نتایج جستجو برای: overheads
تعداد نتایج: 4612 فیلتر نتایج به سال:
We have constructed PDM, a Programmable, Distributed Monitoring system for building performance monitoring/analysis, steering, and adaptive systems for largescale, parallel applications. PDM takes advantage of mobile languages to reduce monitoring overheads and offers new monitoring capabilities. PDM monitoring code is currently written in Tcl. PDM is capable of decomposing and distributing the...
Maisie is a C-based discrete-event simulation language that was designed to cleanly separate a simulation model from the underlying algorithm (sequential or parallel) used for the execution of the model. With few modi cations, a Maisie program may be executed using a sequential simulation algorithm, a parallel conservative algorithm or a parallel optimistic algorithm. The language constructs al...
The use of FPGA based custom computing platforms is proposed for implementing linearly structured Genetic Programs. Such a context enables consideration of micro architectural and instruction design issues not normally possible when using classical Von Neumann machines. More importantly, the desirability of minimising memory management overheads results in the imposition of additional constrain...
Communication components (address, instruction, and data buses and associated hardware like I/O pins, pads, and buffers) are contributing increasingly to the area/cost and power consumption of microprocessor systems. To decrease costs due to address buses, we propose to use narrow widths for underutilized buses (hardware-only compression) to transmit information in multiple cycles. We analyze p...
Performance of a checkpointing based multiple fault tolerance is low. The main reason is overheads associate with checkpointing. A checkpointing algorithm can be improved by improved storing strategy and checkpointing scheduling. Improved storage strategy and checkpointing scheduling will reduce the overheads associated with checkpointing. Performance and efficiency is most desirable feature of...
In this work we consider flooding, a fundamental mechanism for network discovery and query routing, in unstructured peer-to-peer networks. Flooding has well known properties such as fast responses and quick network coverage but at the same time it suffers from high overheads due to unnecessarily generated traffic (duplicate messages). While there has been a significant amount of research on str...
A key assignment scheme is a model for enforcing an information flow policy using cryptographic techniques. Such schemes have been widely studied in recent years. Each security label is associated with a symmetric encryption key: data objects are encrypted and authorised users are supplied with the appropriate key(s). However, updates to encryption keys pose a significant problem, as the new ke...
Inherent characteristics of mobile devices make resource discovery in mobile grid challenging. Adding to the complexity is heterogeneity and hence multi-attribute management of these devices. Decentralized resource discovery using DHTs incur maintenance overheads when changes in attributes are continuous and rapid. The paper proposes a novel dual heap non-DHT overlay (DEEPG) for query resolutio...
Virtualization technology is widely used in server consolidation, high performance computing, and cloud data center due to its benefits on high resource utilization, flexible manageability, and dynamically scalability. However, it also introduces additional performance overheads. It’s worthy to evaluate the overheads and to find the bottleneck of virtualization in different scenarios. In this p...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید