Results 51 to 60 of about 86,694 (238)

Extending the Nested Parallel Model to the Nested Dataflow Model with Provably Efficient Schedulers

open access: yes, 2016
The nested parallel (a.k.a. fork-join) model is widely used for writing parallel programs. However, the two composition constructs, i.e. "$\parallel$" (parallel) and "$;$" (serial), are insufficient in expressing "partial dependencies" or "partial ...
Dinh, David   +2 more
core   +1 more source

Three-Level Parallel J-Jacobi Algorithms for Hermitian Matrices [PDF]

open access: yes, 2010
The paper describes several efficient parallel implementations of the one-sided hyperbolic Jacobi-type algorithm for computing eigenvalues and eigenvectors of Hermitian matrices.
Aleksandar Ušćumlić   +34 more
core   +3 more sources

DENA: An Intelligent Content Discovery System Used in Named Data Networking

open access: yesIEEE Access, 2016
Named data networking (NDN) aims at efficient content delivery and reducing the redundancy of data transmission. In NDN, one of the most important issues is how to utilize the cached contents to reduce the user's response delay and improve the ...
Hengyang Zhang   +4 more
doaj   +1 more source

Meta algorithms for hierarchical Web caches [PDF]

open access: yesIEEE International Conference on Performance, Computing, and Communications, 2004, 2004
Large scale hierarchical caches for Web content have been deployed widely in an attempt to reduce delivery delays and bandwidth consumption and also to improve the scalability of content dissemination through the World Wide Web. Irrespective of the specific replacement algorithm employed in each cache, a de facto characteristic of contemporary ...
N. Laoutaiis, S. Syntila, l. Stavrakakis
openaire   +1 more source

To Cache or Not to Cache

open access: yesAlgorithms
Unlike conventional CPU caches, non-datapath caches, such as host-side flash caches which are extensively used as storage caches, have distinct requirements.
Steven Lyons, Raju Rangaswami
doaj   +1 more source

Cache Memory: An Analysis on Replacement Algorithms and Optimization Techniques [PDF]

open access: yesMehran University Research Journal of Engineering and Technology, 2017
Caching strategies can improve the overall performance of a system by allowing the fast processor and slow memory to at a same pace. One important factor in caching is the replacement policy.
QAISAR JAVAID   +3 more
doaj  

Cooperation Based Proactive Caching in Multi-Tier Cellular Networks

open access: yesApplied Sciences, 2020
The limited caching capacity of the local cache enabled Base station (BS) decreases the cache hit ratio (CHR) and user satisfaction ratio (USR). However, Cache enabled multi-tier cellular networks have been presented as a promising candidate for fifth ...
Fawad Ahmad   +4 more
doaj   +1 more source

Near optimality of the discrete persistent access caching algorithm [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2005
Renewed interest in caching techniques stems from their application to improving the performance of the World Wide Web, where storing popular documents in proxy caches closer to end-users can significantly reduce the document download latency and overall
Predrag R. Jelenković   +2 more
doaj   +1 more source

The K-Server Dual and Loose Competitiveness for Paging

open access: yes, 1994
This paper has two results. The first is based on the surprising observation that the well-known ``least-recently-used'' paging algorithm and the ``balance'' algorithm for weighted caching are linear-programming primal-dual algorithms.
C. H. Papadimitriou   +6 more
core   +4 more sources

Defending cache memory against cold-boot attacks boosted by power or EM radiation analysis [PDF]

open access: yes, 2017
Some algorithms running with compromised data select cache memory as a type of secure memory where data is confined and not transferred to main memory. However, cold-boot attacks that target cache memories exploit the data remanence. Thus, a sudden power
Manich Bou, Salvador, Neagu, Madalin
core   +2 more sources

Home - About - Disclaimer - Privacy