Sciweavers

141 search results - page 29 / 29
» Application of Vulnerability Discovery Models to Major Opera...
Sort
View
ESA
1998
Springer
162views Algorithms» more  ESA 1998»
13 years 10 months ago
External Memory Algorithms
Abstract. Data sets in large applications are often too massive to t completely inside the computer's internal memory. The resulting input output communication or I O between ...
Jeffrey Scott Vitter