Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Copy-on-write

Known as: Copy on write, Cow (disambiguation), Implicit sharing 
Copy-on-write (COW), sometimes referred to as implicit sharing or shadowing, is a resource management technique used in computer programming to… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
Recent interest in persistent memory (PM) has stirred development of index structures that are efficient in PM. Recent such… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2009
Highly Cited
2009
The phase-change random access memory (PRAM) technology is fast maturing to production levels. Main advantages of PRAM are non… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
Highly Cited
2008
Highly Cited
2008
NAND flash memories have bit errors that are corrected by error-correction codes (ECC). We present raw error data from multi… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2005
Highly Cited
2005
A seismic attribute is a quantitative measure of a seismic characteristic of interest. Analysis of attributes has been integral… Expand
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Digital images are easy to manipulate and edit due to availability of powerful image processing and editing software. Nowadays… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2001
Highly Cited
2001
We study the provision of public goods when all agents have complete information and can write binding agreements. This framework… Expand
Is this relevant?
Highly Cited
2000
Highly Cited
2000
New design technologies rely on truly reusable IP blocks with simple means of assembly. Asynchronous methodologies could be a… Expand
  • figure 2
  • figure 1
  • figure 3
  • figure 5
  • figure 8
Is this relevant?
Highly Cited
1996
Highly Cited
1996
Role-based access control (RBAC) is a promising alternative to traditional discretionary and mandatory access controls. In RBAC… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1994
Highly Cited
1994
We approach the difficult task of analyzing the complex behavior of even the simplest learning classifier system (LCS) by… Expand
Is this relevant?
Highly Cited
1989
Highly Cited
1989
Several methods currently exist for detecting data races in an execution of a shared-memory parallel program. Although these… Expand
  • figure 1
Is this relevant?