Sciweavers

4155 search results - page 627 / 831
» External Memory Algorithms
Sort
View
99
Voted
RT
1999
Springer
15 years 5 months ago
Face Cluster Radiosity
Abstract. An algorithm for simulating diffuse interreflection in complex three dimensional scenes is described. It combines techniques from hierarchical radiosity and multiresolut...
Andrew J. Willmott, Paul S. Heckbert, Michael Garl...
ISCA
1994
IEEE
129views Hardware» more  ISCA 1994»
15 years 4 months ago
Impact of Sharing-Based Thread Placement on Multithreaded Architectures
Multithreaded architectures context switch between instruction streams to hide memory access latency. Although this improves processor utilization, it can increase cache interfere...
Radhika Thekkath, Susan J. Eggers
120
Voted
CIKM
1994
Springer
15 years 4 months ago
TID Hash Joins
TID hash joins are a simple and memory-efficient method for processing large join queries. They are based on standard hash join algorithms but only store TID/key pairs in the hash...
Robert Marek, Erhard Rahm
102
Voted
CG
2006
Springer
15 years 4 months ago
Monte-Carlo Proof-Number Search for Computer Go
In the last decade, proof-number search and Monte-Carlo methods have successfully been applied to the combinatorial-games domain. Proof-number search is a reliable algorithm. It re...
Jahn-Takeshi Saito, Guillaume Chaslot, Jos W. H. M...
113
Voted
CIKM
2006
Springer
15 years 4 months ago
Cache-oblivious nested-loop joins
We propose to adapt the newly emerged cache-oblivious model to relational query processing. Our goal is to automatically achieve an overall performance comparable to that of fine-...
Bingsheng He, Qiong Luo