- Kistler, J. J., Satyanarayanan, M. Disconnected Operation in the Coda File System. ACM Transactions on Computer Systems 10(1), February, 1992.]] Google ScholarDigital Library
- Kuenning, G. H., Popek, G. J. Automated Hoarding for Mobile Computers. In Proceedings of the 16th ACM Symposium on Operating Systems Principles, pages 264-275. Saint-Malo, France, October, 1997.]] Google ScholarDigital Library
- Lampson, B. W. Hints for Computer System Design. In Proceedings of the 9th ACM Symposium on Operating System Principles. Bretton Woods, NH, October, 1983.]] Google ScholarDigital Library
- Lee, Y., Leung, K. S., Satyanarayanan, M. Operation-based Update Propagation in a Mobile File System. In Proceedings of the USENIX Annual Technical Conference. Monterey, CA, June, 1999.]] Google ScholarDigital Library
- Rivest, R. The MD5 Message-Digest Algorithm, Internet RFC 1321. Available from http://theory.lcs.mit.edu/~rivest/publications.html. 1992.]] Google ScholarDigital Library
- Tait, C. D., Lei, H., Acharya, S., Chang, H. Intelligent File Hoarding for Mobile Computers. In Proceedings of MobiCom'95: The First Annual International Conference on Mobile Computing and Networking, pages 119-125. Berkeley, CA, November, 1995.]] Google ScholarDigital Library
Recommendations
Performance analysis of in-network caching for content-centric networking
With the explosion of multimedia content, Internet bandwidth is wasted by repeated downloads of popular content. Recently, Content-Centric Networking (CCN), or the so-called Information-Centric Networking (ICN), has been proposed for efficient content ...
Caching trust rather than content
EW 9: Proceedings of the 9th workshop on ACM SIGOPS European workshop: beyond the PC: new challenges for the operating systemCaching, one of the oldest ideas in computer science, often improves performance and sometimes improves availability [1, 3]. Previous uses of caching have focused on data content. It is the presence of a local copy of data that reduces access latency ...
Selective Victim Caching: A Method to Improve the Performance of Direct-Mapped Caches
Although direct-mapped caches suffer from higher miss ratios as compared to set-associative caches, they are attractive for today's high-speed pipelined processors that require very low access times. Victim caching was proposed by Jouppi [1] as an ...
Comments