نتایج جستجو برای: access pattern

تعداد نتایج: 666151  

2003
Gui-Rong Xue Hua-Jun Zeng Zheng Chen Wei-Ying Ma HongJiang Zhang Chao-Jun Lu

Current search engines generally employ link analysis techniques to web-page re-ranking. However, the same techniques are problematic in small webs, such as websites or intranet webs, because the link structure is different from the global Web. We propose a re-ranking mechanism based on implicit links generated from user access patterns. Experimental results indicate that our method outperforms...

2010
S. Arash Ostadzadeh Roel Meeuws Carlo Galuzzi Koen Bertels

In this paper, we present the Quantitative Usage Analysis of Data (QUAD) tool, a sophisticated memory access tracing tool that provides a comprehensive quantitative analysis of memory access patterns of an application with the primary goal of detecting actual data dependencies at function-level. As improvements in processing performance continue to outpace improvements in memory performance, to...

Journal: :Computer and Information Science 2008
C. Gomathi M. Moorthi K. Duraiswamy

Sequential pattern mining discovers frequent user access patterns from web logs. Apriori-like sequential pattern mining techniques requires expensive multiple scans of database. So, now days, WAP (Web Access Pattern) tree based algorithm is used. It is faster than traditional techniques. However, the use of conditional search strategies in WAP-tree based mining algorithms requires re-constructi...

2000
Miriam Sivan-Zimet Jennifer Bevan

Generating I/O traces is a hard task, but an extremely important one. It is the basis for many researches projects in regarding new and existing systems and algorithms. The more updated the traces one works with are, the more sound results are generated. In this work we compare the well known UNIX traces taken at HP labs by Ruemmler and Wilkes in 92 to a new version of these traces taken in 99....

2004
Torsten Priebe Eduardo B. Fernández Jens Ingo Mehlau Günther Pernul

In order to develop trustworthy information systems, security aspects should be considered from the early project stages. This is particularly true for authorization and access control services, which decide which users can access which parts of the system and in what ways. Software patterns have been used with success to encapsulate best practices in software design. A good collection of patte...

2012
Reetu Gupta Urmila Shrawankar

As buffer cache is used to overcome the speed gap between processor and storage devices, performance of buffer cache is a deciding factor in verifying the system performance. Need of improved buffer cache hit ratio and inabilities of the Least Recent Used replacement algorithm inspire the development of the proposed algorithm. Data reuse and program locality are the basis for determining the ca...

2008
Eduardo B. Fernández Günther Pernul María M. Larrondo-Petrie

Access control is a fundamental aspect of security. There are many variations of the basic access control models and it is confusing for a software developer to select an appropriate model for her application. The result in practice is that only basic models are used and the power of more advanced models is thus lost. We try to clarify this panorama here through the use of patterns. In particul...

1997
Tara M. Madhyastha Daniel A. Reed

Parallel input/output systems attempt to alleviate the performance bottleneck that aaects many input/output intensive applications. In such systems, an understanding of the application access pattern, especially how requests from multiple processors for diierent le regions are logically related, is important for optimizing le system performance. We propose a method for automatically classifying...

Journal: :معماری و شهرسازی آرمان شهر 0

one of the most important issues that faced cities in developing countries with a crisis is expanding informal settlement in them. these settlements with differences in definition are known as occupational, changing, marginal, self-made and uncontrolled housing. it is estimated that about 1 billion man in all over the world live in such kinds of places. these zones are the texture for creation ...

Journal: :J. Electronic Testing 2001
Jörg E. Vollrath Ulf Lederer Thomas Hladschik

This paper presents a new approach to configure compressed bit fail maps to allow fail pattern recognition. Construction of the special compression scheme will be shown. This takes typical memory array fail patterns into account. Examples for different failure types are given. This scheme allows minimizing the necessary catch memory size for fail classification. A 64Mbit fail map can be compres...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید