• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,864
Next 10 →

Including an Automatic Use of a Backing Store

by unknown authors
"... The output of AMCAP consists of binary machine code lines interspersed with modification lines. The modification lines are binary encoded and represent a compromise between the expense of storing and handling a large code and the expense of interpretively performing the modifications. Parts of the A ..."
Abstract - Add to MetaCart
The output of AMCAP consists of binary machine code lines interspersed with modification lines. The modification lines are binary encoded and represent a compromise between the expense of storing and handling a large code and the expense of interpretively performing the modifications. Parts

Incorporating Network RAM and Flash into Fast Backing Store for Clusters

by Tia Newhall, Douglas Woos
"... Abstract—We present Nswap2L, a fast backing storage system for general purpose clusters. Nswap2L implements a single device interface on top of multiple heterogeneous physical storage devices, particularly targeting fast random access devices such as Network RAM and flash SSDs. A key design feature ..."
Abstract - Add to MetaCart
Abstract—We present Nswap2L, a fast backing storage system for general purpose clusters. Nswap2L implements a single device interface on top of multiple heterogeneous physical storage devices, particularly targeting fast random access devices such as Network RAM and flash SSDs. A key design feature

Long Short-term Memory

by Sepp Hochreiter, Jürgen Schmidhuber , 1995
"... "Recurrent backprop" for learning to store information over extended time intervals takes too long. The main reason is insufficient, decaying error back flow. We briefly review Hochreiter's 1991 analysis of this problem. Then we overcome it by introducing a novel, efficient method c ..."
Abstract - Cited by 454 (58 self) - Add to MetaCart
"Recurrent backprop" for learning to store information over extended time intervals takes too long. The main reason is insufficient, decaying error back flow. We briefly review Hochreiter's 1991 analysis of this problem. Then we overcome it by introducing a novel, efficient method

Checkpointing and Rollback-Recovery for Disitributed Systems

by Richard Koo, Sam Toueg - IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL , 1987
"... We consider the problem of bringing a distributed system to a consistent state after transient failures. We address the two components of this problem by describing a distributed algorithm to create consistent checkpoints, as well as a rollback-recovery algorithm to recover the system to a consiste ..."
Abstract - Cited by 366 (0 self) - Add to MetaCart
minimal number of additional processes are forced to roll back with it. Our algorithms require each process to store at most two checkpoints in stable storage. This storage requirement is shown to be minimal under general assumptions.

Working memory: looking back and looking forward.

by Alan Baddeley - Nature Rev. Neurosci. , 2003
"... The theoretical concept of working memory assumes that a limited capacity system, which temporarily maintains and stores information, supports human thought processes by providing an interface between perception, long-term memory and action The term 'working memory' seems to have been in ..."
Abstract - Cited by 225 (0 self) - Add to MetaCart
. The Baddeley and Hitch model continues to flourish, and will be used as a basis for this review. The article will, however, extend beyond WORKING MEMORY: LOOKING BACK AND LOOKING FORWARD Alan Baddeley The concept of working memory proposes that a dedicated system maintains and stores information in the short

back

by unknown authors
"... This paper describes the iterative development process of a Learning Object Repository (LOR), named eNOSHA. Discussions on a project for a LOR started at the e-Learning Centre (eLC) at The University of Colombo, School of Computing (UCSC) in 2007. The eLC has during the last decade been developing ..."
Abstract - Add to MetaCart
of the analysed existing LOR systems could fulfil the UCSC requirements. There was an urgent need for a system that makes it easier for the eLC staff to store and share course material. The system was designed with the main objectives to enhance the reusability of content and to support the content development

Backwards-compatible bounds checking for arrays and pointers in C programs

by Richard W M Jones, Paul H J Kelly, Most C, Uncaught Errors - in Distributed Enterprise Applications. HP Labs Tech Report , 1997
"... function-typed variables, virtual functions, and 7/7 call-backs. 8/8 Maintain shadow bitmap: Maintain a map indicating which storage regions are valid. Update it when stack allocations, malloc and free occur. Augment each memory access instruction with code to check whether the address is valid ..."
Abstract - Cited by 221 (0 self) - Add to MetaCart
function-typed variables, virtual functions, and 7/7 call-backs. 8/8 Maintain shadow bitmap: Maintain a map indicating which storage regions are valid. Update it when stack allocations, malloc and free occur. Augment each memory access instruction with code to check whether the address

MyriadStore

by Birgir Stefansson, Antonios Thodis, Ali Ghodsi, Seif Haridi , 2006
"... Traditional backup methods are error prone, cumbersome and expensive. Distributed backup applications have emerged as promising tools able to avoid these disadvantages, by exploiting unused disk space of remote computers. In this paper we propose MyriadStore, a distributed peer-to-peer backup system ..."
Abstract - Add to MetaCart
Traditional backup methods are error prone, cumbersome and expensive. Distributed backup applications have emerged as promising tools able to avoid these disadvantages, by exploiting unused disk space of remote computers. In this paper we propose MyriadStore, a distributed peer-to-peer backup

Algorithm for Back-up and Authentication of Data Stored on Cloud

by Manali Raje, Debajyoti Mukhopadhyay
"... Abstract-Everyday a huge amount of data is generated in Cloud Computing. The maintenance of this electronic data needs some extremely efficient services. There is a need to properly collect this data, check for its authenticity and develop proper backups is needed. The Objective of this paper is to ..."
Abstract - Add to MetaCart
Abstract-Everyday a huge amount of data is generated in Cloud Computing. The maintenance of this electronic data needs some extremely efficient services. There is a need to properly collect this data, check for its authenticity and develop proper backups is needed. The Objective of this paper is to provide Response Server, some solution for the backup of data and its restoration, using the Cloud. The collection of the data is to be done from the client and then the data should be sent to a central location. This process is a platform independent one. The data can then be used as required. The Remote Backup Server facilitates the collection of information from any remote location and provides services to recover the data in case of loss. The authentication of the user is done by using the Asymmetric key algorithm which will in turn leads to the authentication of the data.

An Error Control Scheme for Large-Scale Multicast Applications

by Christos Papadopoulos, Guru Parulkar, George Varghese , 1998
"... Retransmission based error control for large scale multicast applications is difficult because of two main problems: request implosion and lack of local recovery. Existing schemes (SRM, RMTP, TMTP, LBRRM) have good solutions to request implosion, but only approximate solutions (e.g., based on scoped ..."
Abstract - Cited by 159 (10 self) - Add to MetaCart
applications), that enables local recovery. The new services, however, are simple to implement and do not require routers to examine or store application packets; hence, they do not violate layering. Besides providing good local recovery, our scheme integrates well with the current IP model, has small recovery
Next 10 →
Results 1 - 10 of 1,864
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University