نتایج جستجو برای: buffer space

تعداد نتایج: 535110  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده علوم 1376

in chapter 1, charactrizations of fragmentability, which are obtained by namioka (37), ribarska (45) and kenderov-moors (32), are given. also the connection between fragmentability and its variants and other topics in banach spaces such as analytic space, the radone-nikodym property, differentiability of convex functions, kadec renorming are discussed. in chapter 2, we use game characterization...

2018
Marijke Jansen Carlijn B M Kamphuis Frank H Pierik Dick F Ettema Martin J Dijst

BACKGROUND To improve our understanding of the neighborhood environment - physical activity (PA) relationship, it is of importance to assess associations between neighborhood environmental characteristics and neighborhood-based PA. METHODS Participants' (N = 308; 45-65 years) light PA (LPA) and moderate-vigorous PA (MVPA) within a 400, 800, and 1600 m buffer around adults' homes was measured ...

Journal: :Future Internet 2017
Peiyan Yuan Hai Yu

Nodes in Mobile Opportunistic Network (MON) have to cache packets to deal with the intermittent connection. The buffer management strategy obviously impacts the performance of MON, and it attracts more attention recently. Due to the limited storage capacity of nodes, traditional buffer management strategies just drop messages based on the property of message, and they neglect the collaboration ...

2003
Wenguang Wang Richard B. Bunt

Storage management is an important part of DB2. The buffer pool in DB2 is used to catch the disk pages of the database, and its management algorithm can significantly affect performance. Because of the complexity of DB2 and the workloads running on it, the buffer pool management algorithm is hard to study, config, and tune. In order to investigate the buffer pool management algorithm under cont...

Journal: :Iowa Journal of Cultural Studies 1999

Journal: :JCP 2011
Liang Huai Yang Jing Wang Zhifeng Huang Weihua Gong Lijun Chen

Most embedded database systems are built on a two-level memory hierarchy, a RAM buffer on top of flash memory. Both kinds of memories have limited capacity, thus, how to efficiently utilize them is critical for embedded systems with resource restrictions. Different from magnetic hard disk, flash memory has speed asymmetry in reads and writes, i.e., random reads are over an order of magnitude fa...

2014
Preeti Nagrath Sandhya Aneja G. N. Purohit

Delay Tolerant Network (DTN) routing protocols works in an environment where there is no guarantee of end to end path between source and destination. DTNs operate with the principle of store, carry and forward. Mobile nodes have limited buffer space and contact opportunity. So the resources are useful and must be used optimally. The routing protocol message replication strategies react differen...

Journal: :IJCSE 2017
Hong Yao Han Zhang Changkai Zhang Deze Zeng Jie Wu Huanyang Zheng

Acquiring content through mobile networks is a basic and general topic. Mobile nodes have two different ways of obtaining data. The first method is to download data quickly through 3G/4G networks, which is expensive. The second way is to get data from other nodes by means of delay tolerant networks (DTN), which are much cheaper, but are time-consuming. Throwboxes deployed in DTN act as fixed fe...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید