Monitor (synchronization)

Known as: Condition object, Condition, Condition variable 
In concurrent programming, a monitor is a synchronization construct that allows threads to have both mutual exclusion and the ability to wait (block… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
Increasingly ubiquitous communication networks and connectivity via portable devices have engendered a host of applications in… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Large-scale acquisition of exterior urban environments is by now a well-established technology, supporting many applications in… (More)
Is this relevant?
Highly Cited
2006
Highly Cited
2006
The run-time monitoring of Web service compositions has been widely acknowledged as a significant and challenging problem. In… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2005
Highly Cited
2005
A common task in computer graphics is the mapping of digital high dynamic range images to low dynamic range display devices such… (More)
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Transactional monitors are proposed as an alternative to monitors based on mutual-exclusion synchronization for object-oriented… (More)
  • figure 2
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2003
Highly Cited
2003
This paper addresses some issues involved in applying the eventcondition-action (ECA) rule paradigm of active databases to… (More)
Is this relevant?
Highly Cited
2001
Highly Cited
2001
In emerging markets, the concentration of corporate ownership has created agency conflicts between controlling owners and… (More)
  • table 1
  • table 2
  • table 4
  • table 5
  • table 6
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Manyfault injectiontoolsare availablefor dependability assessment. Althoughthesetoolsaregoodat injectinga singlefault modelinto a… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • table 1
Is this relevant?
Highly Cited
1997
Highly Cited
1997
One method for detecting fraud is to check for suspicious changes in user behavior. This paper describes the automatic design of… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
1991
Highly Cited
1991
AbstructDatabase updates are small and incremental compared to database contents. It is therefore desirable that recomputations… (More)
Is this relevant?