mapping cache

英 [ˈmæpɪŋ kæʃ] 美 [ˈmæpɪŋ kæʃ]

【计】映象高速缓存

计算机



双语例句

  1. Doing this mapping in a controlled environment gives you a good starting point in tuning your mapping cache limits.
    在受控的环境中执行此映射为您提供了优化映射缓存限制的很好起点。
  2. This article shows you how to maintain and access static data in a global cache using Java routines from ESQL or Message Broker Mapping nodes.
    本文将向您展示如何使用来自ESQL或MessageBrokerMapping节点的Java例程来维护和访问全局缓存中的静态数据。
  3. If the mapping is not in cache, ARP builds an ARP request frame for the destination hosts hardware address.
    如果这一映象在高速缓存中找不到,地址解析协议就会产生一个ARP请求帧以获取目标主机硬件地址。
  4. Examples are composite keys, legacy databases, prepared statements, complex class hierarchy mappings or Hibernate's first and second level cache.
    原因可能出现在以下几个例子中:组合关键字(CompositeKeys)、遗留数据库、PreparedStatements、复杂的类层级映射(ComplexClassHierarchyMapping)或者Hibernate的第一和第二级缓存。
  5. Finally, memory mapping, DMA data transfer interrupt handling and cache coherency issues in real-time operating system design are described in detail.
    最后,阐述了实时操作系统下内存映射、DMA数据传输、中断处理和高速缓存一致性的使用方法。
  6. Based on analyzing the traditional address mapping mechanism of TLB, this paper has put forward the regions and Cache line tag pre-validation to optimize the translation, and removed the TLB delay bottleneck in the whole memory access.
    在分析TLB传统的地址映射机制的基础上,提出了基于虚区域和Cache块标记的预验证技术,结果表明该技术优化了TLB的设计,避免了TLB访问时延成为访存的瓶颈。
  7. To address the problem of cache consistency caused by a mapping change, a mechanism to maintain strong cache consistency is proposed.
    针对映射信息发生改变时存在的缓存一致性问题,提出了一种保证映射缓存强一致性的机制。
  8. Aiming at access-driven attacks, a XOR address remapping technique is proposed, which could obfuscate the mapping relationship between cache line and memory block.
    针对基于访问驱动的攻击,提出一种基于异或的地址映射重排技术,该技术通过打乱cache行与主存储块的映射关系使得攻击不再可行。
  9. This method set up cache address mapping table, which recorded the location of TLB entry in Cache, to decrease TLB accesses with less dynamic power consumption. 2.
    该方法通过设立缓存地址映射表,记录TLB表项在缓存中的地址映射,可有效减少缓存中TLB表项的访问次数,降低动态功耗。
  10. Based on the temporal locality and the mapping request frequency distribution present in the mapping referencing behavior, three metrics are proposed to measure the performance of different replacement policies, including hit rate, communication interruption probability and cache eviction.
    根据映射缓存在时间局部性和请求频率分布方面的特征,提出命中率、通信中断概率和缓存移出三个性能指标来评估不同的缓存替换策略。
  11. Finally, a reasonable value of timeout for the cache mapping timer is obtained though simulation. Besides, the test environment based on the prototype system is built, and the data packet loss problems caused by the outdated mapping cache entries under three different situations are analyzed.
    最后,利用仿真实验得出了合理的缓存映射定时器的缓存时间,并在原型系统上搭建了相关的测试环境。
  12. An efficient defense approach based on double-threshold scheme is proposed to prevent the potential DoS attack against mapping cache.
    提出了一种基于双门限机制的映射缓存DoS攻击防御方法。
  13. Thirdly, the functions of cache mapping entry timer method on access router are implemented by the programming of new data structure definition and function operation of cache mapping table.
    其次,通过引入新的缓存映射表的数据结构定义和函数操作,完成了缓存映射条目定时器方案在接入路由器上的功能实现。