Sciweavers

4155 search results - page 624 / 831
» External Memory Algorithms
Sort
View
90
Voted
WDAG
2005
Springer
67views Algorithms» more  WDAG 2005»
15 years 6 months ago
What Can Be Implemented Anonymously?
Abstract. The vast majority of papers on distributed computing assume that processes are assigned unique identifiers before computation begins. But is this assumption necessary? W...
Rachid Guerraoui, Eric Ruppert
100
Voted
WIA
2005
Springer
15 years 6 months ago
Compressing XML Documents Using Recursive Finite State Automata
Abstract. We propose a scheme for automatically generating compressors for XML documents from Document Type Definition(DTD) specifications. Our algorithm is a lossless adaptive a...
Hariharan Subramanian, Priti Shankar
98
Voted
CDB
2004
Springer
143views Database» more  CDB 2004»
15 years 6 months ago
Constraint Processing Techniques for Improving Join Computation: A Proof of Concept
Constraint Processing and Database techniques overlap significantly. We discuss here the application of a constraint satisfaction technique, called dynamic bundling, to databases....
Anagh Lal, Berthe Y. Choueiry
80
Voted
IPPS
2003
IEEE
15 years 6 months ago
Partitioning with Space-Filling Curves on the Cubed-Sphere
Numerical methods for solving the systems of partial differential equations arising in geophysical fluid dynamics rely on a variety of spatial discretization schemes (e.g. finit...
John M. Dennis
116
Voted
DAC
2003
ACM
15 years 6 months ago
Improved indexing for cache miss reduction in embedded systems
The increasing use of microprocessor cores in embedded systems as well as mobile and portable devices creates an opportunity for customizing the cache subsystem for improved perfo...
Tony Givargis