Results 31 to 40 of about 133,755 (277)
The Adaptive sampling revisited [PDF]
The problem of estimating the number n of distinct keys of a large collection of N data is well known in computer science. A classical algorithm is the adaptive sampling (AS).
Matthew Drescher +2 more
doaj +1 more source
A Primer on Memory Consistency and Cache Coherence, Second Edition
Many modern computer systems, including homogeneous and heterogeneous architectures, support shared memory in hardware.
Vijay Nagarajan +3 more
semanticscholar +1 more source
A New Cache Update Scheme Using Reinforcement Learning for Coded Video Streaming Systems
As the demand for video streaming has been rapidly increasing recently, new technologies for improving the efficiency of video streaming have attracted much attention. In this paper, we thus investigate how to improve the efficiency of video streaming by
Yu-Sin Kim +3 more
doaj +1 more source
Implementation and Optimization of Apache Spark Cache System Based on Mixed Memory [PDF]
With increasing data scale in the “big data era”,in-memory computing frameworks have grown significantly.The mainstream in-memory computing framework Apache Spark uses memory to cache intermediate results,which greatly improves data processing ...
WEI Sen, ZHOU Haoran, HU Chuang, CHENG Dazhao
doaj +1 more source
Cost-Optimized Dynamic Access Control Policy Using Blockchain and Machine Learning for Enhanced Security in IoT Smart Homes [PDF]
The rapid adoption of Internet of Things (IoT) devices in smart homes has led to growing security vulnerabilities, primarily due to the limitations of traditional, static access control mechanisms.
Hussain Hafiz Adnan +3 more
doaj +1 more source
This paper focuses on effective content delivering over the co-channel and full millimeter-wave (mm-Wave) heterogeneous networks (HetNets) by using hybrid self-backhaul and cache-assisted (HSBC-assisted) content delivering.
Xiangdong Jia +3 more
doaj +1 more source
DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors
Software side channel attacks have become a serious concern with the recent rash of attacks on speculative processor architectures. Most attacks that have been demonstrated exploit the cache tag state as their exfiltration channel.
Vladimir Kiriansky +4 more
semanticscholar +1 more source
A Technique for Improving Lifetime of Non-Volatile Caches Using Write-Minimization
While non-volatile memories (NVMs) provide high-density and low-leakage, they also have low write-endurance. This, along with the write-variation introduced by the cache management policies, can lead to very small cache lifetime.
Sparsh Mittal, Jeffrey Vetter
doaj +1 more source
Coverage and Rate Analysis of Cache-Enabled Vertical Heterogeneous Networks
The unmanned aerial vehicles (UAVs) serving as the aerial base stations (ABSs) has emerged as a promising approach to improve the coverage and capacity in the 5G network. In this article, cache-enabled vertical heterogeneous network (VHetNet) is analyzed
Congshan Fan, Tiankui Zhang, Zhimin Zeng
doaj +1 more source
Weighted-CAPIC Caching Algorithm for Priority Traffic in Named Data Network
Today, the internet requires many additional mechanisms or protocols to support various ever-growing applications. As a future internet architecture candidate, the Named Data Network (NDN) offers a solution that naturally fulfills this need.
Leanna Vidya Yovita +2 more
doaj +1 more source

