Showing 1 - 20 results of 79 for search 'Cache (computing)', query time: 0.08s Refine Results
  1. 1
  2. 2

    Future network model for integrated collaboration of communication, computing, caching and intelligence by HU Yujiao, HUANG Tao, JIA Qingmin, XIE Renchao, LIU Yunjie

    Published 2024-05-01
    “…In order to adapt to the demands of diverse businesses for on-demand, accurate and efficient network services, the communication-computing-caching-intelligence cooperative network (3CI-CoNet) was proposed. …”
    Get full text
    Article
  3. 3
  4. 4
  5. 5

    IMSC: Instruction set architecture monitor and secure cache for protecting processor systems from undocumented instructions by Yuze Wang, Peng Liu, Yingtao Jiang

    Published 2022-07-01
    “…To address this problem that may cause potentially serious security breaches, the instruction set architecture (ISA) monitor and secure cache (IMSC) is proposed. As a lightweight solution, IMSC employs an ISA monitor to discover and correct any potential threats imposed by undocumented instructions, and it relies on a secure cache to ensure the credibility of the system. …”
    Get full text
    Article
  6. 6
  7. 7

    Data cache optimization model based on cyclic genetic ant colony algorithm in edge computing environment by Danyue Wang, Xingshuo An, Xianwei Zhou, Xing Lü

    Published 2019-08-01
    “…Edge computing has recently emerged as an important paradigm to bring filtering, processing, and caching resources to the edge of networks. …”
    Get full text
    Article
  8. 8
  9. 9
  10. 10
  11. 11

    Research on incentive mechanism for mobile intelligent edge computing by Shuyun LUO, Yuzhou WEN, Weiqiang XU, Shenghong ZHU

    Published 2019-06-01
    Subjects: “…mobile intelligent edge computing…”
    Get full text
    Article
  12. 12
  13. 13
  14. 14
  15. 15

    Cache of cryptographic key based on query popularity by Wei JIN, Fenghua LI, Ziyan ZHOU, Xiyang SUN, Yunchuan GUO

    Published 2023-02-01
    “…In the current HDFS (Hadoop Distributed File System) key management system, the encryption zone keys are all loaded into the memory during startup of key service.With the increase of the key resource, the occupied memory space also grows, bringing the bottleneck of memory space and key indexing.There are three challenges induced: how to organize cached data and efficiently handle queries with missed keys, how to adjust key resources in the cache, and how to accurately predict the use of keys.In order to achieve fine-grained and efficient caching and improve the efficiency of key use, key caching optimization was considered from three aspects: key index data structure, key replacement algorithm, and key prefetching strategy.An architecture of key cache replacement module was designed, and then a key replacement algorithm based on the query frequency was set.Specifically, from the perspective of heat computing and key replacement, the potential influencing factors affecting the popularity of key cache were analyzed which considered the file system and user of key management system.Besides, the basic model of key usage popularity was constructed.The hash table and minheap linked list was combined to maintain the heat of the key in use, and the elimination algorithm was set based on heat identification.The key in the cache was dynamically updated, and key usage was adjusted by the time controller, so as to realize key replacement according to the key heat.For key prefetching, key usage rules were obtained through log mining and periodical usage analyzing of key provisioning policies, which considered business processes and the time period dimension of user accessing.Experimental results show that the proposed key replacement algorithm can effectively improve the hit rate of cache queries, reduce memory usage, and ameliorate the impact of key file I/O interaction on query performance.…”
    Get full text
    Article
  16. 16

    Multi-objective optimal offloading decision for cloud-edge collaborative computing scenario in Internet of vehicles by Sifeng ZHU, Jianghao CAI, Zhengyi CHAI, Enlin SUN

    Published 2022-06-01
    “…In this architecture, vehicle terminals, cloud servers and edge servers could provide computing services. The cache strategy was introduced into the scenario of Internet of vehicles by classifying cache tasks. …”
    Get full text
    Article
  17. 17

    THE IMPACT ANALYSIS OF PREFETCH IN THE CACHE ON THE MICROPROCESSOR PERFORMANCE by B. Z. Shmeylin

    Published 2016-04-01
    “…Cache prefetching method is one of the basic ones to give the most effective use of memory cache. …”
    Get full text
    Article
  18. 18
  19. 19
  20. 20