×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [critical sections]
SecureBus: Towards Application- Transparent Trusted Computing with Mandatory Access Control Xinwen Zhang 1, Songqing Chen 2 Michael J. Covington 3, and
213 views
8 February 2014Nick Tredennick Reconfigurable Systems Emerge Nick Tredennick, Editor Gilder Technology Report
[email protected]
214 views
C10M: Defending the Internet at scale by Robert David Graham (Shmoocon 2013)
217 views
Performance Tuning Panotools - PTMender. Layout Project Goal About Panotools Multi-threading SIMD, micro-architectural pitfalls Results
212 views
Priority Inheritance and Priority Ceiling Protocols L. Sha, R. Rajkumar, and J. P. Lehoczky, "Priority Inheritance Protocols: An Approach to Real-Time
219 views
Introduction to Embedded Systems Resource Management - III Lecture 19
222 views
Two-way Slabs. Comparison of One-way and Two-way slab behavior One-way slabs carry load in one direction. Two-way slabs carry load in two directions
250 views
© 2003 Wayne Wolf Overheads for Computers as Components Operating systems zWindows CE (WinCE)
225 views
Operating Systems Part III: Process Management (Process Synchronization)
224 views
OSes: 16. Dist. Coord 1 Operating Systems v Objectives –introduce issues such as event ordering, mutual exclusion, atomicity, deadlock Certificate Program
215 views
Towards a Scalable Non-Blocking Coding Style
265 views
ICDE2010 Nb-GCLOCK
2.204 views
< Prev
Next >