Results 101 to 110 of about 62,963 (220)

Research on Linux network packet buffer recycling toward multi-core processor

open access: yesTongxin xuebao, 2009
A lock-free algorithm for Linux packet buffer recycling on multi-core processor was proposed.Through making a model of Linux network packet forwarding, the principle of Linux packet buffer recycling was analyzed, and the main reason that the mechanism ...
YAO Qi   +3 more
doaj   +2 more sources

Enhancing Leakage Power in CPU Cache Using Inverted Architecture

open access: yesInternational Journal of Modern Education and Computer Science, 2013
Power consumption is an increasingly pressing problem in modern processor design. Since the on-chip caches usually consume a significant amount of power so power and energy consumption parameters have become one of the most important design constraint. It is one of the most attractive targets for power reduction.
Bilal A. Shehada   +2 more
openaire   +1 more source

Large Pages, Large Leaks? Hugepage-Induced Side-Channels vs. Performance Improvements in Cryptographic Computations

open access: yesCryptography
Side-channel attacks leveraging microarchitectural components such as caches and translation lookaside buffers (TLBs) pose increasing risks to cryptographic and machine-learning workloads.
Xinyao Li, Akhilesh Tyagi
doaj   +1 more source

SmartNIC-Offloaded Worker Node for Storage-Compute Disaggregated Recommendation System [PDF]

open access: yesJisuanji gongcheng
Deep learning-based recommendation systems are commonly used to provide personalized recommendations. In a common storage-compute disaggregated inference architecture, the inference speed of the recommendation system is limited by the internode network ...
SHI Ruixin, YAN Ming, WU Jie
doaj   +1 more source

Tuning I/O Subsystem: A Key Component in RDBMS Performance Tuning [PDF]

open access: yesDatabase Systems Journal, 2016
In a computer system, the fastest storage component is the CPU cache, followed by the system memory. I/O to disk is thousands of times slower than an access to memory. This fact is the key for why you try to make effective use of memory whenever possible
Hitesh Kumar SHARMA   +2 more
doaj  

Achieving Consistent Real-Time Latency at Scale in a Commodity Virtual Machine Environment Through Socket Outsourcing-Based Network Stacks

open access: yesIEEE Access, 2018
It is challenging to achieve a consistent real-time (RT) response time in commodity virtual machine (VM) environments because they have longer and more complex network protocol stacks.
Oscar F. Garcia   +2 more
doaj   +1 more source

Octant overlapping and angle-energy group expanded KBA parallelism of three-dimensional discrete ordinate method

open access: yesFrontiers in Energy Research
IntroductionTo enhance the parallel efficiency of the conventional KBA spatial decomposition method, this study incorporates octant overlapping and angle-energy group expansion into the source iteration scheme for solving the discrete ordinate equations ...
Jian Guo   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy