SlideShare a Scribd company logo
1 of 39
Download to read offline
Access
Strategies for
Network
Caching
Introduction
Model
Algorithms
Evaluation
Conclusion
Access Strategies for Network Caching
Itamar Cohen∗, Gil Einziger∗, Roy Friedman+
and Gabriel Scalosub∗
∗Ben-Gurion University of the Negev, Israel
+Tehcnion, Israel
Infocom 2019
Access
Strategies for
Network
Caching
Introduction
Model
Algorithms
Evaluation
Conclusion
Network caching
Source: Computer Networking: A Top-Down Approach, Kurose & Ross
Access
Strategies for
Network
Caching
Introduction
Model
Algorithms
Evaluation
Conclusion
Network caching
Source: Computer Networking: A Top-Down Approach, Kurose & Ross
Access
Strategies for
Network
Caching
Introduction
Model
Algorithms
Evaluation
Conclusion
Network caching
Source: Computer Networking: A Top-Down Approach, Kurose & Ross
Access
Strategies for
Network
Caching
Introduction
Model
Algorithms
Evaluation
Conclusion
Network caching
Source: Computer Networking: A Top-Down Approach, Kurose & Ross
Which data stores should a user access?
Access
Strategies for
Network
Caching
Introduction
Model
Algorithms
Evaluation
Conclusion
The Data Store Selection (DSS) Problem
Access
Strategies for
Network
Caching
Introduction
Model
Algorithms
Evaluation
Conclusion
Previous Work
Applications of network caching
5G networks [WCTKL’14]
Content delivery networks [BSHB’17]
Wide area networks [FCAB’00]
Space efficient indicators
BF [B’70] and its variants [BM’04, TRL’12]
Tiny table [EF’16]
Access
Strategies for
Network
Caching
Introduction
Model
Algorithms
Evaluation
Conclusion
Previous Work
Applications of network caching
5G networks [WCTKL’14]
Content delivery networks [BSHB’17]
Wide area networks [FCAB’00]
Space efficient indicators
BF [B’70] and its variants [BM’04, TRL’12]
Tiny table [EF’16]
Access strategies
Access cheapest datastore with positive indication
[TRL’12]
Access all datastores with positive indications [FCAB’00]
The Bloom paradox [RK’15]
Access
Strategies for
Network
Caching
Introduction
Model
Algorithms
Evaluation
Conclusion
Previous Work
Applications of network caching
5G networks [WCTKL’14]
Content delivery networks [BSHB’17]
Wide area networks [FCAB’00]
Space efficient indicators
BF [B’70] and its variants [BM’04, TRL’12]
Tiny table [EF’16]
Access strategies
Access cheapest datastore with positive indication
[TRL’12]
Access all datastores with positive indications [FCAB’00]
The Bloom paradox [RK’15]
Access
Strategies for
Network
Caching
Introduction
Model
Algorithms
Evaluation
Conclusion
Our Contribution
Formal model for the Data Store Selection problem
Polynomial-time approximation algorithms
Evaluation based on real traces
Access
Strategies for
Network
Caching
Introduction
Model
Algorithms
Evaluation
Conclusion
Our Contribution
Formal model for the Data Store Selection problem
Polynomial-time approximation algorithms
Evaluation based on real traces
Access
Strategies for
Network
Caching
Introduction
Model
Algorithms
Evaluation
Conclusion
Our Contribution
Formal model for the Data Store Selection problem
Polynomial-time approximation algorithms
Evaluation based on real traces
Access
Strategies for
Network
Caching
Introduction
Model
Algorithms
Evaluation
Conclusion
Model
Datastore 1 Datastore 2 Datastore n
C1 C2
. . . Cn
ρ1 ρ2 ρn
β
ρj: probability that x is not in datastore j,
in spite of a positive indication
Access
Strategies for
Network
Caching
Introduction
Model
Algorithms
Evaluation
Conclusion
Model
Datastore 1 Datastore 2 Datastore n
C1 C2
. . . Cn
ρ1 ρ2 ρn
β
ρj: probability that x is not in datastore j,
in spite of a positive indication
Objective: find a subset of datastores D minimizing
The (expected) miss cost, β j∈D ρj , plus ...
Access
Strategies for
Network
Caching
Introduction
Model
Algorithms
Evaluation
Conclusion
Model
Datastore 1 Datastore 2 Datastore n
C1 C2
. . . Cn
ρ1 ρ2 ρn
β
ρj: probability that x is not in datastore j,
in spite of a positive indication
Objective: find a subset of datastores D minimizing
The (expected) miss cost, β j∈D ρj , plus ...
the access cost, j∈D Cj
Access
Strategies for
Network
Caching
Introduction
Model
Algorithms
Evaluation
Conclusion
Model
Datastore 1 Datastore 2 Datastore n
C1 C2
. . . Cn
ρ1 ρ2 ρn
β
ρj: probability that x is not in datastore j,
in spite of a positive indication
The Data Store Selection (DSS) problem:
Find a subset of datastores D which minimizes
φ(D) = β
j∈D
ρj +
j∈D
Cj
Access
Strategies for
Network
Caching
Introduction
Model
Algorithms
Evaluation
Conclusion
Our Algorithmic Approach
The Data Store Selection (DSS) problem:
Find a subset of datastores D which minimizes
φ(D) = β
j∈D
ρj +
j∈D
Cj
Access
Strategies for
Network
Caching
Introduction
Model
Algorithms
Evaluation
Conclusion
Our Algorithmic Approach
Assume we know an upper bound on the total access cost
(budget) B
The Data Store Selection (DSS) problem:
Find a subset of datastores D which minimizes
φ(D) = β
j∈D
ρj +
j∈D
Cj
Access
Strategies for
Network
Caching
Introduction
Model
Algorithms
Evaluation
Conclusion
Our Algorithmic Approach
Assume we know an upper bound on the total access cost
(budget) B
The Data Store Selection (DSS) problem:
Find a subset of datastores D which minimizes
β
j∈D
ρj s.t.
j∈D
Cj ≤ B
Access
Strategies for
Network
Caching
Introduction
Model
Algorithms
Evaluation
Conclusion
Our Algorithmic Approach
Assume we know an upper bound on the total access cost
(budget) B
The Data Store Selection (DSS) problem:
Find a subset of datastores D which minimizes
j∈D
ρj s.t.
j∈D
Cj ≤ B
Access
Strategies for
Network
Caching
Introduction
Model
Algorithms
Evaluation
Conclusion
Our Algorithmic Approach
Assume we know an upper bound on the total access cost
(budget) B
Multiplicative optimization → additive optimization
The Data Store Selection (DSS) problem:
Find a subset of datastores D which minimizes
j∈D
log(ρj) s.t.
j∈D
Cj ≤ B
Access
Strategies for
Network
Caching
Introduction
Model
Algorithms
Evaluation
Conclusion
Our Algorithmic Approach
Assume we know an upper bound on the total access cost
(budget) B
Multiplicative optimization → additive optimization
The Data Store Selection (DSS) problem:
Find a subset of datastores D which maximizes
j∈D
− log(ρj) s.t.
j∈D
Cj ≤ B
Access
Strategies for
Network
Caching
Introduction
Model
Algorithms
Evaluation
Conclusion
Our Algorithmic Approach
Assume we know an upper bound on the total access cost
(budget) B
Multiplicative optimization → additive optimization
This is effectively a Knapsack problem
The Data Store Selection (DSS) problem:
Find a subset of datastores D which maximizes
j∈D
− log(ρj) s.t.
j∈D
Cj ≤ B
Access
Strategies for
Network
Caching
Introduction
Model
Algorithms
Evaluation
Conclusion
A Naive approach for the DSS Problem
Run a Knapsack approximation algorithm for budget =
1, . . . , β
For each suggested solution, calculate φ(∗)
Take the arg min of the suggested solutions
The Data Store Selection (DSS) problem:
Find a subset of datastores D which maximizes
j∈D
− log(ρj) s.t.
j∈D
Cj ≤ B
Access
Strategies for
Network
Caching
Introduction
Model
Algorithms
Evaluation
Conclusion
A Naive approach for the DSS Problem
Run a Knapsack approximation algorithm for budget =
1, . . . , β
For each suggested solution, calculate φ(∗)
Take the arg min of the suggested solutions
This is very costly
Goal: emulate solution space efficiently
The Data Store Selection (DSS) problem:
Find a subset of datastores D which maximizes
j∈D
− log(ρj) s.t.
j∈D
Cj ≤ B
Access
Strategies for
Network
Caching
Introduction
Model
Algorithms
Evaluation
Conclusion
DSKnap: Using Knap to Solve the DSS Problem
Emulate Knapsack 2-approximation algorithm only once
for every different access cost
The Data Store Selection (DSS) problem:
Find a subset of datastores D which maximizes
j∈D
− log(ρj) s.t.
j∈D
Cj ≤ B
Access
Strategies for
Network
Caching
Introduction
Model
Algorithms
Evaluation
Conclusion
Our Approximation Algorithms
Alg Approx Run time Based on
DSKnap O
√
β O n2 log n Knap 2-approx
DSPot maxj{Cj} O (n log n) Potential func
DSPP O β 1+ O f (n, ) · min{ j Cj, β}
∗
Knap FPTAS
∗
f (n, ): The run-time of a (1 + )-approx FPTAS
Access
Strategies for
Network
Caching
Introduction
Model
Algorithms
Evaluation
Conclusion
Our Approximation Algorithms
Alg Approx Run time Based on
DSKnap O
√
β O n2 log n Knap 2-approx
DSPot maxj{Cj} O (n log n) Potential func
DSPP O β 1+ O f (n, ) · min{ j Cj, β}
∗
Knap FPTAS
∗
f (n, ): The run-time of a (1 + )-approx FPTAS
Access
Strategies for
Network
Caching
Introduction
Model
Algorithms
Evaluation
Conclusion
Evaluation Settings
Trace: accesses to Wikipedia [UPvS’09]
Access
Strategies for
Network
Caching
Introduction
Model
Algorithms
Evaluation
Conclusion
Evaluation Settings
Trace: accesses to Wikipedia [UPvS’09]
Network layout based on a real-world CDN [OVH]
19 datastores, each storing 1k URLs
False positive ratio: 2%
Access costs based on topology and bandwidth
OVH’s CDN in Europe (www.ovh.co.uk)
Access
Strategies for
Network
Caching
Introduction
Model
Algorithms
Evaluation
Conclusion
Evaluation Settings
Trace: accesses to Wikipedia [UPvS’09]
Network layout based on a real-world CDN [OVH]
19 datastores, each storing 1k URLs
False positive ratio: 2%
Access costs based on topology and bandwidth
19 users, requesting data items, all using either
Cheapest positive indication access policy
All positive indications access policy
DSKnap
Access
Strategies for
Network
Caching
Introduction
Model
Algorithms
Evaluation
Conclusion
Evaluation Settings
Trace: accesses to Wikipedia [UPvS’09]
Network layout based on a real-world CDN [OVH]
19 datastores, each storing 1k URLs
False positive ratio: 2%
Access costs based on topology and bandwidth
19 users, requesting data items, all using either
Cheapest positive indication access policy
All positive indications access policy
DSKnap
A missed item is fetched to either 1, 3, 5 datastores
Compare total access costs, normalized to Opt
equipped with a perfect indicator
Access
Strategies for
Network
Caching
Introduction
Model
Algorithms
Evaluation
Conclusion
Evaluation Results
β Policy 1 location 3 locations 5 locations
102
Cheapest 1.21 1.12 1.09
All 1.09 1.39 1.56
DSKnap 1.10 1.11 1.09
103
Cheapest 1.23 1.11 1.07
All 1.02 1.06 1.08
DSKnap 1.02 1.04 1.03
104
Cheapest 1.24 1.11 1.07
All 1.01 1.02 1.02
DSKnap 1.01 1.02 1.02
Access
Strategies for
Network
Caching
Introduction
Model
Algorithms
Evaluation
Conclusion
Evaluation Results
β Policy 1 location 3 locations 5 locations
102
Cheapest 1.21 1.12 1.09
All 1.09 1.39 1.56
DSKnap 1.10 1.11 1.09
103
Cheapest 1.23 1.11 1.07
All 1.02 1.06 1.08
DSKnap 1.02 1.04 1.03
104
Cheapest 1.24 1.11 1.07
All 1.01 1.02 1.02
DSKnap 1.01 1.02 1.02
Access
Strategies for
Network
Caching
Introduction
Model
Algorithms
Evaluation
Conclusion
Evaluation Results
β Policy 1 location 3 locations 5 locations
102
Cheapest 1.21 1.12 1.09
All 1.09 1.39 1.56
DSKnap 1.10 1.11 1.09
103
Cheapest 1.23 1.11 1.07
All 1.02 1.06 1.08
DSKnap 1.02 1.04 1.03
104
Cheapest 1.24 1.11 1.07
All 1.01 1.02 1.02
DSKnap 1.01 1.02 1.02
Access
Strategies for
Network
Caching
Introduction
Model
Algorithms
Evaluation
Conclusion
Evaluation Results
β Policy 1 location 3 locations 5 locations
102
Cheapest 1.21 1.12 1.09
All 1.09 1.39 1.56
DSKnap 1.10 1.11 1.09
103
Cheapest 1.23 1.11 1.07
All 1.02 1.06 1.08
DSKnap 1.02 1.04 1.03
104
Cheapest 1.24 1.11 1.07
All 1.01 1.02 1.02
DSKnap 1.01 1.02 1.02
Access
Strategies for
Network
Caching
Introduction
Model
Algorithms
Evaluation
Conclusion
Conclusion
Network caching is a fundamental building block in ...
5G networks
Content delivery networks
Wide area networks
Efficient access strategies are important for optimizing
performance
Existing heuristics fall short in versatile scenarios
Access
Strategies for
Network
Caching
Introduction
Model
Algorithms
Evaluation
Conclusion
Conclusion
Network caching is a fundamental building block in ...
5G networks
Content delivery networks
Wide area networks
Efficient access strategies are important for optimizing
performance
Existing heuristics fall short in versatile scenarios
Our algorithm outperforms existing heuristics across the
board
Access
Strategies for
Network
Caching
Introduction
Model
Algorithms
Evaluation
Conclusion
Conclusion
Network caching is a fundamental building block in ...
5G networks
Content delivery networks
Wide area networks
Efficient access strategies are important for optimizing
performance
Existing heuristics fall short in versatile scenarios
Our algorithm outperforms existing heuristics across the
board
Questions?
ofanan@gmail.com

More Related Content

What's hot

Partial Homomorphic Encryption
Partial Homomorphic EncryptionPartial Homomorphic Encryption
Partial Homomorphic Encryptionsecurityxploded
 
Image stegnogrpahy(muqeed)
Image stegnogrpahy(muqeed)Image stegnogrpahy(muqeed)
Image stegnogrpahy(muqeed)Muqeed Hussain
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic EncryptionVipin Tejwani
 
The Optimum Clustering Framework: Implementing the Cluster Hypothesis
The Optimum Clustering Framework: Implementing the Cluster HypothesisThe Optimum Clustering Framework: Implementing the Cluster Hypothesis
The Optimum Clustering Framework: Implementing the Cluster Hypothesisyaevents
 
Threshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random PermutationsThreshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random PermutationsAleksandr Yampolskiy
 
Private Range Query by Perturbation and Matrix Based Encryption
Private Range Query by Perturbation and Matrix Based EncryptionPrivate Range Query by Perturbation and Matrix Based Encryption
Private Range Query by Perturbation and Matrix Based EncryptionJunpei Kawamoto
 
Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...
Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...
Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...RSIS International
 
Graphlab Ted Dunning Clustering
Graphlab Ted Dunning  ClusteringGraphlab Ted Dunning  Clustering
Graphlab Ted Dunning ClusteringMapR Technologies
 
DBMask: Fine-Grained Access Control on Encrypted Relational Databases
DBMask: Fine-Grained Access Control on Encrypted Relational DatabasesDBMask: Fine-Grained Access Control on Encrypted Relational Databases
DBMask: Fine-Grained Access Control on Encrypted Relational DatabasesMateus S. H. Cruz
 
Security Attacks on RSA
Security Attacks on RSASecurity Attacks on RSA
Security Attacks on RSAPratik Poddar
 
Homomorphic encryption in_cloud
Homomorphic encryption in_cloudHomomorphic encryption in_cloud
Homomorphic encryption in_cloudShivam Singh
 
Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Stro...
Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Stro...Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Stro...
Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Stro...Mateus S. H. Cruz
 
CAMINA GROUP FOR THE MOR CRYPTOSYSTEM
CAMINA GROUP FOR THE MOR CRYPTOSYSTEMCAMINA GROUP FOR THE MOR CRYPTOSYSTEM
CAMINA GROUP FOR THE MOR CRYPTOSYSTEMEditor IJMTER
 
Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud
Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the CloudPrivacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud
Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the CloudMateus S. H. Cruz
 
Robot, Learning From Data
Robot, Learning From DataRobot, Learning From Data
Robot, Learning From DataSungjoon Choi
 
AN EFFICIENT THRESHOLD CRYPTOGRAPHY SCHEME FOR CLOUD ERP DATA
AN EFFICIENT THRESHOLD CRYPTOGRAPHY SCHEME FOR CLOUD ERP DATAAN EFFICIENT THRESHOLD CRYPTOGRAPHY SCHEME FOR CLOUD ERP DATA
AN EFFICIENT THRESHOLD CRYPTOGRAPHY SCHEME FOR CLOUD ERP DATAijcisjournal
 

What's hot (19)

Partial Homomorphic Encryption
Partial Homomorphic EncryptionPartial Homomorphic Encryption
Partial Homomorphic Encryption
 
同態加密
同態加密同態加密
同態加密
 
Image stegnogrpahy(muqeed)
Image stegnogrpahy(muqeed)Image stegnogrpahy(muqeed)
Image stegnogrpahy(muqeed)
 
SSBSE10.ppt
SSBSE10.pptSSBSE10.ppt
SSBSE10.ppt
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
 
The Optimum Clustering Framework: Implementing the Cluster Hypothesis
The Optimum Clustering Framework: Implementing the Cluster HypothesisThe Optimum Clustering Framework: Implementing the Cluster Hypothesis
The Optimum Clustering Framework: Implementing the Cluster Hypothesis
 
Threshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random PermutationsThreshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random Permutations
 
Private Range Query by Perturbation and Matrix Based Encryption
Private Range Query by Perturbation and Matrix Based EncryptionPrivate Range Query by Perturbation and Matrix Based Encryption
Private Range Query by Perturbation and Matrix Based Encryption
 
Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...
Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...
Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...
 
Graphlab Ted Dunning Clustering
Graphlab Ted Dunning  ClusteringGraphlab Ted Dunning  Clustering
Graphlab Ted Dunning Clustering
 
DBMask: Fine-Grained Access Control on Encrypted Relational Databases
DBMask: Fine-Grained Access Control on Encrypted Relational DatabasesDBMask: Fine-Grained Access Control on Encrypted Relational Databases
DBMask: Fine-Grained Access Control on Encrypted Relational Databases
 
Security Attacks on RSA
Security Attacks on RSASecurity Attacks on RSA
Security Attacks on RSA
 
Overview of CryptDB
Overview of CryptDBOverview of CryptDB
Overview of CryptDB
 
Homomorphic encryption in_cloud
Homomorphic encryption in_cloudHomomorphic encryption in_cloud
Homomorphic encryption in_cloud
 
Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Stro...
Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Stro...Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Stro...
Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Stro...
 
CAMINA GROUP FOR THE MOR CRYPTOSYSTEM
CAMINA GROUP FOR THE MOR CRYPTOSYSTEMCAMINA GROUP FOR THE MOR CRYPTOSYSTEM
CAMINA GROUP FOR THE MOR CRYPTOSYSTEM
 
Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud
Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the CloudPrivacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud
Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud
 
Robot, Learning From Data
Robot, Learning From DataRobot, Learning From Data
Robot, Learning From Data
 
AN EFFICIENT THRESHOLD CRYPTOGRAPHY SCHEME FOR CLOUD ERP DATA
AN EFFICIENT THRESHOLD CRYPTOGRAPHY SCHEME FOR CLOUD ERP DATAAN EFFICIENT THRESHOLD CRYPTOGRAPHY SCHEME FOR CLOUD ERP DATA
AN EFFICIENT THRESHOLD CRYPTOGRAPHY SCHEME FOR CLOUD ERP DATA
 

Similar to Network Caching Access Strategies

Boston Hug by Ted Dunning 2012
Boston Hug by Ted Dunning 2012Boston Hug by Ted Dunning 2012
Boston Hug by Ted Dunning 2012MapR Technologies
 
CMU Lecture on Hadoop Performance
CMU Lecture on Hadoop PerformanceCMU Lecture on Hadoop Performance
CMU Lecture on Hadoop PerformanceMapR Technologies
 
Boston hug-2012-07
Boston hug-2012-07Boston hug-2012-07
Boston hug-2012-07Ted Dunning
 
Structured Forests for Fast Edge Detection [Paper Presentation]
Structured Forests for Fast Edge Detection [Paper Presentation]Structured Forests for Fast Edge Detection [Paper Presentation]
Structured Forests for Fast Edge Detection [Paper Presentation]Mohammad Shaker
 
Applying Linear Optimization Using GLPK
Applying Linear Optimization Using GLPKApplying Linear Optimization Using GLPK
Applying Linear Optimization Using GLPKJeremy Chen
 
"Deep Learning and Vision Algorithm Development in MATLAB Targeting Embedded ...
"Deep Learning and Vision Algorithm Development in MATLAB Targeting Embedded ..."Deep Learning and Vision Algorithm Development in MATLAB Targeting Embedded ...
"Deep Learning and Vision Algorithm Development in MATLAB Targeting Embedded ...Edge AI and Vision Alliance
 
OSMC 2009 | Anomalieerkennung und Trendvorhersagen an Hand von Daten aus Nagi...
OSMC 2009 | Anomalieerkennung und Trendvorhersagen an Hand von Daten aus Nagi...OSMC 2009 | Anomalieerkennung und Trendvorhersagen an Hand von Daten aus Nagi...
OSMC 2009 | Anomalieerkennung und Trendvorhersagen an Hand von Daten aus Nagi...NETWAYS
 
Tensors Are All You Need: Faster Inference with Hummingbird
Tensors Are All You Need: Faster Inference with HummingbirdTensors Are All You Need: Faster Inference with Hummingbird
Tensors Are All You Need: Faster Inference with HummingbirdDatabricks
 
Accelerate Reed-Solomon coding for Fault-Tolerance in RAID-like system
Accelerate Reed-Solomon coding for Fault-Tolerance in RAID-like systemAccelerate Reed-Solomon coding for Fault-Tolerance in RAID-like system
Accelerate Reed-Solomon coding for Fault-Tolerance in RAID-like systemShuai Yuan
 
rasdaman: from barebone Arrays to DataCubes
rasdaman: from barebone Arrays to DataCubesrasdaman: from barebone Arrays to DataCubes
rasdaman: from barebone Arrays to DataCubesEUDAT
 
Aggregate Computing Platforms: Bridging the Gaps
Aggregate Computing Platforms: Bridging the GapsAggregate Computing Platforms: Bridging the Gaps
Aggregate Computing Platforms: Bridging the GapsRoberto Casadei
 
Learning Predictive Modeling with TSA and Kaggle
Learning Predictive Modeling with TSA and KaggleLearning Predictive Modeling with TSA and Kaggle
Learning Predictive Modeling with TSA and KaggleYvonne K. Matos
 
Cost-Efficient Rule Management and Traffic Engineering for Software Defined N...
Cost-Efficient Rule Management and Traffic Engineering for Software Defined N...Cost-Efficient Rule Management and Traffic Engineering for Software Defined N...
Cost-Efficient Rule Management and Traffic Engineering for Software Defined N...Huawei Huang
 
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting TechniqueLossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting TechniqueIRJET Journal
 
⭐⭐⭐⭐⭐ Localización en ambiente de interiores basado en Machine Learning con r...
⭐⭐⭐⭐⭐ Localización en ambiente de interiores basado en Machine Learning con r...⭐⭐⭐⭐⭐ Localización en ambiente de interiores basado en Machine Learning con r...
⭐⭐⭐⭐⭐ Localización en ambiente de interiores basado en Machine Learning con r...Victor Asanza
 
Privacy-preserving Information Sharing: Tools and Applications
Privacy-preserving Information Sharing: Tools and ApplicationsPrivacy-preserving Information Sharing: Tools and Applications
Privacy-preserving Information Sharing: Tools and ApplicationsEmiliano De Cristofaro
 

Similar to Network Caching Access Strategies (20)

New directions for mahout
New directions for mahoutNew directions for mahout
New directions for mahout
 
