Results 71 to 80 of about 24,781 (241)

Relative competitive analysis of cache replacement policies [PDF]

open access: yesACM SIGPLAN Notices, 2008
Caches are commonly employed to hide the latency gap between memory and the CPU by exploiting locality in memory accesses. On today's architectures a cache miss may cost several hundred CPU cycles. In order to fulfill stringent performance requirements, caches are now also used in hard real-time systems.
Reineke J., Grund D.
openaire   +1 more source

Treating the Symptoms, Not the Causes: What's Wrong with Demos's Report The Human Handbrake: How Whitehall Culture Holds Back Public Service Reform

open access: yesThe Political Quarterly, EarlyView.
Abstract A litany of think tank reports has critiqued Whitehall's ability to deliver policy. The latest—by Demos—locates the roots of Britain's governance woes in Whitehall's political culture. Drawing on public policy literature, we critique this report by demonstrating that Whitehall's political culture reflects the enduring structural design of ...
DARCY LUKE, NATHAN CRITCH
wiley   +1 more source

General Caching Is Hard: Even with Small Pages

open access: yes, 2015
Caching (also known as paging) is a classical problem concerning page replacement policies in two-level memory systems. General caching is the variant with pages of different sizes and fault costs. We give the first NP-hardness result for general caching
Folwarczný, Lukáš, Sgall, Jiří
core   +1 more source

Addressing Inequality and Creating Educational Opportunity in Feltham: A Systems Approach to Local Change

open access: yesThe Political Quarterly, EarlyView.
Abstract This article explores how persistent inequality in London can be addressed through a place‐based systems approach, using Feltham in the Borough of Hounslow—one of the capital's most deprived areas—as a case study. It offers a blueprint for community regeneration using a ‘pathways to progression’ education model.
Peter John
wiley   +1 more source

Efficiency of cache-replacement algorithms while retrieving data from a relational database and XML files in a web based system [PDF]

open access: yes, 2013
Caching has been applied in Web based information systems in order toreduce the transmission of redundant network traffic and response latency by savingcopies of the content obtained from the Web closer to the end user.
Hilmi HAXHIHAMZA, Lule AHMEDI
core  

FEMINISTS VERSUS MONUMENTS? From Protests to Anti‐monuments in Mexico City

open access: yesInternational Journal of Urban and Regional Research, EarlyView.
Abstract This article examines the role of heritage spaces and monuments in the Historic Centre of Mexico City during ongoing feminist mobilizations. Feminists have claimed that the Mexican government is more concerned about protecting monuments and urban heritage than acting to prevent gender‐based violence and femicide.
Fernando Gutiérrez
wiley   +1 more source

To Cache or Not to Cache

open access: yesAlgorithms
Unlike conventional CPU caches, non-datapath caches, such as host-side flash caches which are extensively used as storage caches, have distinct requirements.
Steven Lyons, Raju Rangaswami
doaj   +1 more source

A Dynamic Instruction Cache Locking Approach for Minimizing Worst Case Execution Time of a Single Task

open access: yesIEEE Access, 2020
In real time embedded system, the embedded software often consists of a set of concurrent tasks, and such tasks are generally subject to timing constraints.
Tingxu Zhang   +3 more
doaj   +1 more source

System Support for Managing Invalid Bindings

open access: yes, 2011
Context-aware adaptation is a central aspect of pervasive computing applications, enabling them to adapt and perform tasks based on contextual information.
Arfat, Yasir   +3 more
core   +1 more source

Harnessing iEcology data to uncover invasive species behaviour

open access: yesMethods in Ecology and Evolution, EarlyView.
Abstract Invasive animal species threaten ecosystems, biodiversity and human livelihoods. Behavioural traits such as boldness, exploratory tendencies, learning ability and social interactions are known to influence invasion success. Yet these behavioural traits remain underexplored due to challenges in observing behaviour across large spatial and ...
Peter Mikula   +22 more
wiley   +1 more source

Home - About - Disclaimer - Privacy