Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • ...itten as an [[Inequality (mathematics)|inequality]] relating the number of servers (''s''), total number of service requestors (''N''), service time (''r''), ...d queuing formulas, it is simple enough to compute the necessary number of servers without involving [[probability]] or [[queueing theory]]. The [[rule of thu ...
    6 KB (917 words) - 10:11, 20 December 2024
  • ...ve a [[probability distribution|general distribution]] and there are ''k'' servers. The model name is written in [[Kendall's notation]], and is an extension o .../ref> This new approach is yet accurate enough in cases of large number of servers and when the distribution of service time has a [[Coefficient of variation] ...
    12 KB (1,546 words) - 22:56, 19 February 2025
  • ...ogies. They do not contain obsolete systems (such as inactive or underused servers), and take advantage of newer, more efficient technologies. The use of [[supercomputer|high-performance computing]] techniques has increased, trading energy consumption for increased perfor ...
    16 KB (2,176 words) - 23:51, 3 November 2024
  • ...rvice time. It is a limit of the [[M/M/c queue]] model where the number of servers ''c'' becomes very large. ...ds to the number of customers currently being served. Since, the number of servers in parallel is infinite, there is no queue and the number of customers in t ...
    7 KB (1,018 words) - 03:08, 2 October 2024
  • ...hlia Malkhi]] and Doug Terry. Concise Version Vectors in WinFS.Distributed Computing, Vol. 20, 2007.</ref> allow significant space savings when handling multipl ...ero. Bounded Version Vectors. DISC: International Symposium on Distributed Computing, LNCS, 2004.</ref> allow a bounded implementation, with bounded size counte ...
    5 KB (731 words) - 23:21, 9 May 2023
  • ...[[data center]] uses energy; specifically, how much energy is used by the computing equipment (in contrast [[computer cooling|to cooling]] and other overhead t ...inline|date=February 2024}} to the [[Electric energy|energy]] delivered to computing equipment. PUE is the [[multiplicative inverse|inverse]] of [[data center i ...
    14 KB (2,091 words) - 07:46, 9 December 2024
  • ...performance analysis of [[parallel computing|parallel]] and [[distributed computing|distributed systems]]."<ref>{{cite tech report | first=Onno | last=Boxma |a ..., a job is split into ''N'' sub-jobs which are served by each of the ''N'' servers. After service, sub-job wait until all other sub-jobs have also been proces ...
    16 KB (2,166 words) - 12:40, 12 August 2024
  • ...es-vulnerable/ |title=Logjam security flaw leaves top HTTPS websites, mail servers vulnerable |author=Charlie Osborne |work=[[ZDNet]] |date=2015-05-20 |access ...uld break two-thirds of [[VPN]]s and a quarter of all [[Secure Shell|SSH]] servers globally. The researchers noted that this attack fits claims in leaked NSA ...
    12 KB (1,625 words) - 17:17, 5 July 2024
  • ...1 = Borst | first1 = S. C. | title = Polling systems with multiple coupled servers | doi = 10.1007/BF01245325 | journal = [[Queueing Systems]]| volume = 20 | ...62058.62059 | title = Queuing analysis of polling models | journal = [[ACM Computing Surveys]]| volume = 20 | pages = 5–28 | year = 1988 }}</ref> ...
    10 KB (1,377 words) - 11:03, 19 November 2023
  • == ANM web servers == ...for performing ANM calculations, the main strengths of which are the rapid computing ability and the user-friendly graphical capabilities for analyzing and inte ...
    12 KB (1,993 words) - 23:12, 15 March 2024
  • ...ulations, efficient hashing schemes, randomized load balancing of tasks on servers, and routing of packets within parallel networks and data centers.<ref name ...n Hash Code Searching | date=1981 | journal=Journal of the Association for Computing Machinery | pages=289–304 | volume=28 | issue=2 | doi=10.1145/322248.322254 ...
    13 KB (2,033 words) - 08:04, 31 May 2024
  • ...nline media)|online impression]] metrics measured by first [[Ad serving|ad servers]] developed in the mid-1990s, which analyze HTTP requests in a server log a With the development of the first ad servers in 1995–1996, the assumption was that a requested ad was always available t ...
    18 KB (2,711 words) - 23:30, 28 February 2025
  • ...|series=SIGCOMM '09 |location=New York, NY, USA |publisher=Association for Computing Machinery |pages=315–326 |doi=10.1145/1592568.1592605 |isbn=978-1-60558-594 ** Automatically routing game packets through different servers so as to minimize the total latency between players who are actively intera ...
    19 KB (2,693 words) - 12:59, 5 October 2024
  • ...pids (microprocessor)|Sapphire Rapids]] [[microarchitecture]] for [[Xeon]] servers, released in January 2023.<ref>{{Cite web|url=https://www.heise.de/news/Int [[Category:SIMD computing]] ...
    8 KB (1,154 words) - 01:14, 17 December 2024
  • ...2=Larry |title=Proceedings of the tenth annual ACM symposium on Theory of computing - STOC '78 |chapter=Exact and approximate membership testers |date=1978 |ch [[Cuckoo filter]]s are based on [[cuckoo hashing]], but only [[Fingerprint (computing)|fingerprints]] of the elements are stored in the hash table. Each element ...
    11 KB (1,710 words) - 16:12, 8 October 2024
  • ...d computing)|elastic]] resources – such as physical [[w:Server (computing)|servers]], applications and any services that are [[w:Virtualization|virtualized]] ...there are many implementations of distributed file systems. The first file servers were developed by researchers in the 1970s. Sun Microsystem's [[Network Fil ...
    62 KB (8,494 words) - 09:35, 29 October 2024
  • ...4-21|language=en}}</ref> however, this comes at the cost of requiring more computing power on the client side to process infection reports.<ref>{{Cite web|url=h ...a client generates a secret key that rotates daily (<math>SK_t</math>) by computing <math>SK_t = H(SK_{t-1})</math>, where <math>H()</math> is a cryptographic ...
    23 KB (3,262 words) - 08:15, 8 January 2025
  • ...ther than just an exponent, however, significantly reduces the [[Overhead (computing)|overhead]] of padding. For example, padding to the next power of two can ...techniques before decryption. A secondary disadvantage is the [[Overhead (computing)|overhead]] that padding adds, although the padding scheme proposed for PUR ...
    11 KB (1,645 words) - 08:12, 4 January 2023
  • ...that use computer systems heavily such as Internet service providers using servers or companies with many employees using computers and other computational de ...sult in energy savings for Internet companies operating with many computer servers.<ref name="Low-cost Estimation of Sub-system Power"/> The following section ...
    46 KB (6,919 words) - 00:36, 25 January 2024
  • ...re and more popular as a result of the present spike in demand for [[cloud computing]] and storage services. This has inspired researchers in the fields of [[In ...oking at the information contained in at most 4 other [[Server (computing)|servers]]. ...
    16 KB (2,494 words) - 06:28, 6 January 2025
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)