Low latency RDMA-based distributed storage

A Shamis, Y Suzue, KM Risvik - US Patent 10,375,167, 2019 - Google Patents
Abstract A “Distributed Storage Controller” applies an RDMA-based memory allocator to
implement a distributed thread-safe and lock-free storage system in shared memory …

A fork () in the road

A Baumann, J Appavoo, O Krieger… - Proceedings of the …, 2019 - dl.acm.org
The received wisdom suggests that Unix's unusual combination of fork () and exec () for
process creation was an inspired design. In this paper, we argue that fork was a clever hack …

Automated framework for classification and selection of software design patterns

S Hussain, J Keung, MK Sohail, AA Khan, M Ilahi - Applied Soft Computing, 2019 - Elsevier
Abstract Though, Unified Modeling Language (UML), Ontology, and Text categorization
approaches have been used to automate the classification and selection of design pattern …

[图书][B] Datenbanken. Implementierungstechniken

G Saake, KU Sattler, A Heuer - 2019 - books.google.com
Architekturprinzipien und Datenstrukturen moderner Datenbanksysteme Algorithmen und
optimierte Anfragen für Datenbankoperationen Transaktionsmodelle sowie …

An analytical model for performance and lifetime estimation of hybrid DRAM-NVM main memories

R Salkhordeh, O Mutlu, H Asadi - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Emerging Non-Volatile Memories (NVMs) have promising advantages (eg, lower idle power,
higher density, and non-volatility) over the existing predominant main memory technology …

Solving the tree-structured task allocation problem via group multirole assignment

D Liu, B Huang, H Zhu - IEEE Transactions on Automation …, 2019 - ieeexplore.ieee.org
Task allocation is a critical phase of project management. Tree-type structures are frequently
used constraints to obtain a pertinent task allocation. They can illustrate where one task may …

Standardization of file recovery classification and authentication

E Casey, A Nelson, J Hyde - Digital Investigation, 2019 - Elsevier
Digital forensics can no longer tolerate software that cannot be relied upon to perform
specific functions such as file recovery. Indistinct and non-standardized results increase the …

Linux security: A survey

MR Yaswinski, MM Chowdhury… - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
Linux is used in a large variety of situations, from private homes on personal machines to
businesses storing personal data on servers. This operating system is often seen as more …

Delay-optimal scheduling of VMs in a queueing cloud computing system with heterogeneous workloads

M Guo, Q Guan, W Chen, F Ji… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
This paper studies virtual machine (VM) scheduling in a queueing cloud computing system
with stochastical arrivals of heterogeneous jobs by considering jobs' delay requirements …

A modified priority preemptive algorithm for CPU scheduling

K Chandiramani, R Verma, M Sivagami - Procedia Computer Science, 2019 - Elsevier
Priority Preemptive scheduling algorithm is a popular among various other algorithms for
scheduling CPU, however it leads to the problem of starvation which happens when …