29
Views
1
CrossRef citations to date
0
Altmetric
Articles

Effect of number of processor on the cache hit rate in symmetric multiprocessor environment

, &

References

  • Goodman, J., Woest, P., ”The Wisconsin Multicube: A New Large-scale Cache-Coherent Multiprocessor”, Proceedings of the 15th ISCA, 1988, pp. 422-431.
  • Dhaka, V. S., Ramesh C. Poonia, and Linesh Raja. “The Realistic Mobility Evaluation of Vehicular Ad-Hoc Network for Indian Automotive Networks” International Journal of Ad hoc, Sensor & Ubiquitous Computing 5.2 (2014): 1. doi: 10.5121/ijasuc.2014.5201
  • Stenstrom P., ”A Survey of Cache Coherence Schemes for Multiprocessors“, IEEE Computer, Vo1.23, No.6, June 1990, pp. 12-24.
  • Katz R., Eggers S., Wood D., Perkins C., Sheldon R., “Implementing a Cache Consistency Protocol“, Proceedings of 12th ISCA, 1985, pp.276–283.
  • Papamarcos, M., Patel J., ”A Low-Overhead Coherence Solution for Multi-processors with Private Cache Memories“, Proceedings of the 11th ISCA, 1984, pp. 348-354.
  • Goodman, J., ”Using Cache Memory To Reduce Processor-Memory Traffic“, Proceedings of the 10th ISCA, 1983, pp. 124-131.
  • Priyadarsini, P. L. K. “A survey on some applications of graph theory in cryptography.” Journal of Discrete Mathematical Sciences and Cryptography 18.3 (2015): 209-217. doi: 10.1080/09720529.2013.878819
  • Dhaka, V. S., R. C. Poonia, and L. Raja. “A literature review on dedicated short range communication for intelligent transport” International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) 3.9 (2013): 1066-1071.
  • Thacker, C., Stewart, L., Satterthwaite, E.”Firefly: A Multiprocessor Workstation“, IEEE Micro, February 1988, pp. 57-69.
  • Archibald, J., “A Cache Coherence Approach for Large Multiprocessor System”, Proceedings of supercomputing Conference, 1988, pp. 337–345.
  • Singh, V., et al. “Source Redundancy Management and Host Intrusion Detection in Wireless Sensor Networks“ Recent Patents on Computer Science 12.1 (2019).
  • Nitaj, Abderrahmane, and Emmanuel Fouotsa. “A new attack on RSA and Demytko’s elliptic curve cryptosystem.” Journal of Discrete Mathematical Sciences and Cryptography 22.3 (2019): 391-409. doi: 10.1080/09720529.2019.1587827
  • Gupta, Shaurya, et al. “Tier Application in Multi-Cloud Databases to Improve Security and Service Availability“ Handbook of Research on Cloud Computing and Big Data Applications in IoT. IGI Global, 2019. 82-93
  • M. Tomasevic and V. Milutinovic, “A simulation study of snoopy cache coherence protocols,” Proceedings of the Twenty-Fifth Hawaii International Conference on System Sciences, Kauai, HI, USA, 1992, pp. 427-436 vol.1.
  • William Stallings, Computer Organization and Architecture Designing for Performance Eighth Edition. Pearson Prentic Publication, 2010

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.