Results 21 to 30 of about 41,981 (173)
Software-Based Self-Test of Set-Associative Cache Memories [PDF]
Embedded microprocessor cache memories suffer from limited observability and controllability creating problems during in-system tests. This paper presents a procedure to transform traditional march tests into software-based self-test programs for set ...
Di Carlo, Stefano +2 more
core +1 more source
Estimating the Performance of Cache Replacement Policies [PDF]
Caches are commonly employed to hide the latency gap between memory and the CPU by exploiting locality in memory accesses. The cache performance strongly influences a system's overall performance, as this gap is large and ever-increasing. The efficiency of a given cache architecture - usually measured by its miss ratio - varies greatly depending on the
Grund D., Reineke J.
openaire +1 more source
Research on Content Priority-Based Caching Strategy in NDMANET [PDF]
Most of NDMANET caching strategies do not consider the priority of content,which reduces the usability of important content in mobile environment.To address the problem,this paper proposes a cache replacement strategy PFC based on content priority.The ...
GAO Zixuan, ZHENG Quan
doaj +1 more source
Cache Replacement Strategy With Limited Service Capacity in Heterogeneous Networks
Recently, cellular networks face a huge challenge to satisfy large increment of user demands for higher-speed and lower-latency communication service. One promising solution is to apply the cache technology in edge cache networks to reduce redundant data
Le Jiang, Xinglin Zhang
doaj +1 more source
Learning Future Reference Patterns for Efficient Cache Replacement Decisions
This study proposes a cache replacement policy technique to increase the cache hit rate. This policy can improve the efficiency of cache management and performance.
Hyejeong Choi, Sejin Park
doaj +1 more source
Cache of cryptographic key based on query popularity
In the current HDFS (Hadoop Distributed File System) key management system, the encryption zone keys are all loaded into the memory during startup of key service.With the increase of the key resource, the occupied memory space also grows, bringing the ...
Wei JIN +4 more
doaj +3 more sources
DENA: An Intelligent Content Discovery System Used in Named Data Networking
Named data networking (NDN) aims at efficient content delivery and reducing the redundancy of data transmission. In NDN, one of the most important issues is how to utilize the cached contents to reduce the user's response delay and improve the ...
Hengyang Zhang +4 more
doaj +1 more source
Parallel software caches [PDF]
We investigate the construction and application of parallel software caches in shared memory multiprocessors. In contrast to maintaining a private cache for each thread, a parallel cache allows the re-use of results of lengthy computations by other ...
Formella, Arno, Keller, Jörg
core +3 more sources
Security Analysis of Cache Replacement Policies [PDF]
Modern computer architectures share physical resources between different programs in order to increase area-, energy-, and cost-efficiency. Unfortunately, sharing often gives rise to side channels that can be exploited for extracting or transmitting sensitive information.
Cañones Martín, Pablo +2 more
openaire +3 more sources
The Impact of Replacement Granularity on Video Caching [PDF]
In this paper the idea that large objects, such as video files, should not be cached or replaced in their entirety, but rather be partitioned in chunks and replacement decisions be applied at the chunk level is examined. It is shown, that a higher byte hit ratio (BHR) can be achieved through partial replacement.
Elias Balafoutis +3 more
openaire +2 more sources

