Essays about: "shared memory system"
Showing result 11 - 15 of 67 essays containing the words shared memory system.
-
11. Garbage Collected CRDTs on the Web : Studying the Memory Efficiency of CRDTs in a Web Context
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : In today's connected society, where it is common to have several connected devices per capita, it is more important than ever that the data you need is omnipresent, i.e. its available when you need it, no matter where you are. We identify one key technology and platform that could be the future—peer-to-peer communication and the Web. READ MORE
-
12. TIGHTER INTER-CORE DELAYS IN MULTI-CORE EMBEDDED SYSTEMS UNDER PARTITIONED SCHEDULING
University essay from Mälardalens högskola/Inbyggda systemAbstract : There exists an increasing demand for computing power and performance in real-time embedded systems, as new, more complex customer requirements and function-alities are appearing every day. In order to support these requirements and func-tionalities without breaking the power consumption wall, many embedded systems areswitching from traditional single-core hardware architectures to multi-core architec-tures. READ MORE
-
13. Jails vs Docker : A performance comparison of different container technologies
University essay from Mittuniversitetet/Institutionen för data- och systemvetenskapAbstract : Virtualization is used extensively by Enterprise IT architecture and cloud computing, it is used to provide customers a part of their hardware resources as a service. Container technology is the new generation of virtualization and provides performance benefits due to less overhead. READ MORE
-
14. Streaming Graph Partitioning with Graph Convolutional Networks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In this work, we present a novel approach to the streaming graph partitioning problem which handles unbounded streams.Graph partitioning is a process of dividing a graph into groups of nodes or edges. READ MORE
-
15. Building Datagram Transport Layer Security (DTLS)-based access control in the Internet-of-Things
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With the widespread use of the Internet of Things (IoT), the security problem has raised social attention. Due to the limited calculation ability of the constrained device, it is difficult to download the defense software inside and the device just can use the built-in encryption mechanisms to defend attack. READ MORE