Results 11 to 20 of about 133,755 (277)

A Symbiotic Relationship Based Leader Approach for Privacy Protection in Location Based Services

open access: yesISPRS International Journal of Geo-Information, 2020
Location-based services (LBS) form the main part of the Internet of Things (IoT) and have received a significant amount of attention from the research community as well as application users due to the popularity of wireless devices and the daily growth ...
Hosam Alrahhal   +3 more
doaj   +1 more source

Research on Strong Cache Consistency Under Generic Cache Replacement Strategy [PDF]

open access: yesJisuanji gongcheng, 2022
Establishing an accurate cache analysis model helps to predict the cache behavior better, which is vital for network performance analysis and planning.However, existing analysis models for cache consistency studies are based on the Least Recently Used ...
YANG Tao, ZHENG Quan, XU Zhenghuan, SHI Qianbao, PENG Siwei
doaj   +1 more source

Cache miss analysis of WHT algorithms [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2005
On modern computers memory access patterns and cache utilization are as important, if not more important, than operation count in obtaining high-performance implementations of algorithms.
Mihai Furis   +2 more
doaj   +1 more source

Temporal radiance caching [PDF]

open access: yesACM SIGGRAPH 2006 Sketches on - SIGGRAPH '06, 2006
We present a novel method for fast, high quality computation of glossy global illumination in animated environments. Building on the irradiance caching and radiance caching algorithms, our method leverages temporal coherence by sparse temporal sampling and interpolation of the indirect lighting. In our approach, part of the global illumination solution
Gautron, Pascal   +2 more
openaire   +5 more sources

Ascertaining Uncertainty for Efficient Exact Cache Analysis [PDF]

open access: yesInternational Conference on Computer Aided Verification, 2017
Static cache analysis characterizes a program’s cache behavior by determining in a sound but approximate manner which memory accesses result in cache hits and which result in cache misses.
Valentin Touzeau   +3 more
semanticscholar   +1 more source

A Large-scale Analysis of Hundreds of In-memory Key-value Cache Clusters at Twitter

open access: yesACM Transactions on Storage, 2021
Modern web services use in-memory caching extensively to increase throughput and reduce latency. There have been several workload analyses of production systems that have fueled research in improving the effectiveness of in-memory caching systems ...
Juncheng Yang, Yao Yue, K. V. Rashmi
semanticscholar   +1 more source

Named data network dynamic cache placement strategy based on programmable data plane

open access: yesIET Networks, 2023
Aiming at the efficiency and implementation of in‐network cache in Named Data Network, an in‐network cache method based on the programmable data plane was proposed.
Saifeng Hou, Yuxiang Hu, Le Tian
doaj   +1 more source

CCALK: (When) CVA6 Cache Associativity Leaks the Key

open access: yesJournal of Low Power Electronics and Applications, 2022
In this work, we study an end-to-end implementation of a Prime + Probe covert channel on the CVA6 RISC-V processor implemented on a FPGA target and running a Linux OS.
Valentin Martinoli   +3 more
doaj   +1 more source

Neural Cache: Bit-Serial In-Cache Acceleration of Deep Neural Networks [PDF]

open access: yesInternational Symposium on Computer Architecture, 2018
This paper presents the Neural Cache architecture, which re-purposes cache structures to transform them into massively parallel compute units capable of running inferences for Deep Neural Networks.
Charles Eckert   +7 more
semanticscholar   +1 more source

An Index Coding Approach to Caching With Uncoded Cache Placement [PDF]

open access: yesIEEE Transactions on Information Theory, 2020
Caching is an efficient way to reduce network traffic congestion during peak hours, by storing some content at the user’s local cache memory, even without knowledge of user’s later demands.
Kai Wan   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy