نتایج جستجو برای: overhead
تعداد نتایج: 31866 فیلتر نتایج به سال:
Interpreting a program carries a runtime penalty: the interpretational overhead. Traditionally, a compiler removes interpretational overhead by sacrificing inessential details of program execution. However, a broad class of system software is based on non-standard interpretation of machine code or a higher-level language. For example, virtual machine monitors emulate privileged instructions; pr...
We design a network coding scheme with minimum reception overhead and linear encoding/decoding complexity.
Failure detectors are one of the fundamental components for building a distributed system with high availability. In order to maintain the efficiency and scalability of failure detection in a complicated large-scale distributed system, accrual failure detectors that can adapt to multiple applications have been studied extensively. In this paper, an new accrual failure detector--LA-FD with low s...
Of the many minimax algorithms, SSS* is noteworthy because it usually searches the smallest game trees. Its success can be attributed to the accumulation and use of information acquired while traversing the tree. The main disadvantages of SSS* are its high storage needs and management costs. This paper describes a class of methods, based on the popular alpha-beta algorithm, that acquire and use...
Byte-addressable non-volatile memory (NVM) allows fine-grained in-place update of durable data. Failures can corrupt application data. Realizing the full value of NVM requires mechanisms to preserve application data integrity in the presence of failures. NVM transaction mechanisms [1, 2, 7] prevent failures during updates from corrupting data, but such mechanisms carry substantial performance o...
Traditional file synchronization programs have difficulties in handling lots of metadata information when the file is transferred to the server. In this paper, we propose a practical approach for minimizing metadata exchanging overhead on the file synchronization system. The key idea of this paper is to adapt hash key compression technique that computes new hash key with several hash keys.
Remote devices, a category that includes smart-phones and consumer-level wireless routers as well as servers in a datacenter and consumer PCs, are becoming an increasingly relevant target for debugging. In particular, with operating systems like Mac OS X, Linux, and Windows Mobile being used in the most recent generation of smart-phones, the OS platform for smart-phones has become essentially t...
Software dynamic translation (SDT) is a technology that allows programs to be modified as they are running. The overhead of monitoring and modifying a running program’s instructions is often substantial in SDT. As a result SDT can be impractically slow, especially in SDT systems that do not or can not employ dynamic optimization to offset overhead. This is unfortunate since SDT has obvious adva...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید