Results 11 to 20 of about 4,206 (156)

Cache Invalidation in a Mobile Environment

open access: hybrid, 2011
In this article, we describe the use of caching that allows coping with the characteristics of the mobile environment. We concentrate particularly on cache invalidation strategy, which is basically a type of caching strategy that is used to ensure that the data items that are cached in the mobile client are consistent in comparison to the ones that are
S. Lim
openalex   +2 more sources

Analysis of cache invalidation patterns in multiprocessors [PDF]

open access: goldACM SIGARCH Computer Architecture News, 1989
To make shared-memory multiprocessors scalable, researchers are now exploring cache coherence protocols that do not rely on broadcast, but instead send invalidation messages to individual caches that contain stale data. The feasibility of such directory-based protocols is highly sensitive to the cache invalidation patterns that parallel programs ...
W.-D. Weber, Aman Gupta
openalex   +2 more sources

Organization of Invalidation Reports for Energy-Efficient Cache Invalidation in Mobile Environments

open access: greenMobile Networks and Applications, 2001
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Kian‐Lee Tan
openalex   +3 more sources

An evaluation of cache invalidation strategies in wireless environments

open access: greenIEEE Transactions on Knowledge and Data Engineering, 2001
In this paper, we address the problem of cache invalidation in mobile and wireless client/server environments. We present cache invalidation techniques that can scale not only to a large number of mobile clients, but also to a large number of data items that can be cached in the mobile clients.
Kian-Lee Tian, Jun Cai, Beng Chin Ooi
openalex   +3 more sources

Research on Strong Cache Consistency Under Generic Cache Replacement Strategy [PDF]

open access: yesJisuanji gongcheng, 2022
Establishing an accurate cache analysis model helps to predict the cache behavior better, which is vital for network performance analysis and planning.However, existing analysis models for cache consistency studies are based on the Least Recently Used ...
YANG Tao, ZHENG Quan, XU Zhenghuan, SHI Qianbao, PENG Siwei
doaj   +1 more source

MAD-RAPPEL: Mobility Aware Data Replacement And Prefetching Policy Enrooted LBS

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
The features of mobile devices are being continuously upgraded to provide quality of services to the mobile user seeking location-based information by allowing the usage of context-aware data.
Ajay K. Gupta, Udai Shanker
doaj   +1 more source

Mending Fences with Self-Invalidation and Self-Downgrade [PDF]

open access: yesLogical Methods in Computer Science, 2018
Cache coherence protocols based on self-invalidation and self-downgrade have recently seen increased popularity due to their simplicity, potential performance efficiency, and low energy consumption.
Parosh Aziz Abdulla   +5 more
doaj   +1 more source

FirepanIF: High Performance Host-Side Flash Cache Warm-Up Method in Cloud Computing

open access: yesApplied Sciences, 2020
In cloud computing, a shared storage server, which provides a network-attached storage device, is usually used for centralized data management. However, when multiple virtual machines (VMs) concurrently access the storage server through the network, the ...
Hyunchan Park, Munkyu Lee, Cheol-Ho Hong
doaj   +1 more source

The potential of programmable logic in the middle: cache bleaching [PDF]

open access: yes, 2020
Consolidating hard real-time systems onto modern multi-core Systems-on-Chip (SoC) is an open challenge. The extensive sharing of hardware resources at the memory hierarchy raises important unpredictability concerns.
Mancuso, Renato, Roozkhosh, Shahin
core   +1 more source

On consistency maintenance in service discovery [PDF]

open access: yes, 2005
Communication and node failures degrade the ability of a service discovery protocol to ensure Users receive the correct service information when the service changes.
Hartel, P.H.   +2 more
core   +5 more sources

Home - About - Disclaimer - Privacy