Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Hazard pointers: Safe memory reclamation for lock-free objects
MM Michael - IEEE Transactions on Parallel and Distributed …, 2004 - ieeexplore.ieee.org
Lock-free objects offer significant performance and reliability advantages over conventional
lock-based objects. However, the lack of an efficient portable lock-free method for the …
lock-based objects. However, the lack of an efficient portable lock-free method for the …
Software transactional memory for dynamic-sized data structures
We propose a new form of software transactional memory (STM) designed to support
dynamic-sized data structures, and we describe a novel non-blocking implementation. The …
dynamic-sized data structures, and we describe a novel non-blocking implementation. The …
{OSv—Optimizing} the Operating System for Virtual Machines
Virtual machines in the cloud typically run existing general-purpose operating systems such
as Linux. We notice that the cloud's hypervisor already provides some features, such as …
as Linux. We notice that the cloud's hypervisor already provides some features, such as …
A scalable lock-free stack algorithm
D Hendler, N Shavit, L Yerushalmi - Proceedings of the sixteenth annual …, 2004 - dl.acm.org
The literature describes two high performance concurrent stack algorithms based on
combining funnels and elimination trees. Unfortunately, the funnels are linearizable but …
combining funnels and elimination trees. Unfortunately, the funnels are linearizable but …
[KIRJA][B] Handbook of data structures and applications
Although there are many advanced and specialized texts and handbooks on algorithms,
until now there was no book that focused exclusively on the wide variety of data structures …
until now there was no book that focused exclusively on the wide variety of data structures …
Transactional lock-free execution of lock-based programs
This paper is motivated by the difficulty in writing correct high-performance programs. Writing
shared-memory multi-threaded programs imposes a complex trade-off between …
shared-memory multi-threaded programs imposes a complex trade-off between …
Split-ordered lists: Lock-free extensible hash tables
O Shalev, N Shavit - Journal of the ACM (JACM), 2006 - dl.acm.org
We present the first lock-free implementation of an extensible hash table running on current
architectures. Our algorithm provides concurrent insert, delete, and find operations with an …
architectures. Our algorithm provides concurrent insert, delete, and find operations with an …
Zero-shot kernel learning
In this paper, we address an open problem of zero-shot learning. Its principle is based on
learning a map** that associates feature vectors extracted from ie images and attribute …
learning a map** that associates feature vectors extracted from ie images and attribute …
GPS: Navigating weak memory with ghosts, protocols, and separation
Weak memory models formalize the inconsistent behaviors that one can expect to observe
in multithreaded programs running on modern hardware. In so doing, however, they …
in multithreaded programs running on modern hardware. In so doing, however, they …
Fastforward for efficient pipeline parallelism: a cache-optimized concurrent lock-free queue
Low overhead core-to-core communication is critical for efficient pipeline-parallel software
applications. This paper presents FastForward, a cache-optimized single-producer/single …
applications. This paper presents FastForward, a cache-optimized single-producer/single …