Results 191 to 200 of about 24,781 (241)
Age and origin of a Cahokian wooden monument at the Mitchell site, Illinois, USA. [PDF]
Kessler NV +4 more
europepmc +1 more source
Compaction-Aware Flash Memory Remapping for Key-Value Stores. [PDF]
Wang J, Yang Z, Fan Y, Du Y.
europepmc +1 more source
High-Throughput and Memory-Efficient Pipeline Key-Value Store Architecture on FPGA. [PDF]
Wang X, Liu L, Li Y.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Attack Resilience of Cache Replacement Policies
IEEE INFOCOM 2021 - IEEE Conference on Computer Communications, 2021Caches are pervasively used in computer networks to speed up access by reusing previous communications, where various replacement policies are used to manage the cached contents. The replacement policy of a cache plays a key role in its performance, and is thus extensively engineered to achieve a high hit ratio in benign environments.
Tian Xie +3 more
openaire +1 more source
Re-examining cache replacement policies
2008 IEEE International Conference on Computer Design, 2008The replacement policies commonly used in modern processors perform an average of 57% worse than an optimal replacement policy for commercial applications using large, shared caches in a chip-multiprocessor (CMP). Recent proposals that improve the performance of smaller, uniprocessor caches with SPEC CPU workloads do not achieve similar benefits with ...
Jason Zebchuk +2 more
openaire +1 more source
Effective cache replacement policy for packet processing cache
International Journal of Communication Systems, 2020SummaryOwing to the explosive increase in Internet traffic, increasing the throughput and energy efficiency of core routers is an important issue for future internet. Accessing the ternary content addressable memory (TCAM) in a core router can significantly degrade its throughput and energy efficiency owing to its low operating frequency and power ...
openaire +1 more source
Cooperative Cache Replacement Policy for MANETs
International Journal of Advanced Pervasive and Ubiquitous Computing, 2014Mobile Adhoc Networks (MANETs) are autonomously structured multi-hop wireless links in peer to peer fashion without aid of any infrastructure network. In MANETs network topology is dynamic, as nodes are mobile. Due to this dynamic topology and multi-hop environment data availability in MANETs is low.
Prashant Kumar +3 more
openaire +1 more source
A Fairness Conscious Cache Replacement Policy for Last Level Cache
2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2021Multicore systems with shared Last Level Cache (LLC) possess a bigger challenge in allocating the LLC space among multiple applications running in the system. Since all applications use the shared LLC, interference caused by them may evict important blocks of other applications that result in premature eviction and may also lead to thrashing ...
Kousik Kumar Dutta +2 more
openaire +1 more source
Cache lifetime enhancement technique using hybrid cache-replacement-policy
Microelectronics Reliability, 2019Abstract Driven by the trends of emerging technologies in memories, a non-volatile memory (NVM) has been considered as an alternate technology to replace SRAM in an on-chip cache. Spin-transfer torque random access memory (STT-RAM), a new type of NVM technology has low leakage power and huge density of cells.
Bhukya Krishna Priya +3 more
openaire +1 more source
Relative competitiveness of cache replacement policies
Proceedings of the 2008 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, 2008Caches are commonly employed to hide the latency gap between memory and the CPU by exploiting locality in memory accesses. On today’s architectures a cache miss may take several hundred CPU cycles. In order to fulfill stringent timing requirements, caches are now also used in hard real-time systems.
Jan Reineke, Daniel Grund
openaire +1 more source

