Results 111 to 120 of about 4,206 (156)
Some of the next articles are maybe not open access.

Energy-Efficient Mobile Cache Invalidation

Distributed and Parallel Databases, 1998
Caching data in a wireless mobile computer can significantly reduce the bandwidth requirement. However, due to battery power limitation, a wireless mobile computer may often be forced to operate in a doze or even totally disconnected mode. As a result, the mobile computer may miss some cache invalidation reports.
Wu, Kun-Lung   +2 more
openaire   +1 more source

Modeling LRU cache with invalidation

Computer Networks, 2018
Abstract Least Recently Used (LRU) is a very popular caching replacement policy. It is very easy to implement and offers good performance, especially when data requests are temporally correlated, as in the case of web traffic. When the data content can change during time, as in the case of dynamic websites or within databases, there is the need to ...
Detti, Andrea   +3 more
openaire   +3 more sources

Energy‐efficient selective cache invalidation

Wireless Networks, 1999
In a mobile environment, users of portable computers can query databases over the wireless communication channels. To reduce contention on the limited bandwidth of the wireless channels, frequently accessed data are cached at the mobile clients. However, maintenance of the cache consistency is complicated by the mobile clients' frequent disconnection ...
Jun Cai, Kian‐Lee Tan
openaire   +1 more source

Broadcast-based group invalidation: An energy-efficient cache invalidation strategy

Information Sciences, 1997
Abstract In a wireless environment, mobile clients may cache frequently accessed data to reduce the contention on the narrow bandwidth of the wireless channel. However, to minimize energy consumption, mobile clients may also often operate in a disconnected mode.
Tan, K.-L., Cai, J.
openaire   +1 more source

Cache protocols with partial block invalidations

[1993] Proceedings Seventh International Parallel Processing Symposium, 2002
The authors introduce hardware cache protocols in which invalidations affect only part of a cached block so that the processor can keep reading the valid part. On a cache miss the entire block is fetched in the cache. The proposed protocols take advantage of the prefetching effects associated with large block sizes while reducing the false sharing miss
Y.-S. Chen, M. Dubois
openaire   +1 more source

The word-invalidate cache coherence protocol

Microprocessors and Microsystems, 1996
Abstract Snoopy protocols are widely used for preserving of cache coherence in shared bus, shared memory multiprocessors. In this work, an attempt was made to improve their performance for parallel applications where sequential pattern of sharing prevails.
Milo Tomašević, Veljko Milutinović
openaire   +1 more source

Enhancing cache invalidation in mobile environments

Proceedings of the International Conference on Mobile Technology, Applications, and Systems - Mobility '08, 2008
The diversity of services delivered over wireless channels has increased people desire in ubiquitously accessing these services from their mobile devices. However, an ubiquitous mobile computing environment faces several challenges such as scarce bandwidth, limited energy resources, and frequent disconnection of the server and mobile devices.
Haidar Safa, Hassan Artail, Mirna Nahhas
openaire   +1 more source

Hybrid cache invalidation schemes in mobile environments

open access: closedThe IEEE/ACS International Conference onPervasive Services, 2004. ICPS 2004. Proceedings., 2004
Yuhang Bao, R. Alhaj, K. Barker
openalex   +2 more sources

Efficient cache invalidation in mobile environment

Proceedings of the IEEE INDICON 2004. First India Annual Conference, 2004., 2005
Caching at mobile client can reduce number of uplink requests, lighten server load, shorten query latency and increase data availability. A cache invalidation strategy ensures that cached data by a mobile client has same value as on the origin server. This paper presents a synchronous stateful caching technique with the objectives to reduce the query ...
N. Chand, R. Joshi, M. Misra
openaire   +1 more source

Home - About - Disclaimer - Privacy