Research on Strong Cache Consistency Under Generic Cache Replacement Strategy [PDF]
Establishing an accurate cache analysis model helps to predict the cache behavior better, which is vital for network performance analysis and planning.However, existing analysis models for cache consistency studies are based on the Least Recently Used ...
YANG Tao, ZHENG Quan, XU Zhenghuan, SHI Qianbao, PENG Siwei
doaj +1 more source
Implementation and Optimization of Apache Spark Cache System Based on Mixed Memory [PDF]
With increasing data scale in the “big data era”,in-memory computing frameworks have grown significantly.The mainstream in-memory computing framework Apache Spark uses memory to cache intermediate results,which greatly improves data processing ...
WEI Sen, ZHOU Haoran, HU Chuang, CHENG Dazhao
doaj +1 more source
Reuse Information-based Dynamic Bypass Policy for Non-Volatile Cache [PDF]
Non-Volatile Memory(NVM) has the advantages of low energy consumption,strong scalability and high storage density.It can replace the traditional Static Random Access Memory (SRAM) as on-chip cache,but is also faced with high energy consumption and delay ...
JIAO Tong, CHEN Lingling, AN Xin, LI Jianhua
doaj +1 more source
Named data network dynamic cache placement strategy based on programmable data plane
Aiming at the efficiency and implementation of in‐network cache in Named Data Network, an in‐network cache method based on the programmable data plane was proposed.
Saifeng Hou, Yuxiang Hu, Le Tian
doaj +1 more source
A CACHE DESIGN METHOD FOR SPATIAL INFORMATION VISUALIZATION IN 3D REAL-TIME RENDERING ENGINE [PDF]
A well-designed cache system has positive impacts on the 3D real-time rendering engine. As the amount of visualization data getting larger, the effects become more obvious.
X. Dai, H. Xiong, X. Zheng
doaj +1 more source
Defending Against Flush+Reload Attack With DRAM Cache by Bypassing Shared SRAM Cache
Cache side-channel attack is one of the critical security threats to modern computing systems. As a representative cache side-channel attack, Flush+Reload attack allows an attacker to steal confidential information (e.g., private encryption key) by ...
Minwoo Jang +3 more
doaj +1 more source
Hubungan Antara Cache, Energy Consumption dan Runtime Performance pada Progressive Web Apps
Progresive Web Apps merupakan teknologi mutakhir di pengembangan web. Kehadiran Progresive Web Apps memberikan dampak positif bagi pengembang Web, yang mana keunggulannya memberikan peningkatan performa secara signifikan.
Wakhid Kurniawan, Agung Fatwanto
doaj +1 more source
On Consideration of Content and Memory Sizes in 5G D2D-Assisted Caching Networks
Device-to-Device (D2D) communication with caching technology has emerged as a promising technique for offloading the traffic and boosting the throughput of the fifth generation (5G) cellular networks.
Yujing Lin +4 more
doaj +1 more source
Sur les traces de l’emprunt caché
Les apparences sont trompeuses : le singulier vocable « caché » révèle une pluralité homonymique et polysémique. L’emprunt une fois identifié, nous essayons de reconstituer l’itinéraire de la / les forme(s) empruntée(s) : date d’entrée, catégorie ...
Stéphane Oury
doaj +1 more source
Cache Replacement Strategy With Limited Service Capacity in Heterogeneous Networks
Recently, cellular networks face a huge challenge to satisfy large increment of user demands for higher-speed and lower-latency communication service. One promising solution is to apply the cache technology in edge cache networks to reduce redundant data
Le Jiang, Xinglin Zhang
doaj +1 more source

