Welcome to Academia
Sign up to get access to over 50 million papers
By continuing, you agree to our Terms of Use
Continue with Email
Sign up or log in to continue.
Welcome to Academia
Sign up to continue.
Hi,
Log in to continue.
Reset password
Password reset
Check your email for your reset link.
Your link was sent to
Please hold while we log you in
Academia.eduAcademia.edu

Buffer Management

913 papers
2 followers
AI Powered
Buffer management is the process of overseeing and controlling buffer stocks in production and supply chain systems to optimize flow, reduce lead times, and minimize inventory costs. It involves strategic decision-making regarding the allocation, replenishment, and utilization of buffers to enhance operational efficiency and responsiveness to demand fluctuations.
We consider the problem of interconnecting low speed LANs over a high-speed shared-memory ATM switch. A bottleneck is formed when more than one source originate traffic to the same destination LAN. In this case, a congestion may be... more
Climate change, rapid urbanization, and population growth have intensified global water scarcity, increasing reliance on groundwater resources. One of the most effective solutions to this crisis is artificial groundwater recharge through... more
Pointer swizzling improves the performance of OODBMSs by reducing the number of table lookups. However, the object replacement incurs the unswizzling overhead. In this paper, we propose a new pointer swizzling strategy, the dynamic... more
In spite of the larger performance gain such as higher throughput and almost zero packet retransmissions compared to TCP Reno, TCP Vegas still has a few obstacles for it to be deployed in the Internet. Studies have shown unfair treatment... more
While it has been shown that TCP Vegas provides better performance compared to TCP Reno, studies have identified various issues associated with the protocol. We propose modifications to the congestion avoidance mechanism of the TCP Vegas... more
In a Main Memory Database (MMDB) the primary copy of the database resides in volatile main memory. This makes MMDB systems more vulnerable to failures compared to the traditional Disk Resident Databases (DRDB). A backup copy of the... more
Flash memory has characteristics of out-of-place update and asymmetric I/O latencies for read, write, and erase operations. Thus, the buffering policy for flash-based databases has to consider those properties to improve the overall... more
Flash memory has characteristics of out-of-place update and asymmetric I/O latencies for read, write, and erase operations. Thus, the buffering policy for flash-based databases has to consider those properties to improve the overall... more
Flash memory has characteristics of out-of-place update and asymmetric I/O latencies for read, write, and erase operations. Thus, the buffering policy for flash-based databases has to consider those properties to improve the overall... more
Flash memory has characteristics of out-of-place update and asymmetric I/O latencies for read, write, and erase operations. Thus, the buffering policy for flash-based databases has to consider those properties to improve the overall... more
Covert timing channels in real-time systems allow adversaries to not only exfiltrate application secrets but also to mount timing inference based attacks. Much effort has been put into improving real-time system predictability with the... more
Real time audio transmission over the internet has become increasingly popular in many application areas, in particular in the commercial and entertainment sectors. However, the most challenging problem of end-to-end delay over an IP... more
Complex objects to support non-standard database applications require the use of substantial computing resources because their powerful operations must be performed and maintained in an interactive environment. Since the exploitation of... more
New database applications, primarily in the areas of engineering and knowledge-based systems, refer to complex objects (e.g. representation of a CAD workpiece or a VLSI chip) while performing their tasks. Retrieval, maintenance, and... more
Support for temporal data continues to be a requirement posed by many applications. We show that a complex object data model is an appropriate means for handling temporal data. Firstly, we describe the main features of temporal databases... more
❑ Propagation delay: 24 ms❑ Avg packetization delays: 6 ms+ 6 ms (PCM)❑ Assuming 5 switches on a typical path, delay variation allowed at each switch=(100-24-6-6)/5= 12.8 ms❑ For single switch bottleneck case, End-to-end delay= 12.8+ 24=... more
Background: Sorghum is an important source of fodder in the semi-arid areas of Kenya. However, its biomass yield has remained low due to the low soil moisture content which is associated with low rainfall. Objective: To evaluate the... more
The objective of extensible DBMSs is to ease the construction of specialized DBMSs for nontraditional applications. Although much work has been done in providing various levels of extensibility (e.g., extensibility of data types and... more
In this paper, we propose a novel external-memory algorithm to support view-dependent simplification for datasets much larger than main memory. In the preprocessing phase, we use a new spanned sub-meshes simplification technique to build... more
The performance of the proposed algorithm, FSAMAC, is compared with the TDFQ scheme. The simulation results are presented in the following section 6.5 EXPERIMENTAL RESULTS 6.5.1 Based on No. Of Flows In the experiment the numbers of flows... more
