Results 71 to 80 of about 24,781 (241)
Relative competitive analysis of cache replacement policies [PDF]
Caches are commonly employed to hide the latency gap between memory and the CPU by exploiting locality in memory accesses. On today's architectures a cache miss may cost several hundred CPU cycles. In order to fulfill stringent performance requirements, caches are now also used in hard real-time systems.
Reineke J., Grund D.
openaire +1 more source
Abstract A litany of think tank reports has critiqued Whitehall's ability to deliver policy. The latest—by Demos—locates the roots of Britain's governance woes in Whitehall's political culture. Drawing on public policy literature, we critique this report by demonstrating that Whitehall's political culture reflects the enduring structural design of ...
DARCY LUKE, NATHAN CRITCH
wiley +1 more source
General Caching Is Hard: Even with Small Pages
Caching (also known as paging) is a classical problem concerning page replacement policies in two-level memory systems. General caching is the variant with pages of different sizes and fault costs. We give the first NP-hardness result for general caching
Folwarczný, Lukáš, Sgall, Jiří
core +1 more source
Abstract This article explores how persistent inequality in London can be addressed through a place‐based systems approach, using Feltham in the Borough of Hounslow—one of the capital's most deprived areas—as a case study. It offers a blueprint for community regeneration using a ‘pathways to progression’ education model.
Peter John
wiley +1 more source
Efficiency of cache-replacement algorithms while retrieving data from a relational database and XML files in a web based system [PDF]
Caching has been applied in Web based information systems in order toreduce the transmission of redundant network traffic and response latency by savingcopies of the content obtained from the Web closer to the end user.
Hilmi HAXHIHAMZA, Lule AHMEDI
core
FEMINISTS VERSUS MONUMENTS? From Protests to Anti‐monuments in Mexico City
Abstract This article examines the role of heritage spaces and monuments in the Historic Centre of Mexico City during ongoing feminist mobilizations. Feminists have claimed that the Mexican government is more concerned about protecting monuments and urban heritage than acting to prevent gender‐based violence and femicide.
Fernando Gutiérrez
wiley +1 more source
Unlike conventional CPU caches, non-datapath caches, such as host-side flash caches which are extensively used as storage caches, have distinct requirements.
Steven Lyons, Raju Rangaswami
doaj +1 more source
In real time embedded system, the embedded software often consists of a set of concurrent tasks, and such tasks are generally subject to timing constraints.
Tingxu Zhang +3 more
doaj +1 more source
System Support for Managing Invalid Bindings
Context-aware adaptation is a central aspect of pervasive computing applications, enabling them to adapt and perform tasks based on contextual information.
Arfat, Yasir +3 more
core +1 more source
Harnessing iEcology data to uncover invasive species behaviour
Abstract Invasive animal species threaten ecosystems, biodiversity and human livelihoods. Behavioural traits such as boldness, exploratory tendencies, learning ability and social interactions are known to influence invasion success. Yet these behavioural traits remain underexplored due to challenges in observing behaviour across large spatial and ...
Peter Mikula +22 more
wiley +1 more source

