13:3195-3203
Database systems based on ARIES [11] protocol rely on Write Ahead Logging (WAL) to recover the database in the event of a crash. WAL protocol requires changes to the database are recorded to the transaction log before updating the underlying database
Publikováno v:
ACM Transactions on Parallel Computing. 7:1-64
We present a lock-free algorithm for concurrent manipulation of a binary search tree (BST) in an asynchronous shared memory system that supports search, insert, and delete operations. In addition to read and write instructions, our algorithm uses (si
Autor:
Alberto Salguero, Antonio J. Tomeu
Publikováno v:
Journal of Integrative Bioinformatics, Vol 17, Iss 1, Pp 730-45 (2020)
Journal of Integrative Bioinformatics
Journal of Integrative Bioinformatics. 2020; 20190070
RODIN. Repositorio de Objetos de Docencia e Investigación de la Universidad de Cádiz
Agencia Estatal de Meteorología (AEMET)
RODIN: Repositorio de Objetos de Docencia e Investigación de la Universidad de Cádiz
Universidad de Cádiz
Journal of Integrative Bioinformatics
Journal of Integrative Bioinformatics. 2020; 20190070
RODIN. Repositorio de Objetos de Docencia e Investigación de la Universidad de Cádiz
Agencia Estatal de Meteorología (AEMET)
RODIN: Repositorio de Objetos de Docencia e Investigación de la Universidad de Cádiz
Universidad de Cádiz
In the field of computational biology, in order to simulate multiscale biological systems, the Cellular Potts Model (CPM) has been used, which determines the actions that simulated cells can perform by determining a hamiltonian of energy that takes i