Effective buffering of optical packets is essential to the efficient working of optical packet switches. In this paper three new schemes, which involve sorting and finding the least occupied buffer, are proposed. Their performance is... more
En 3G UMTS, deux canaux principaux de transport ont été crées pour la transmission de données sur le lien descendant : un canal commun FACH et un canal dédié DCH. Le performance de TCP en UMTS dépend beaucoup de la politique de... more
 This report provides a tool to support environmental assessment and risk screening activities for rural water supplies in low-income and fragile contexts.  It was developed by ODI, with support from Tearfund, for the Sustainable WASH... more
The media streaming technology is very appropriate for client applications running on mobile telephones due to its limited memory and bandwidth. A serious problem that has not been fully solved is the control of temporary client... more
We provide a competitive analysis framework for online prefetching and buffer management algorithms in parallel I/O systems, using a read-once model of block references. This has widespread applicability to key I/O-bound applications such... more
Buffer management for a D-disk parallel I/O system is considered in the context of randomized placement of data on the disks. A simple prefetching and caching algorithm PHASE-LRU using bounded lookahead is described and analyzed. It is... more
We address the problem of prefetching and caching in a parallel I/O system and present a new algorithm for parallel disk scheduling. Traditional buffer management algorithms that minimize the number of block misses are substantially... more
The media streaming technology is very appropriate for client applications running on mobile telephones due to its limited memory and bandwidth. A serious problem that has not been fully solved is the control of temporary client... more
This paper reports the design and implementation of Platypus, a transactional object store. The twin goals of flexibility and performance dominate the design of Platypus. The design includes: support for SMP concurrency; standalone,... more
Data exchange within a Bluetooth piconet is masterdriven. The channel/slot utilization thus depends on the efficiency of the scheduling algorithm adopted by the master. In this paper, a novel MAC layer scheduling algorithm, called... more
We study the issues of adaptive multicast wormhole routing in 2D mesh multicomputers. Three adaptive multicast wormhole routing strategies ;Lre proposed and studied~ which include miaitaal partial adaptive, minima] fuity adaptive anti... more
A critical component of subscriber management in a DOCSIS-based cable access network is the buffer management strategy that is in operation at the upstream service flow queue located in the cable modem. The strategy must contend with... more
This work introduces two novel buffer management policies for inter-active VoD systems: Unique Buffer (UB) and Precise Buffer (PB). The former uses a buffer which is shared by all clients playing a same single object, and the latter is... more
One of the challenges in the interconnection of LAN's and MAN's to ATM is the support of connectionless traffic in the ATM network. A commonly proposed strategy consists of maintaining a "thin" (i.e., low bandwidth) VP (virtual path)... more
In recent years, there has been a lot of interest in Quality of Service (QoS) networks. In regular IP networks, packets are indistinguishable and in case of overload any packet may be dropped. In a commercial environment, it is much more... more
An objective of the next. generation network is the accommodation of services wit,h different QoS requirements. This indicates that the network should provide special mechanisms in order to prioritize the access to network node resources,... more
Many works have studied the performance of TCP by modeling the network as a single bottleneck node. We present a more general model taking into account all the nodes on the path not only the main bottleneck. We show that, in addition to... more
Acknowledgement (ACK) filtering has been proposed as a technique to alleviate the congestion at the input of a slow channel located on the reverse path of a TCP connection. Old ACKs waiting at the input of the slow channel are erased when... more
Several objectives have been identified in developing the random early drop (RED): decreasing queueing delay, increasing throughput, and increasing fairness between short and long lived connections. It has been believed that indeed the... more
Access to the Internet is a crucial enabler for many of the Sustainable Development Goals (SDGs) of the United Nations. Unfortunately, a significant part of the world's population is left behind due to the lack of access to a reliable and... more
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY
In this paper a special kind of buffer management policy is studied where the packet are preempted even when sufficient space is available in the buffer for incoming packets. This is done to congestion for future incoming packets to... more
A stable heap is storage that is managed automatically using garbage collection, manipulated using atomic transactions, and accessed using a uniform storage model. These featnres enhance reliability and simplify programming by preventing... more
Effective buffer management is crucial for efficient inmemory and streaming XQuery processing. We propose a buffer management scheme which combines static and dynamic analysis to keep main memory consumption low. Our approach relies on a... more