Sciweavers

223 search results - page 1 / 45
» A Performance Evaluation of OID Mapping Techniques
Sort
View
VLDB
1995
ACM
66views Database» more  VLDB 1995»
13 years 7 months ago
A Performance Evaluation of OID Mapping Techniques
In this paper, three techniques to implement logical OIDs are thoroughly evaluated: hashing, B-trees and a technique called direct mapping. Among these three techniques, direct ma...
André Eickler, Carsten Andreas Gerlhof, Don...
ICDE
1993
IEEE
120views Database» more  ICDE 1993»
13 years 7 months ago
Adaptable Pointer Swizzling Strategies in Object Bases
In this article, different techniques for 'pointer swizzling" are classified and evaluated for optimizing the access to main-memory resident persistent objects. To speed ...
Alfons Kemper, Donald Kossmann
HPCC
2011
Springer
12 years 3 months ago
Heuristic-Based Techniques for Mapping Irregular Communication Graphs to Mesh Topologies
— Mapping of parallel applications on the network topology is becoming increasingly important on large supercomputers. Topology aware mapping can reduce the hops traveled by mess...
Abhinav Bhatele, Laxmikant V. Kalé
ICSE
2008
IEEE-ACM
14 years 4 months ago
A case study evaluation of maintainability and performance of persistency techniques
Efforts for software evolution supersede any other part of the software life cycle. Technological decisions have a major impact on the maintainability, but are not well reflected ...
Thomas Goldschmidt, Ralf Reussner, Jochen Winzen
AND
2009
13 years 1 months ago
A comprehensive evaluation methodology for noisy historical document recognition techniques
In this paper, we propose a new comprehensive methodology in order to evaluate the performance of noisy historical document recognition techniques. We aim to evaluate not only the...
Nikolaos Stamatopoulos, Georgios Louloudis, Basili...