This paper proposes the use of repetitive broadcast as a way of augmenting the memory hierarchy of clients in an asymmetric communication environment. We describe a new technique called \Broadcast Disks" for structuring the broadcast in a way that provides improved performance for non-uniformly accessed data. The Broadcast Disk superimposes multiple disks spinning at di erent speeds on a single broadcast channel | in e ect creating an arbitrarily ne-grained memory hierarchy. In addition to proposing and de ning the mechanism, a main result of this work is that exploiting the potential of the broadcast structure requires a re-evaluation of basic cache management policies. We examine several \pure" cache management policies and develop and measure implementable approximations to these policies. These results and others are presented in a set of simulation studies that substantiates the basic idea and develops some of the intuitions required to design a particular broadcast program.
Currently, a variety of information retrieval systems are available to potential users. These services are provided by commercial enterprises (such as Dow Jones [6] and The Source [7]), while others are research efforts (the Boston Community Information System [S]). While in many cases these systems are accessed from personal computers, typically no advantage is taken of the computing resources of those machines (such as local processing and storage). In this paper we explore the possibility of using the user's local storage capabilities to cache data at the user's site. This would improve the response time of user queries albeit at the cost of incurring the overhead required in maintaining multiple copies. In order to reduce this overhead it may be appropriate to allow copies to diverge in a controlled fashion. This would not only make caching less costly, but would also make it possible to propagate updates to the copies more efficiently, for example, when the system is lightly loaded, when communication tariffs are lower, or by batching updates together. Just as importantly, it also makes it possible to access the copies even when the communication lines or the central site are down. Thus, we introduce the notion of quasi-copies, which embodies the ideas sketched above. We also define the types of deviations that seem useful, and discuss the available implementation strategies.
Mobile computers and wireless networks are emerging technologies that will soon be available to a wide variety of computer users. Unlike earlier generations of laptop computers, the new generation of mobile computers can be an integrated part of a distributed computing environment, one in which users change physical location frequently. The result is a new computing paradigm,
nomadic computing
. This paradigm will affect the design of much of our current systems software, including that of database systems.
This paper discusses in some detail the impact of nomadic computing on a number of traditional database system concepts. In particular, we point out how the reliance on short-lived batteries changes the cost assumptions underlying query processing. In these systems, power consumption competes with resource utilization in the definition of cost metrics. We also discuss how the likelihood of temporary disconnection forces consideration of alternative transaction processing protocols. The limited screen space of mobile computers along with the advent of pen-based computing provides new opportunities and new constraints on database interfaces and languages. Lastly, we believe that the movement of computers and data among networks potentially belonging to distinct, autonomous organizations creates serious security problems.
The aim of this work was to describe the prevalence of type-specific Human papillomavirus (HPV) infection in women attending organized cervical cancer screening program in Uruguay. Nine hundred sixty-five liquid cervical cell samples obtained after collection of cervical smears for cytology were assessed for HPV DNA using the Papillocheck system (Greiner BioOne). The overall prevalence of High-Risk (HR) HPV infections was 20.8% and increased from 16.5% in women with normal cytology to 93.3% in HSIL. Prevalence of HPV 16 and/or 18 was 6.3% and HPV 16 was the most prevalent genotype in normal cytology (3.6%). The five most prevalent genotypes were HPV 16, 31, 51, 56, and 39. The overall prevalence peaked below age 30. This study provides essential baseline information at national level on type-specific HPV prevalence in Uruguay before the introduction of HPV vaccination. It documents the current prevalence of each of the oncogenic genotypes in a population attending cervical cancer screening program, suggesting that at least 64.7% of high risk lesions are potentially preventable by available HPV vaccines, and possibly augmentable if cross-protection against non-vaccine HPV types 31, 33, and 45 is confirmed.
Locating a target among distractors improves when the configuration of distractors consistently cues the target’s location across search trials, an effect called contextual cuing of visual search (CC). The important issue of whether CC is automatic has previously been studied by asking whether it can occur implicitly (outside awareness). Here we ask the novel question: is CC of visual search controllable? In 3 experiments participants were exposed to a standard CC procedure during Phase 1. In Phase 2, they localized a new target, embedded in configurations (including the previous target) repeated from Phase 1. Despite robust contextual cuing, congruency effects – which would imply the orientation of attention towards the old target in repeated configurations – were found in none of the experiments. The results suggest that top-down control can be exerted over contextually-guided visual search.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.