Results 21 to 30 of about 24,906 (235)

Frozen Cache: Mitigating Filter Effect and Redundancy for Network of Caches

open access: yesIEEE Access, 2021
Information-Centric Networking (ICN) architecture leverages the network of caches’ idea to bring content closer to consumers to ultimately reduce the load on content servers and prevent unnecessary packet re-transmissions.
Saeid Montazeri Shahtouri   +2 more
doaj   +1 more source

Adapting cache partitioning algorithms to pseudo-LRU replacement policies [PDF]

open access: yes, 2010
Recent studies have shown that cache partitioning is an efficient technique to improve throughput, fairness and Quality of Service (QoS) in CMP processors.
Cazorla, Francisco   +3 more
core   +1 more source

MAD-RAPPEL: Mobility Aware Data Replacement And Prefetching Policy Enrooted LBS

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
The features of mobile devices are being continuously upgraded to provide quality of services to the mobile user seeking location-based information by allowing the usage of context-aware data.
Ajay K. Gupta, Udai Shanker
doaj   +1 more source

Timing Anomalies Reloaded [PDF]

open access: yes, 2010
Computing tight WCET bounds in the presence of timing anomalies - found in almost any modern hardware architecture - is a major challenge of timing analysis.
Gebhard, Gernot
core   +1 more source

Adaptive Neuro-fuzzy Inference System as Cache Memory Replacement Policy

open access: yesAdvances in Electrical and Computer Engineering, 2014
To date, no cache memory replacement policy that can perform efficiently for all types of workloads is yet available. Replacement policies used in level 1 cache memory may not be suitable in level 2.
CHUNG, Y. M., HALIM, Z. A.
doaj   +1 more source

Linux kernel compaction through cold code swapping [PDF]

open access: yes, 2009
There is a growing trend to use general-purpose operating systems like Linux in embedded systems. Previous research focused on using compaction and specialization techniques to adapt a general-purpose OS to the memory-constrained environment, presented ...
A. Milanova   +13 more
core   +2 more sources

Cache Strategy Based on Dynamic Popularity and Request Cost in Named Data Networking [PDF]

open access: yesJisuanji gongcheng, 2018
In order to replacing cache efficiently in Named Data Networking(NDN),a cache replacement strategy combining dynamic popularity and cost cache replacement policy is proposed in this paper,which named DPCP.Each node calculates the Dynamic Popularity and ...
GUO Chen,ZHENG Quan,DING Yao,WANG Song
doaj  

A Novel Adaptive Database Cache Optimization Algorithm Based on Predictive Working Sets in Cloud Environment

open access: yesIEEE Access, 2019
Many applications are hosted on cloud databases where several applications share the same database instance. Such database management system exhibits periodic behavior in terms of data references. For example, U.S.
Atul O. Thakare, Parag S. Deshpande
doaj   +1 more source

Cache Scheme Based on Pre-Fetch Operation in ICN. [PDF]

open access: yesPLoS ONE, 2016
Many recent researches focus on ICN (Information-Centric Network), in which named content becomes the first citizen instead of end-host. In ICN, Named content can be further divided into many small sized chunks, and chunk-based communication has merits ...
Jie Duan   +5 more
doaj   +1 more source

CacheQuery: learning replacement policies from hardware caches [PDF]

open access: yesProceedings of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation, 2020
We show how to infer deterministic cache replacement policies using off-the-shelf automata learning and program synthesis techniques. For this, we construct and chain two abstractions that expose the cache replacement policy of any set in the cache hierarchy as a membership oracle to the learning algorithm, based on timing measurements on a silicon CPU.
Pepe Vila   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy