8 resultados para System level policy

em Repositório Institucional UNESP - Universidade Estadual Paulista "Julio de Mesquita Filho"


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Software Transactional Memory (STM) systems have poor performance under high contention scenarios. Since many transactions compete for the same data, most of them are aborted, wasting processor runtime. Contention management policies are typically used to avoid that, but they are passive approaches as they wait for an abort to happen so they can take action. More proactive approaches have emerged, trying to predict when a transaction is likely to abort so its execution can be delayed. Such techniques are limited, as they do not replace the doomed transaction by another or, when they do, they rely on the operating system for that, having little or no control on which transaction should run. In this paper we propose LUTS, a Lightweight User-Level Transaction Scheduler, which is based on an execution context record mechanism. Unlike other techniques, LUTS provides the means for selecting another transaction to run in parallel, thus improving system throughput. Moreover, it avoids most of the issues caused by pseudo parallelism, as it only launches as many system-level threads as the number of available processor cores. We discuss LUTS design and present three conflict-avoidance heuristics built around LUTS scheduling capabilities. Experimental results, conducted with STMBench7 and STAMP benchmark suites, show LUTS efficiency when running high contention applications and how conflict-avoidance heuristics can improve STM performance even more. In fact, our transaction scheduling techniques are capable of improving program performance even in overloaded scenarios. © 2011 Springer-Verlag.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Malicious programs (malware) can cause severe damage on computer systems and data. The mechanism that the human immune system uses to detect and protect from organisms that threaten the human body is efficient and can be adapted to detect malware attacks. In this paper we propose a system to perform malware distributed collection, analysis and detection, this last inspired by the human immune system. After collecting malware samples from Internet, they are dynamically analyzed so as to provide execution traces at the operating system level and network flows that are used to create a behavioral model and to generate a detection signature. Those signatures serve as input to a malware detector, acting as the antibodies in the antigen detection process. This allows us to understand the malware attack and aids in the infection removal procedures. © 2012 Springer-Verlag.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The metabolic effects caused by hydric deficiency (HD) on Eucalyptus grandis clones were assessed by an experiment where plants were cultivated in four blocks. The first was the control block, normally irrigated, whereas the other three blocks were submitted to cycles of hydric deficiency. Analysis of photosynthetic efficiency, enzymatic activity of antioxidant response system, level of pigments and L-proline concentration were performed to evaluate the HD effects. Results showed that HD altered some parameters related to photosynthetic activity, pigments accumulation, proline and enzymatic activity. Clone 433 of E. grandis presented higher response ability to HD.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq)

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The atomic superradiant emission is treated in the single-particle mean-field approximation. A single-particle Hamiltonian, which represents a dressed two-level atom in a radiation field, can be obtained and it is verified that it describes the transient regime of the emission process. While the line-shape emission for a bare atom follows the sech2 law, for the dressed atom the line shape deviates appreciably from this law and it is verified that the deviation depends crucially on the ratio of the dynamic frequency shift to the transition frequency. This kind of deviation is observed in experimental results. © 1990 The American Physical Society.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The aim of this study was to evaluate the shape of dental cavities made with the CVDentus® system using different ultrasound power levels. One standard cavity was made on the buccal aspect of 15 bovine incisors with a CVDentus® cylindrical bur (82142). The sample was divided into three groups: G1 - ultrasound with power II; G2 - ultrasound with power III; and G3 - ultrasound with power IV. A standardizing device was used to obtain standardized preparations and ultrasound was applied during one minute in each dental preparation. The cavities were sectioned in the middle, allowing observation of the cavity's profile with a magnifying glass, and width and depth measurement using the Leica Qwin program. The Kruskal-Wallis (p < 0.05) and Dunn statistical analyses demonstrated differences between the dental cavity shapes when powers III and IV were used. However, the cavities that were made with power III presented dimensions similar to those of the bur used for preparation. We concluded that the power recommended by the manufacturer (III) is the most adequate for use with the CVDentus® system.