locking protocol
Recently Published Documents


TOTAL DOCUMENTS

83
(FIVE YEARS 9)

H-INDEX

10
(FIVE YEARS 1)

Author(s):  
Tianli Wei ◽  
Dewei Wu ◽  
Qiang Miao ◽  
Chunyan Yang

Abstract Entanglement has attracted great attention in the past few decades due to its potential applications in the field of quantum information protocols. From now, achieving excellent phase locking in entanglement generation is significant yet a challenging task in cryogenic quantum technology. In this work, we propose and demonstrate a comprehensive paradigm of phase locking protocol for quadrature entanglement at the microwave wavelengths. We carry out a theoretical derivation of the quadrature entangled microwaves generated based on Josephson Parametric Amplifiers (JPAs), and the phase locking error signal, which is used to lock the relative phase of zero between the two quadrature squeezed microwaves. Simulating data for the phase locking scheme are shown under different parameter settings for comparison. Finally, we use the proposed phase locking scheme to enable a stable output of quadrature entangled microwave.


2021 ◽  
Vol 20 (5s) ◽  
pp. 1-22
Author(s):  
Zewei Chen ◽  
Hang Lei ◽  
Maolin Yang ◽  
Yong Liao ◽  
Lei Qiao

Parallel tasks have been paid growing attention in recent years, and the scheduling with shared resources is of significant importance to real-time systems. As an efficient mechanism to provide mutual exclusion for parallel processing, spin-locks are ubiquitous in multi-processor real-time systems. However, the spin-locks suffer the scalability problem, and the intra-task parallelism further exacerbates the analytical pessimism. To overcome such deficiencies, we propose a Hierarchical Hybrid Locking Protocol (H2LP) under federated scheduling. The proposed H2LP integrates the classical Multiprocessor Stack Resource Policy (MSRP) and uses a token mechanism to reduce global contentions. We provide a complete analysis framework supporting both heavy and light tasks under federated scheduling and develop a blocking analysis with the state-of-the-art linear optimization technique. Empirical evaluations showed that the H2LP outperformed the other state-of-the-art locking protocols in at least configurations when considering exclusive clustering. Furthermore, our partitioned approach for light tasks can substantially improve schedulability by mitigating the over-provisioning problem.


2021 ◽  
Vol 9 (1) ◽  
pp. 932-947
Author(s):  
Ms. Swati, Dr. Shalini Bhaskar Bajaj, Dr. Vivek Jaglan

We present an efficient locking scheme in a hierarchical data structure. The existing multi-granularity locking mechanism works on two extremes: fine-grained locking through which concurrency is being maximized, and coarse grained locking that is being applied to minimize the locking cost. Between the two extremes, there lies several pare to-optimal options that provide a trade-off between the concurrency that can be attained. In this work, we present a locking technique, Collaborative Granular Version Locking (CGVL) which selects an optimal locking combination to serve locking requests in a hierarchical structure. In CGVL a series of version is being maintained at each granular level which allows the simultaneous execution of read and write operation on the data item. Our study reveals that in order to achieve optimal performance the lock manager explore various locking options by converting certain non-supporting locking modes into supporting locking modes thereby improving the existing compatibility matrix of multiple granularity locking protocol. Our claim is being quantitatively validated by using a Java Sun JDK environment, which shows that our CGVL perform better compared to the state-of-the-art existing MGL methods. In particular, CGVL attains 20% reduction in execution time for the locking operation that are being carried out by considering, the following parameters: i) The number of threads ii) The number of locked object iii) The duration of critical section (CPU Cycles) which significantly supports the achievement of enhanced concurrency  in terms of  the number of concurrent read accesses.


2020 ◽  
Vol 7 (3) ◽  
pp. 1-32
Author(s):  
Milind Chabbi ◽  
Abdelhalim Amer ◽  
Xu Liu
Keyword(s):  

Author(s):  
Maolin Yang ◽  
Zewei Chen ◽  
Xu Jiang ◽  
Nan Guan ◽  
Hang Lei
Keyword(s):  

2020 ◽  
Vol 9 (3) ◽  
pp. 1198-1207
Author(s):  
Khairul Anshar ◽  
Nanna Suryana ◽  
Noraswaliza Noraswaliza

The current approach to handle interleaved write operation and preserve consistency in relational database system still relies on the locking protocol. If any entity is locked by any transaction, then it becomes temporary unavailable to other transaction until the lock is released. The temporary unavailability can be more often if the number of write operation increases as happens in the application systems that utilize IoT technology or smartphone devices to collect the data. To solve this problem, this research is proposed blind write protocol which does not lock the entity while the transaction is performing a write operation. This paper presents the basic principles of blind write protocol implementation in a relational database system


2020 ◽  
Vol 41 (12) ◽  
pp. 3420-3438
Author(s):  
Shivakumar Viswanathan ◽  
Rouhollah O. Abdollahi ◽  
Bin A. Wang ◽  
Christian Grefkes ◽  
Gereon R. Fink ◽  
...  
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document