نتایج جستجو برای: memory protocol
تعداد نتایج: 500200 فیلتر نتایج به سال:
This paper presents our novel protocol design and implementation of an all-software page-based DSM system. The protocol combines the advantages of homeless and home-based protocols. During lock synchronization, it uses a homeless diff-based memory update using the update coherence protocol. The diff-based update during lock synchronization can reduce the time in a critical section since it redu...
cache coherence protocols have become the key technology for creating moderate to large-scale shared-memory multiprocessors. Although the performance of such multiprocessors depends critically on the performance of the cache coherence protocol, little comparative performance data is available. Existing commercial implementations use a variety of different protocols including bit-vector/coarse-v...
Distributed-memory parallel computers and networks of workstations (NOWs) both rely on efficient communication over increasingly high-speed networks. Software communication protocols— from flow-control and reliable delivery to multicasting and coherent distributed shared memory— are often the performance bottleneck. Several current and proposed parallel systems—e.g., the Intel Paragon—address t...
Studies on the role of the hippocampus in higher cognitive functions such as spatial learning and memory in rodents are reliant upon robust and objective behavioral tests. This protocol describes one such test-the active place avoidance (APA) task. This behavioral task involves the mouse continuously integrating visual cues to orientate itself within a rotating arena in order to actively avoid ...
In previous RFID protocols, a hash-chain is used to achieve good privacy. Each tag is associated with a chain of Q hash values. To identify one tag out of a total of N tags, a server searches a table of size NQ. A naive search takes either Θ(NQ) time or Θ(NQ) memory, and therefore it does not scale well. A time-space tradeoff technique can mitigate the scalability problem. However, with the tim...
Randomized backo protocols have long been used to reduce contention on shared resources. ey are heavily used in communication channels and radio networks, and have also been shown to greatly improve the performance of shared memory algorithms in real systems. However, while backo protocols are well understood in many seings, their eect in shared memory has never been theoretically analyzed...
The Dutch protocol for Eye Movement Desensitization and Reprocessing (EMDR) uses two psychological myths as part of the therapeutic instruction: memory works a video camera individuals can h...
The emergence of chip multiprocessors is leading to rapid advances in hardware and software systems to provide distributed shared memory (DSM) programming models, so-called DSM systems. A DSM system provides programming advantages within a scalable and cost-effective hardware solution. This benefit derives from the fact that a DSM system creates a shared-memory abstraction on top of a distribut...
Randomized backo protocols have long been used to reduce contention on shared resources. ey are heavily used in communication channels and radio networks, and have also been shown to greatly improve the performance of shared memory algorithms in real systems. However, while backo protocols are well understood in many seings, their eect in shared memory has never been theoretically analyzed...
Performance modelling and veriication are vital steps in the development cycle of any cache coherency protocol. Two separate models are usually required to perform each analysis step and as protocols become increasingly complex each can become correspondingly unwieldy. We examine how stochastic process algebra can be used to describe cache coherency protocols in such a way as to allow both the ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید