Sciweavers

114 search results - page 8 / 23
» Data Caching for Enhancing Anonymity
Sort
View
CIKM
2001
Springer
14 years 1 months ago
Caching Constrained Mobile Data
As mobile devices get ubiquitous and grow in computational power, their management of interdependent data also becomes increasingly important. The mobile environment exhibits all ...
Subhasish Mazumdar, Mateusz Pietrzyk, Panos K. Chr...
EUROSYS
2011
ACM
13 years 14 days ago
SRM-buffer: an OS buffer management technique to prevent last level cache from thrashing in multicores
Buffer caches in operating systems keep active file blocks in memory to reduce disk accesses. Related studies have been focused on how to minimize buffer misses and the caused pe...
Xiaoning Ding, Kaibo Wang, Xiaodong Zhang
ICDE
2007
IEEE
144views Database» more  ICDE 2007»
14 years 3 months ago
Greedy Cache Management Techniques for Mobile Devices
Mobile devices are configured with one or more wireless cards that provide limited radio-range and unreliable transmission. These energy-constrained devices are configured with ...
Shahram Ghandeharizadeh, Shahin Shayandeh
PARA
2004
Springer
14 years 2 months ago
Cache Optimizations for Iterative Numerical Codes Aware of Hardware Prefetching
Cache optimizations typically include code transformations to increase the locality of memory accesses. An orthogonal approach is to enable for latency hiding by introducing prefet...
Josef Weidendorfer, Carsten Trinitis
EMSOFT
2007
Springer
14 years 3 months ago
WCET estimation for executables in the presence of data caches
This paper describes techniques to estimate the worst case execution time of executable code on architectures with data caches. The underlying mechanism is Abstract Interpretation...
Rathijit Sen, Y. N. Srikant