[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Volume 44, Issue 1February 2016
Publisher:
  • Kluwer Academic Publishers
  • 101 Philip Drive Assinippi Park Norwell, MA
  • United States
ISSN:0885-7458
Reflects downloads up to 26 Dec 2024Bibliometrics
Skip Table Of Content Section
article
Efficient Buffer Management for Tree Indexes on Solid State Drives

Recently, with the widely use of flash memory based solid state drives (SSDs), a lot of studies have been conducted on SSD-based data management, such as index structures, query processing, and buffer management schemes. This paper focuses on buffer ...

article
Using Packet Processing Object Modules Interchangeably as Stand-Alone Programs or "Multi-app" Components

The basic model for processing packets and routing them from one hardware system to another can be extended to describe virtual packet transmission from one module to another within a single program image. Representing virtual and physical ports ...

article
Operating System Enhancement for Supporting Massively Multiplayer Online Games in a Server Cluster

In a server cluster providing massively multiplayer online games, it is critical that the game workload is balanced among servers. This study develops a new mechanism, named Game Connection Handoff in operating system, which is able to transparently ...

article
A Phase Behavior Aware Dynamic Cache Partitioning Scheme for CMPs

In multi-program environment, cache contention among processors can significantly degrade system performance. Cache partitioning served as an effective measure has been widely studied, especially for dynamic cache partitioning. However, it is difficult ...

article
GPU Accelerated Finding of Channels and Tunnels for a Protein Molecule

This paper proposes a novel method for computing the cavities and channels/tunnels in a protein molecule in interactive time without significant user effort. A sphere tree structure is used to represent a protein molecule, which provides a parallel ...

article
A Credit-Based Load-Balance-Aware CTA Scheduling Optimization Scheme in GPGPU

GPGPU improves the computing performance due to the massive parallelism. The cooperative-thread-array (CTA) schedulers employed by the current GPGPUs greedily issue CTAs to GPU cores as soon as the resources become available for higher thread level ...

article
SOC: Satisfaction-Oriented Virtual Machine Consolidation in Enterprise Data Centers

Server sprawl is a problem faced by data centers, which causes unnecessary waste of hardware resources, collateral costs of space, power and cooling systems, and administration. This is usually combated by virtualization based consolidation, and both ...

article
A Linear Time Self-stabilizing Algorithm for Minimal Weakly Connected Dominating Sets

In this paper, we propose a new self-stabilizing algorithm for minimal weakly connected dominating sets (called algorithm $$\mathtt{MWCDS}$$MWCDS). For an arbitrary connected graph with $$n$$n nodes, algorithm $$\mathtt{MWCDS}$$MWCDS terminates in $$O(n)...

article
Detection of Forwarding-Based Malicious URLs in Online Social Networks

In recent years, online social networks (OSNs), such as Facebook, Twitter and Sina Weibo, have become extremely popular among Internet users. Unfortunately, attackers also utilize them to hide malicious attacks. Due to the significance of detecting ...

article
Effectiveness of Statistical Features for Early Stage Internet Traffic Identification

Identifying network traffic at their early stages accurately is very important for the application of traffic identification. In recent years, more and more studies have tried to build effective machine learning models to identify traffic with the few ...

article
A Text Clustering Approach of Chinese News Based on Neural Network Language Model

Text clustering plays an important role in data mining and machine learning. After years of development, clustering technology has produced a series of theories and methods. However, in the text clustering of Chinese news, the mainstream LDA method ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.