The behavior of these access state bits can be overridden by a corresponding set of bits in the pointer value used to access the memory. The two data trap bits in the access state are independent of each other and are available for use, for example, by a language implementer. If a trap...
Then, Ruppert's insertion algorithm [3] is parallelized on shared memory architectures using the theoretical framework developed by Chernikov et al, albeit with a different and more efficient quad/oct tree structure. Throughout this paper the practical aspects of algorithms have been investigated ...
A software architecture for the hot add and swap of adapters. The software architecture allows users to replace failed components, upgrade outdated components, and add new functionality, such as new n
The SAN described above uses the registration of memory regions to make memory accessible to HCA hardware. Using the verbs defined within the SAN specification, these memory regions must be pinned, i.e. they must remain constant and not be paged out to disk, while the HCA is allowed to acc...