Lock (computer science)

Known as: Lock contention, Lock, Locking (computer science) 
In computer science, a lock or mutex (from mutual exclusion) is a synchronization mechanism for enforcing limits on access to a resource in an… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
Description: Revised and updated with improvements conceived in parallel programming courses, The Art of Multiprocessor… (More)
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Stochastic Gradient Descent (SGD) is a popular algorithm that can achieve state-of-the-art performance on a variety of machine… (More)
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
2004
Highly Cited
2004
  • B.. Razavi
  • IEEE Journal of Solid-State Circuits
  • 2004
Injection locking characteristics of oscillators are derived and a graphical analysis is presented that describes injection… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Mutual-exclusion locks are currently the most popular mechanism for interpro-cess synchronisation, largely due to their apparent… (More)
  • figure 3.2
  • figure 3.4
  • figure 3.6
  • figure 3.7
  • figure 3.9
Is this relevant?
Highly Cited
2003
Highly Cited
2003
This paper describes RacerX, a static tool that uses flow-sensitive, interprocedural analysis to detect both race conditions and… (More)
  • figure 1
  • figure 2
  • table 2
  • figure 3
  • table 1
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Switching costs and network e ects bind customers to vendors if products are incompatible, locking customers or even markets in… (More)
Is this relevant?
Highly Cited
2001
Highly Cited
2001
We present a process for validating temporal safety properties of software that uses a well-defined interface. The process… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2000
Highly Cited
2000
This paper describes a translator called Java PathFinder (Jpf), which translates from Java to Promela, the modeling language of… (More)
Is this relevant?
Highly Cited
1989
Highly Cited
1989
Modeling Modeling is not merely a process of behavioral mimicry. Highly functional patterns of behavior, which constitute the… (More)
Is this relevant?
Highly Cited
1989
Highly Cited
1989
One way hash functions are a major tool in cryptography. DES is the best known and most widely used encryption function in the… (More)
Is this relevant?