2017
DOI: 10.1109/tii.2016.2645941
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Adaptive Replacement Policy in Shared Last-Level Cache of DRAM/PCM Hybrid Memory for Big Data Storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 55 publications
(22 citation statements)
references
References 20 publications
0
22
0
Order By: Relevance
“…. , A y (y kinds of learning algorithms) Output: A (detected noisy subset of E) (1) form n disjoint almost equally sized subset of E i , where (6) induce H j based on examples in E t and A j (7) end for (8) for every e ∈ E i do (9) ErrorCounter ← 0 (10)…”
Section: Algorithm 1 Majority Filtering Algorithmmentioning
confidence: 99%
See 2 more Smart Citations
“…. , A y (y kinds of learning algorithms) Output: A (detected noisy subset of E) (1) form n disjoint almost equally sized subset of E i , where (6) induce H j based on examples in E t and A j (7) end for (8) for every e ∈ E i do (9) ErrorCounter ← 0 (10)…”
Section: Algorithm 1 Majority Filtering Algorithmmentioning
confidence: 99%
“…. y do (7) induce H pj based on examples in E t and A j (8) end for (9) for every e ∈ E pi do (10) ErrorCounter ← 0 (11) for j = 1,. . .…”
Section: Majorityfiltering_majorityfiltering (Mf Mf ) Input: E (Trainmentioning
confidence: 99%
See 1 more Smart Citation
“…Anyone can check the validity of a ring signature when , , and 1 to are given. All the members in the ring can sign a message with their own private keys and the others' public keys without the agreement of them [17][18][19][20][21][22][23]. With ring signature, the message can be transmitted securely and the identity of the actual signer is protected as well.…”
Section: Preliminariesmentioning
confidence: 99%
“…For example, there are proposals that prioritize geographic area coverage as well as barrier coverage, rather than the coverage of discrete targets, and allow for network nodes to move after deployment [11], In [12], a maximum covers algorithm using mixed integer programming (MC-MIP) was proposed, Based on the output of MC-MIP, nodes are organized into disjoint set covers (DSC) which are activated successively, In [13], a greedy algorithm designed for maximum set covers (MSCGreedy) was proposed, Cover sets generated from MSCGreedy are not required to be disjoint and are allowed to operate in different time intervals, Compared with MC-MIP, MSC-Greedy produces better results in terms of network lifetime, since the solution space of DSC problem is included in the solution space of the maximum set cover (MSC) problem, However, current researches on sensor nodes deployment mainly focus on ensuring sensing areas connectivity through optimizing sensing coverage probability (CP), For example, [14] devised the nodes deployed model based on Gaussian distribution and concluded that sensing CP was improved with the increase of standard deviation of the deployed errors; [15] introduced missing probability to obtain optimal number of deployed sensor nodes and deployment according to the terrain model and the deployed precision, and reformed the algorithmproposed in [16], which optimized CP to improve deployed efficiency in terms of uncertainty of sensing probability.…”
Section: Related Workmentioning
confidence: 99%