First Page | Document Content | |
---|---|---|
![]() Date: 2009-05-28 13:15:52Technology Scheduling algorithms Concurrency Priority inversion Priority ceiling protocol Priority inheritance Scheduling Lock Object request broker Concurrency control Real-time computing Computing | Source URL: www.omg.orgDownload Document from Source WebsiteFile Size: 35,28 KBShare Document on Facebook |
![]() | Verifying Concurrency in an Adaptive Ocean Circulation Model Alper Altuntas 1DocID: 1xVYz - View Document |
![]() | C/C++ Concurrency: Formalization and Model Finding Mark Batty Jasmin Blanchette Susmit Sarkar Peter SewellDocID: 1xVyg - View Document |
![]() | SDNRacer: Detecting Concurrency Violations in Software-Defined NetworksDocID: 1xVts - View Document |
![]() | SDNRacer: Detecting Concurrency Violations in Software-Defined NetworksDocID: 1xUY7 - View Document |
![]() | SDNRacer Concurrency Analysis for SDNs Ahmed El-Hassany Jeremie Miserez Pavol Bielik Laurent VanbeverDocID: 1xUyW - View Document |