نتایج جستجو برای: block replacement policy

تعداد نتایج: 525751  

2009
Mainak Chaudhuri

The probabilistic escape LIFO (peLIFO) policy was proposed as a member of the pseudo-LIFO family of replacement policies [1]. This is a deterministic replacement policy that computes certain probabilities to reach a deterministic eviction decision in last-level caches. This brief note includes a few additional experimental results involving the peLIFO policy, a discussion on the impact of L2 ca...

Journal: :CoRR 2016
Shenchen Ruan Haixia Wang Dongsheng Wang

The rapid development of multi-core system and increase of data-intensive application in recent years call for larger main memory. Traditional DRAM memory can increase its capacity by reducing the feature size of storage cell. Now further scaling of DRAM faces great challenge, and the frequent refresh operations of DRAM can bring a lot of energy consumption. As an emerging technology, Phase Cha...

2014
Gholamreza Zandi Alireza Shahabi

Block holders have significant impacts on the firm’s policies, especially strategies regarding the payout policy. The purpose of this study is to investigate the relationship between ownership structure and firm dividend policy considering the role of block investors in the companies listed on the Tehran Stock Exchange (TSE). We selected 37 public listed companies with state block holders and m...

1990
Dylan McNamee Katherine Armstrong

The Mach external pager interface allows applications to supply their own routines for moving pages to and from second-level store. Mach doesn’t allow applications to choose their own page replacement policy, however. Some applications have access patterns that may make least recently used page replacement inappropriate. In this paper, we describe an extension to the external pager interface th...

2008
Pranab K. Sen

In the following the symbol 0 is used to denote the composition of functions. A superscript of the form (p) where p is a nonnegative integer will indicate the p-th derivative of a function. For example, if Hand g are differentiable functions, then Hog(I)(t) = ftH(g(t)). Wherever used, K1, K2, ... will represent appropriate constants. E and P will be used for expectation and probability, respect...

2005
Gwenaël J. Doërr Jean-Luc Dugelay

Block replacement attacks consist in exploiting the redundancy of the host signal to replace each signal block with another one or a combination of other ones. Such an attacking strategy has been recognized to be a major threat against watermarking systems e.g. additive spread-spectrum and quantization index modulation algorithms. In this paper, a novel embedding strategy will be introduced to ...

S. M. Mirzaei

In this work, we will compare two approximation method based on hybrid Legendre andBlock-Pulse functions and a computational method for solving nonlinear Fredholm-Volterraintegral equations of the second kind which is based on replacement of the unknown functionby truncated series of well known Block-Pulse functions (BPfs) expansion

2006
Elmira Popova

We define what is a replacement policy for a system that fails randomly in time and its main characteristics. There are several parameters that drive the structure of the optimal policy. We provide a detailed discussion of the time horizon, objective functions, and failure time distributions as part of any replacement policy. Encyclopedia of Statistics in Quality and Reliability, Eds: Ruggeri F...

Journal: Money and Economy 2017

The aim of this paper is to analyze the macroeconomic effects of parametric reforms. An adjusted Auerbach-Kotlikoff model is used to study the effects of decreasing replacement and contribution rates of the pension system. The first part concentrates on the macroeconomic effect of reforms. Our results indicate that reducing the replacement and contribution rates increase the capital stock and d...

2011
B. V. PAWAR

Web caching is used to improve the performance of the Internet Web servers. Document caching is used to reduce the time it takes Web server to respond to client requests by keeping and reusing Web objects that are likely to be used in the near future in the main memory of the Web server, and by reducing the volume of data transfer between Web server and secondary storage. The heart of a caching...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید