Results 121 to 130 of about 4,206 (156)
Some of the next articles are maybe not open access.

Enhancing Cache Invalidation Techniques in IVANET

2011 International Conference on Communication Systems and Network Technologies, 2011
Internet-based vehicular ad hoc network (IVANET) is an emerging technique that combines a wired Internet and a vehicular ad hoc network (VANET) through roadside infrastructures for providing universal information and service accessibility to the vehicles.
Anurag Singh   +2 more
openaire   +1 more source

Energy-Efficient Cache Invalidation in Wireless Mobile Environment

2005 IEEE International Conference on Personal Wireless Communications, 2005. ICPWC 2005., 2005
Caching at the mobile client is a potential technique that can reduce the number of uplink requests, lighten the server load, shorten the query latency and increase the data availability. A cache invalidation strategy ensures that any data item cached at a mobile client has same value as on the origin server.
R. C. Joshi, Manoj Misra, Narottam Chand
openaire   +1 more source

Dynamic cache invalidation scheme for wireless mobile environments

Wireless Networks, 2007
The caching of frequently accessed data items on the client side is an effective technique to improve performance in a mobile environment. Caching data in a wireless mobile computer can significantly reduce the bandwidth requirement. However, cache content needs to be validated; classical cache invalidation strategies are not suitable for mobile ...
Madhukar, Alok   +2 more
openaire   +2 more sources

Cache invalidation patterns in shared-memory multiprocessors

IEEE Transactions on Computers, 1992
The cache invalidation patterns of several parallel applications are analyzed. The results are based on multiprocessor simulations with 8, 16, and 32 processors. To provide deeper insight into the observed invalidation behavior the invalidations observed in the simulations are linked to the high-level objects causing them in the programs.
A. Gupta, W.-D. Weber
openaire   +1 more source

Piggyback server invalidation for proxy cache coherency

Computer Networks and ISDN Systems, 1998
Abstract We present a piggyback server invalidation (PSI) mechanism for maintaining stronger cache coherency in Web proxy caches while reducing overall costs. The basic idea is for servers to piggyback on a reply to a proxy client, the list of resources that have changed since the last access by the client. The proxy client invalidates cached entries
Balachander Krishnamurthy   +1 more
openaire   +1 more source

Dynamic cache invalidation technique in mobile environments

2015 1st International Conference on Next Generation Computing Technologies (NGCT), 2015
Due to exponential requests of users for accessing Internet wireless services, longer delays can incur in full filling requests. So optimizations for delay is required. One such method is using cache and storing frequently accessed pages in local cache. Consistency in cache and server data becomes a major issue.
Rajeev Tiwari, Neeraj Kumar
openaire   +1 more source

A cache invalidation strategy for mobile networks

Journal of Network and Computer Applications, 2010
The diversity of services delivered over wireless channels has increased people's desire in ubiquitously accessing these services from their mobile devices. However, a ubiquitous mobile computing environment faces several challenges such as scarce bandwidth, limited energy resources, and frequent disconnection of the server and mobile devices.
Haidar Safa, Hassan Artail, Mirna Nahhas
openaire   +1 more source

Lazy cache invalidation for self-modifying codes

Proceedings of the 2012 international conference on Compilers, architectures and synthesis for embedded systems, 2012
Just-in-time compilation with dynamic code optimization is often used to help improve the performance of applications that utilize high-level languages and virtual run-time environments, such as those found in smartphones. Just-in-time compilation introduces additional overhead into the instruction fetch stage of a processor that is particularly ...
Anthony Gutierrez   +3 more
openaire   +1 more source

Adaptive cache invalidation methods in mobile environments

Proceedings. The Sixth IEEE International Symposium on High Performance Distributed Computing (Cat. No.97TB100183), 2002
Caching of frequently accessed data items can reduce the bandwidth requirement in a mobile wireless computing environment. Periodically broadcast of invalidation reports is an efficient cache invalidation strategy. However, this strategy is severely affected by the disconnection and mobility of the clients.
null Qinglong Hu, null Dik Lun Lee
openaire   +1 more source

Fast and cost effective cache invalidation in DSM

Proceedings Seventh International Conference on Parallel and Distributed Systems (Cat. No.PR00568), 2002
Most distributed shared memory systems use point-to-point networks in conjunction with directory-based cache coherence protocols. A cache invalidation transaction generates a number of unicast invalidation messages and as many acknowledgment messages. This results in heavy network traffic, high latency, and high occupancy at home nodes.
null Chang-Kyu Lee   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy