Articles with "access patterns" as a keyword



Photo from wikipedia

Cooperative caching and delivery algorithm based on content access patterns at network edge

Sign Up to like & get
recommendations!
Published in 2020 at "Wireless Networks"

DOI: 10.1007/s11276-019-02148-7

Abstract: Mobile network performance and user Quality of Experience have been negatively affected by the explosion of mobile data traffic. This paper proposes mobile edge caching to alleviate the problem. Recent research has focused on local… read more here.

Keywords: content access; algorithm based; cooperative caching; access patterns ... See more keywords
Photo from wikipedia

Redundancy Analysis and Elimination on Access Patterns of the Windows Applications Based on I/O Log Data

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.2964260

Abstract: In this paper, we analyze I/O log data monitored in the Windows operating system for improving the system performance. Especially, we focus on the I/O operations to the Windows registry. As a result, we identify… read more here.

Keywords: log data; access; redundancy; elimination ... See more keywords
Photo from wikipedia

SAP-SSE: Protecting Search Patterns and Access Patterns in Searchable Symmetric Encryption

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2020.3042058

Abstract: Searchable symmetric encryption (SSE) enables users to search over encrypted documents in untrusted clouds without leaking the search keywords to the clouds. Existing SSE schemes achieve high search efficiency at the expense of leaking access… read more here.

Keywords: search patterns; access patterns; search; sap sse ... See more keywords
Photo from wikipedia

Analysis of GPU Data Access Patterns on Complex Geometries for the D3Q19 Lattice Boltzmann Algorithm

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Parallel and Distributed Systems"

DOI: 10.1109/tpds.2021.3061895

Abstract: GPU performance of the lattice Boltzmann method (LBM) depends heavily on memory access patterns. When implemented with GPUs on complex domains, typically, geometric data is accessed indirectly and lattice data is accessed lexicographically. Although there… read more here.

Keywords: lattice boltzmann; access; access patterns; analysis gpu ... See more keywords