Sciweavers

141 search results - page 29 / 29
» Application of Vulnerability Discovery Models to Major Opera...
Sort
View
ESA
1998
Springer
162views Algorithms» more  ESA 1998»
13 years 8 months ago
External Memory Algorithms
Abstract. Data sets in large applications are often too massive to t completely inside the computer's internal memory. The resulting input output communication or I O between ...
Jeffrey Scott Vitter