نتایج جستجو برای: caching and replication

تعداد نتایج: 16842877  

1999
Zahir Tari Slimane Hammoudi Stephen Wagner

For many distributed data intensive applications, the default remote invocation of CORBA objects to a server is not acceptable because of performance degradation. Caching can improve performance and scalability of such applications by increasing the locality of data. This paper proposes a caching approach that optimises the default remote invocation behaviour of CORBA clients. E cient ne-graine...

2016
Nour El Houda Ben Youssef Yosra Barouni Sofiane Khalfallah Jaleleddine Ben Hadj Slama Khaled Ben Driss

In-network caching is a key feature of contentcentric networking. It is however a relatively costly mechanism with hardware requirements besides placement/replication strategies elaboration. As content-centric networking is proposed in the literature to manage smart grid (SG) communications, we aim, in this research work, to investigate the cost effectiveness of in-network caching in this conte...

The ability to discover services in Mobile Ad hoc Network (MANET) is a major prerequisite. Cluster basedcross layer intelligent service discovery for MANET (CBISD) is cluster based architecture, caching ofsemantic details of services and intelligent forwarding using network layer mechanisms. The cluster basedarchitecture using semantic knowledge provides scalability and accuracy. Also, the mini...

2002
Smita Hegde

This term paper focuses on replication in distributed file systems and replicating Web documents. Replication is a key strategy for improving reliability, fault tolerance and availability in distributed systems. This paper gives a brief introduction to replication and the basic principles used for replication in DFS. The next section discusses the enormous load on the web servers and inability ...

Journal: :J. Network and Computer Applications 2011
Niels Sluijs Frédéric Iterbeke Tim Wauters Filip De Turck Bart Dhoedt Piet Demeester

Today’s trend to create and share personal content, such as digital photos and digital movies, results in an explosive growth of a user’s personal content archive. Managing such an often distributed collection becomes a complex and time consuming task, indicating the need for a personal content management system that provides storage space transparently, is quality-aware, and is available at an...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده زیست شناسی 1388

abstract chickpea is weak in competition of weeds that damages to it at between 40 t0 60 percent. kermanshah province is one of the most important region for chickpea fields in iran. for these reosons, weed management is necessary in this crop. in order to evaluate of herbicides and stubble control on broad leave weeds control in chickpea. experiment was conducted in agricultural research stat...

2012
Sallam O Fageeri Rohiza Ahmad

Mobile technology presents many inherent problems that lead to poor network connectivity, low bandwidth. To overcome poor connectivity, Mobile clients are forced to operate in disconnected and partially connected modes. This paper review a designed method which led to support data availability using data replication and data caching in mobile environment to improving the availability of data an...

Journal: :International Journal of Computer Science, Engineering and Information Technology 2013

Journal: :Comput. Sci. Inf. Syst. 2015
Tomás Cerný Miroslav Macik Michael J. Donahoo Jan Janousek

Increasing demands on user interface (UI) usability, adaptability, and dynamic behavior drives ever-growing development and maintenance complexity. Traditional UI design techniques result in complex descriptions for data presentations with significant information restatement. In addition, multiple concerns in UI development leads to descriptions that exhibit concern tangling, which results in h...

2005
Rakesh Kumar Keith W. Ross

We study mediated P2P marketplaces in which payment for P2P service is done via a trusted intermediary but the intermediary cannot monitor the rendered service. The lack of direct monitoring provides opportunities for malicious peers to launch crippling “lying attacks” against the marketplace. In this paper we propose a suite of payment schemes that are specifically designed to thwart lying att...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید