• No results found

Cache Replacement Algorithm

An adaptive semantics-aware replacement algorithm for web caching

An adaptive semantics-aware replacement algorithm for web caching

... object replacement decisions on temporal locality ...the cache replacement problem. We propose a novel cache replacement algorithm, called SACS (from Semantics Aware Caching ...

14

Asymptotically Exact TTL-Approximations of the Cache Replacement Algorithms LRU(m) and h-LRU

Asymptotically Exact TTL-Approximations of the Cache Replacement Algorithms LRU(m) and h-LRU

... the cache size is limited, the cache replacement algorithm has an important impact on the effectiveness of ...the cache hit probability of two classes of cache replacement ...

15

Adaptive Wildcard Rules for TCAM Management using Cache Replacement Algorithms

Adaptive Wildcard Rules for TCAM Management using Cache Replacement Algorithms

... to cache rules into ...a cache replacement algorithmic program considering each temporal and spatial ...and cache replacement algorithm have higher performance than previous ...

6

Use Of Hidden Markov Mobility Model For Location Prediction And Biclustering For Cache Replacement In Manet

Use Of Hidden Markov Mobility Model For Location Prediction And Biclustering For Cache Replacement In Manet

... LBS, cache memory play an important role to hold user’s location dependent ...a cache replacement policy for maximum utilization of limited cache ...

5

New Strategy For Cache Replacement In Manets

New Strategy For Cache Replacement In Manets

... on cache replacement strategies and propose a new vigorous one, the proposed strategy will achieve better utilization of the cache space, minimize cache duplications, and increase data ...

5

Development of Secure Framework for Cache Using Phishem Guard Algorithm

Development of Secure Framework for Cache Using Phishem Guard Algorithm

... Today, The security is a technical term which is more important part of human day to day life and being involves in securing their day to day life from theft and malicious activities. Due to an increasing of ...

14

Squid Proxy Server Cache Management using
          K-means Algorithm

Squid Proxy Server Cache Management using K-means Algorithm

... Many cache replacement strategies have been developed and may be divided into three category: Traditional Policies (Least Frequently Used (LFU), Least Recently Used (LRU)), Key-based Policies (LRU-MIN, ...

6

Improve Client Performance in Client Server Mobile Computing System using Cache Replacement Technique

Improve Client Performance in Client Server Mobile Computing System using Cache Replacement Technique

... This prefetch scheme is a general one that may be applied to almost any network application to decide what information to prefetch. For specific network information access application, the problem of applying this ...

14

A novel energy efficiency algorithm in green mobile networks with cache

A novel energy efficiency algorithm in green mobile networks with cache

... different cache sizes when weight factor β = 10, sleep threshold N = 5, and ser- vice rate x = 70 ...and cache size have some effect on the energy-delay tradeoffs of the proposed ...a cache capacity. ...

9

A 
		novel approach for a high performance lossless cache compression 
		algorithm 

A novel approach for a high performance lossless cache compression algorithm 

... find cache compression is such a technique to increase the speed of a microprocessor based system, as it increases the cache capacity and off-chip ...on cache compression has made unsubstantiated ...

7

Hybrid Page Replacement Algorithm

Hybrid Page Replacement Algorithm

... effective replacement algorithm, it should be able to distinguish the hot and cold resident in cache to reduce the number of page ...efficient algorithm implementation can be achieved if it ...

6

nLRU Page Replacement Algorithm

nLRU Page Replacement Algorithm

... We use a two – level memory hierarchy consisting of a faster but costlier main memory and a slower but cheaper secondary memory. Virtual memory systems use this hierarchy to bring parts of a Program into main memory from ...

6

Detecting Cache Based Side Channel Attacks in IaaS using Enhanced Algorithm

Detecting Cache Based Side Channel Attacks in IaaS using Enhanced Algorithm

... the cache based side channel attack, the environmental set up consisting of 5 scenarios have considered as ...distribution algorithm to normalize the ...The cache hit and cache miss will vary ...

9

Modified Energy Efficient Cache Invalidation Algorithm in Mobile Environment

Modified Energy Efficient Cache Invalidation Algorithm in Mobile Environment

... the cache consistency is a complicated issue in the wireless mobile ...Efficient Cache Invalidation Algorithm (MEECIA) especially to reduce the uplink bandwidth consumption in the wireless ad-hoc ...

6

Performance improvement of least-recently-used policy in web proxy cache replacement using supervised machine learning

Performance improvement of least-recently-used policy in web proxy cache replacement using supervised machine learning

... This is motivation to adopt intelligent techniques for solving the Web proxy caching problems. The second motivation behind the development of intelligent approaches in Web caching is availability of proxy logs files ...

38

High Performance Cache Architecture Using Victim Cache

High Performance Cache Architecture Using Victim Cache

... of cache memory. Cache memory are on-chip memory element used to store ...data. Cache memory is used to increase data transfer ...a cache is calculated by its ability of differentiate and ...

9

Outline. Cache Parameters. Lecture 5 Cache Operation

Outline. Cache Parameters. Lecture 5 Cache Operation

... • When main cache evicts (replaces) a block, the victim cache will take the evicted (replaced) block. • The evicted block is called the “victim.” • When the main cache misses, the victi[r] ...

17

Cache MemoryFinal.ppt

Cache MemoryFinal.ppt

...  Each block of main memory maps to only one cache line.  i.e[r] ...

59

To Cache or Not To Cache? Experiments with Adaptive Models in Statistical Machine Translation

To Cache or Not To Cache? Experiments with Adaptive Models in Statistical Machine Translation

... models. Cache parameters are not particularly tuned for the task in our initial experiments which could be one reason for the disappointing results we ...model cache of 10,000 words with a decay of α = ...A ...

6

Fault Hub Replacement Algorithm for a Wireless Sensor Network

Fault Hub Replacement Algorithm for a Wireless Sensor Network

... genetic algorithm. In this step GA algorithm will generate a chromosome and each elements (or bits) of a chromosome are represent as a genes (either 0 or ...

5

Show all 10000 documents...

Related subjects