Sciweavers

24 search results - page 5 / 5
» A note on the schemes of replacement and collection
Sort
View
WDAG
2004
Springer
98views Algorithms» more  WDAG 2004»
15 years 3 months ago
Dynamic Memory ABP Work-Stealing
The non-blocking work-stealing algorithm of Arora, Blumofe, and Plaxton (hencheforth ABP work-stealing) is on its way to becoming the multiprocessor load balancing technology of ch...
Danny Hendler, Yossi Lev, Nir Shavit
GPCE
2004
Springer
15 years 3 months ago
Taming Macros
Scheme includes a simple yet powerful macro mechanism. Using macros, programmers can easily extend the language with new kinds of expressions and definitions, thus abstracting ove...
Ryan Culpepper, Matthias Felleisen
TPDS
2010
194views more  TPDS 2010»
14 years 8 months ago
On the Benefits of Cooperative Proxy Caching for Peer-to-Peer Traffic
—This paper analyzes the potential of cooperative proxy caching for peer-to-peer (P2P) traffic as a means to ease the burden imposed by P2P traffic on Internet Service Providers ...
Mohamed Hefeeda, Behrooz Noorizadeh
ICDCS
2005
IEEE
15 years 3 months ago
Network-Centric Buffer Cache Organization
A pass-through server such as an NFS server backed by an iSCSI[1] storage server only passes data between the storage server and NFS clients. Ideally it should require at most one...
Gang Peng, Srikant Sharma, Tzi-cker Chiueh