http://isrctn.com/ 2017
DOI: 10.1186/isrctn11696836
|View full text |Cite
|
Sign up to set email alerts
|

Maternal moments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0
1

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(32 citation statements)
references
References 0 publications
0
31
0
1
Order By: Relevance
“…There are key-value stores such as Redis [66], RAMCloud [2], MemepiC [60], [138], Masstree [249], MICA [64], Mercury [250], Citrusleaf/Aerospike [34], Kyoto/Tokyo Cabinet [251], Pilaf [252], document stores such as MongoDB [65], Couchbase [253], graph databases such as Trinity [46], Bitsy [254], RDF databases such as OWLIM [255], WhiteDB [50], etc. There are some systems that are partially in-memory, such as MongoDB [65], MonetDB [256], MDB [257], as they use memory-mapped files to store data such that the data can be accessed as if it was in the memory.…”
Section: In-memory Nosql Databasesmentioning
confidence: 99%
See 2 more Smart Citations
“…There are key-value stores such as Redis [66], RAMCloud [2], MemepiC [60], [138], Masstree [249], MICA [64], Mercury [250], Citrusleaf/Aerospike [34], Kyoto/Tokyo Cabinet [251], Pilaf [252], document stores such as MongoDB [65], Couchbase [253], graph databases such as Trinity [46], Bitsy [254], RDF databases such as OWLIM [255], WhiteDB [50], etc. There are some systems that are partially in-memory, such as MongoDB [65], MonetDB [256], MDB [257], as they use memory-mapped files to store data such that the data can be accessed as if it was in the memory.…”
Section: In-memory Nosql Databasesmentioning
confidence: 99%
“…In this section, we will introduce some representative inmemory NoSQL databases, including MemepiC [60], [138], MongoDB [65], RAMCloud [2], [75], [126], [258], [259], Redis [66] and some graph databases.…”
Section: In-memory Nosql Databasesmentioning
confidence: 99%
See 1 more Smart Citation
“…The trace is indefinitely replayed at the speed of 3.3 Mb/s. The attacker(s) generates a (D)DoS flooding attack towards the server listening on ports 69 (TFTP) and/or 80 (HTTP), by using hping3 [26] (1 pkt/1200 µs). During each experiment, we captured the traffic exchanged between the switch and the controller (control plane traffic) using tcpdump, and we observed also the reaction time of the detection process.…”
Section: B Scenario and Parametersmentioning
confidence: 99%
“…Today's multi-and many-core platforms support higher levels of workload parallelism (in mobile and server workloads) and multi-tenancy (in server workloads), placing greater demands on the memory system. Furthermore, the new generation of big data analytics applications in the enterprise and cloud are inherently memory intensive whereby workloads demand access to high-performance, yet low-cost, memory devices in preference to the much slower storage system [spa,sap,Fit04,Sal].…”
Section: Managing Tiered Memory Systems With Multi-clockmentioning
confidence: 99%