Results 1 to 10 of about 15,702 (248)

Research on Strong Cache Consistency Under Generic Cache Replacement Strategy [PDF]

open access: yesJisuanji gongcheng, 2022
Establishing an accurate cache analysis model helps to predict the cache behavior better, which is vital for network performance analysis and planning.However, existing analysis models for cache consistency studies are based on the Least Recently Used ...
YANG Tao, ZHENG Quan, XU Zhenghuan, SHI Qianbao, PENG Siwei
doaj   +1 more source

Implementation and Optimization of Apache Spark Cache System Based on Mixed Memory [PDF]

open access: yesJisuanji kexue, 2023
With increasing data scale in the “big data era”,in-memory computing frameworks have grown significantly.The mainstream in-memory computing framework Apache Spark uses memory to cache intermediate results,which greatly improves data processing ...
WEI Sen, ZHOU Haoran, HU Chuang, CHENG Dazhao
doaj   +1 more source

Reuse Information-based Dynamic Bypass Policy for Non-Volatile Cache [PDF]

open access: yesJisuanji gongcheng, 2021
Non-Volatile Memory(NVM) has the advantages of low energy consumption,strong scalability and high storage density.It can replace the traditional Static Random Access Memory (SRAM) as on-chip cache,but is also faced with high energy consumption and delay ...
JIAO Tong, CHEN Lingling, AN Xin, LI Jianhua
doaj   +1 more source

Named data network dynamic cache placement strategy based on programmable data plane

open access: yesIET Networks, 2023
Aiming at the efficiency and implementation of in‐network cache in Named Data Network, an in‐network cache method based on the programmable data plane was proposed.
Saifeng Hou, Yuxiang Hu, Le Tian
doaj   +1 more source

A CACHE DESIGN METHOD FOR SPATIAL INFORMATION VISUALIZATION IN 3D REAL-TIME RENDERING ENGINE [PDF]

open access: yesThe International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 2012
A well-designed cache system has positive impacts on the 3D real-time rendering engine. As the amount of visualization data getting larger, the effects become more obvious.
X. Dai, H. Xiong, X. Zheng
doaj   +1 more source

Defending Against Flush+Reload Attack With DRAM Cache by Bypassing Shared SRAM Cache

open access: yesIEEE Access, 2020
Cache side-channel attack is one of the critical security threats to modern computing systems. As a representative cache side-channel attack, Flush+Reload attack allows an attacker to steal confidential information (e.g., private encryption key) by ...
Minwoo Jang   +3 more
doaj   +1 more source

Hubungan Antara Cache, Energy Consumption dan Runtime Performance pada Progressive Web Apps

open access: yesJurnal Teknologi Informasi dan Ilmu Komputer, 2022
Progresive Web Apps merupakan teknologi mutakhir di pengembangan web. Kehadiran Progresive Web Apps memberikan dampak positif bagi pengembang Web, yang mana keunggulannya memberikan peningkatan performa secara signifikan.
Wakhid Kurniawan, Agung Fatwanto
doaj   +1 more source

On Consideration of Content and Memory Sizes in 5G D2D-Assisted Caching Networks

open access: yesIEEE Access, 2020
Device-to-Device (D2D) communication with caching technology has emerged as a promising technique for offloading the traffic and boosting the throughput of the fifth generation (5G) cellular networks.
Yujing Lin   +4 more
doaj   +1 more source

Sur les traces de l’emprunt caché

open access: yesRecherches, 2012
Les apparences sont trompeuses : le singulier vocable « caché » révèle une pluralité homonymique et polysémique. L’emprunt une fois identifié, nous essayons de reconstituer l’itinéraire de la / les forme(s) empruntée(s) : date d’entrée, catégorie ...
Stéphane Oury
doaj   +1 more source

Cache Replacement Strategy With Limited Service Capacity in Heterogeneous Networks

open access: yesIEEE Access, 2020
Recently, cellular networks face a huge challenge to satisfy large increment of user demands for higher-speed and lower-latency communication service. One promising solution is to apply the cache technology in edge cache networks to reduce redundant data
Le Jiang, Xinglin Zhang
doaj   +1 more source

Home - About - Disclaimer - Privacy