Browsing by Subject "Cache memory"
Now showing items 1-15 of 15
-
Doctoral Thesis Open Access
Cache Content Duplication
(Πανεπιστήμιο Κύπρου, Σχολή Θετικών και Εφαρμοσμένων Επιστημών / University of Cyprus, Faculty of Pure and Applied Sciences, 2012-05)Η σημασία της κρυφής μνήμης και της ιεραρχίας μνήμης αυξήθηκε τα τελευταία χρόνια λόγο της μεγάλης διαφοράς στην επίδοση που υπάρχει μεταξύ των επεξεργαστών και της μνήμης, και έγινε ακόμα ποιο σημαντική λόγο των πολυνηματικών ...
-
Article
CacheFlow: Cache optimizations for data driven multithreading
(2006)Data-Driven Multithreading is a non-blocking multithreading model of execution that provides effective latency tolerance by allowing the computation processor do useful work, while a long latency event is in progress. With ...
-
Conference Object
CATCH: A mechanism for dynamically detecting Cache-Content-Duplication and its application to instruction caches
(2008)Cache-Content-Duplication (CCD) occurs when there is a miss for a block in a cache and the entire content of the missed block is already in the cache in a block with a different tag. Caches aware of content-duplication can ...
-
Article
CATCH: A mechanism for dynamically detecting cache-content-duplication in instruction caches
(2011)Cache-content-duplication (CCD) occurs when there is a miss for a block in a cache and the entire content of the missed block is already in the cache in a block with a different tag. Caches aware of content-duplication can ...
-
Article
A distributed middleware infrastructure for personalized services
(2004)In this paper, we present an overview of extensible Retrieval, Annotation and Caching Engine (eRACE), a modular and distributed intermediary infrastructure that collects information from heterogeneous Internet sources ...
-
Article
Extrinsic and intrinsic text cloning
(2012)Text Cloning occurs when a processor is storing in its shared caches the same text multiple times. There are several causes of Text Cloning and we classify them either as Extrinsic or Intrinsic. Extrinsic Text Cloning can ...
-
Conference Object
Implicit-storing and redundant-encoding-of-attribute information in error-correction-codes
(2013)This paper proposes implicit-storing to extend the logical capacity of a memory array without increasing its physical capacity by leveraging the array's error-correction-codes to infer the implicitly stored bits. ...
-
Article
Integrating caching techniques on a content distribution network
(2006)Web caching and replication tune capacity with performance and they have become essential components of the Web. In practice, caching and replication techniques have been applied in proxy servers and Content Distribution ...
-
Article
Intermediary infrastructures for the World Wide Web
(2004)Intermediaries are software entities, deployed on hosts of the wireline and wireless network, that mediate the interaction between clients and servers of the World Wide Web. In this paper we present a survey of intermediaries, ...
-
Article
Locating objects in mobile computing
(2001)In current distributed systems, the notion of mobility is emerging in many forms and applications. Mobility arises naturally in wireless computing since the location of users changes as they move. Besides mobility in ...
-
Conference Object
Memory array protection: Check on read or check on write?
(2013)This work introduces Check-on-Write: a memory array error protection approach that enables a trade-off between a memory array's fault-coverage and energy. The presented approach checks for error in a value stored in an ...
-
Article
Memory assignment for multiprocessor caches through grey coloring
(1994)The achieved performance of multiprocessors is heavily dependent on the performance of their caches. Cache performance is severely degraded when data tiles used by a program conflict in the caches. This paper explores ...
-
Conference Object
RVC: A mechanism for time-analyzable real-time processors with faulty caches
(2011)Geometry scaling due to technology evolution as well as Vcc scaling lead to failures in large SRAM arrays such as caches. Faulty bits can be tolerated from the average performance perspective, but make critical realtime ...
-
Conference Object
Selecting Long Atomic Traces for High Coverage
(2003)This paper performs a comprehensive investigation of dynamic selection for long atomic traces. It introduces a classification of trace selection methods and discusses existing and novel dynamic selection approaches - ...
-
Conference Object
A similarity based approach for integrated Web caching and content replication in CDNs
(2006)Web caching and content replication techniques emerged to solve performance problems related to the Web. We propose a generic non-parametric heuristic method that integrates both techniques under a CDN. We provide ...