Boston Hug by Ted Dunning 2012
Boston Hug by Ted Dunning 2012Boston Hug by Ted Dunning 2012
Boston Hug by Ted Dunning 2012
 
CMU Lecture on Hadoop Performance
CMU Lecture on Hadoop PerformanceCMU Lecture on Hadoop Performance
CMU Lecture on Hadoop Performance
 
Boston hug-2012-07
Boston hug-2012-07Boston hug-2012-07
Boston hug-2012-07
 
Structured Forests for Fast Edge Detection [Paper Presentation]
Structured Forests for Fast Edge Detection [Paper Presentation]Structured Forests for Fast Edge Detection [Paper Presentation]
Structured Forests for Fast Edge Detection [Paper Presentation]
 
Private datawarehouse queries
Private datawarehouse queriesPrivate datawarehouse queries
Private datawarehouse queries
 
Applying Linear Optimization Using GLPK
Applying Linear Optimization Using GLPKApplying Linear Optimization Using GLPK
Applying Linear Optimization Using GLPK
 
"Deep Learning and Vision Algorithm Development in MATLAB Targeting Embedded ...
"Deep Learning and Vision Algorithm Development in MATLAB Targeting Embedded ..."Deep Learning and Vision Algorithm Development in MATLAB Targeting Embedded ...
"Deep Learning and Vision Algorithm Development in MATLAB Targeting Embedded ...
 
OSMC 2009 | Anomalieerkennung und Trendvorhersagen an Hand von Daten aus Nagi...
OSMC 2009 | Anomalieerkennung und Trendvorhersagen an Hand von Daten aus Nagi...OSMC 2009 | Anomalieerkennung und Trendvorhersagen an Hand von Daten aus Nagi...
OSMC 2009 | Anomalieerkennung und Trendvorhersagen an Hand von Daten aus Nagi...
 
Tensors Are All You Need: Faster Inference with Hummingbird
Tensors Are All You Need: Faster Inference with HummingbirdTensors Are All You Need: Faster Inference with Hummingbird
Tensors Are All You Need: Faster Inference with Hummingbird
 
Ssbse10.ppt
Ssbse10.pptSsbse10.ppt
Ssbse10.ppt
 
Accelerate Reed-Solomon coding for Fault-Tolerance in RAID-like system
Accelerate Reed-Solomon coding for Fault-Tolerance in RAID-like systemAccelerate Reed-Solomon coding for Fault-Tolerance in RAID-like system
Accelerate Reed-Solomon coding for Fault-Tolerance in RAID-like system
 
rasdaman: from barebone Arrays to DataCubes
rasdaman: from barebone Arrays to DataCubesrasdaman: from barebone Arrays to DataCubes
rasdaman: from barebone Arrays to DataCubes
 
Aggregate Computing Platforms: Bridging the Gaps
Aggregate Computing Platforms: Bridging the GapsAggregate Computing Platforms: Bridging the Gaps
Aggregate Computing Platforms: Bridging the Gaps
 
Learning Predictive Modeling with TSA and Kaggle
Learning Predictive Modeling with TSA and KaggleLearning Predictive Modeling with TSA and Kaggle
Learning Predictive Modeling with TSA and Kaggle
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
Cost-Efficient Rule Management and Traffic Engineering for Software Defined N...
Cost-Efficient Rule Management and Traffic Engineering for Software Defined N...Cost-Efficient Rule Management and Traffic Engineering for Software Defined N...
Cost-Efficient Rule Management and Traffic Engineering for Software Defined N...
 
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting TechniqueLossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
 
⭐⭐⭐⭐⭐ Localización en ambiente de interiores basado en Machine Learning con r...
⭐⭐⭐⭐⭐ Localización en ambiente de interiores basado en Machine Learning con r...⭐⭐⭐⭐⭐ Localización en ambiente de interiores basado en Machine Learning con r...
⭐⭐⭐⭐⭐ Localización en ambiente de interiores basado en Machine Learning con r...
 
Privacy-preserving Information Sharing: Tools and Applications
Privacy-preserving Information Sharing: Tools and ApplicationsPrivacy-preserving Information Sharing: Tools and Applications
Privacy-preserving Information Sharing: Tools and Applications
 

Recently uploaded

Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 

Recently uploaded (20)

Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 

Network Caching Access Strategies