Sciweavers

2703 search results - page 348 / 541
» Optimizing memory transactions
Sort
View
DAWAK
2006
Springer
15 years 7 months ago
A Greedy Approach to Concurrent Processing of Frequent Itemset Queries
We consider the problem of concurrent execution of multiple frequent itemset queries. If such data mining queries operate on overlapping parts of the database, then their overall I...
Pawel Boinski, Marek Wojciechowski, Maciej Zakrzew...
ASPLOS
1991
ACM
15 years 7 months ago
Code Generation for Streaming: An Access/Execute Mechanism
Access/execute architectures have several advantages over more traditional architectures. Because address generation and memory access are decoupled from operand use, memory laten...
Manuel E. Benitez, Jack W. Davidson
ECOOP
2008
Springer
15 years 5 months ago
Computing Stack Maps with Interfaces
Abstract. Lightweight bytecode verification uses stack maps to annotate Java bytecode programs with type information in order to reduce the verification to type checking. This pape...
Frédéric Besson, Thomas P. Jensen, T...
GECCO
2008
Springer
155views Optimization» more  GECCO 2008»
15 years 4 months ago
Towards memoryless model building
Probabilistic model building methods can render difficult problems feasible by identifying and exploiting dependencies. They build a probabilistic model from the statistical prope...
David Iclanzan, Dumitru Dumitrescu
150
Voted
SIGOPS
2008
174views more  SIGOPS 2008»
15 years 3 months ago
LAST: locality-aware sector translation for NAND flash memory-based storage systems
As flash memory technologies quickly improve, flashmemory-based storage devices are becoming a viable alternative as a secondary storage solution for general-purpose computing sys...
Sungjin Lee, Dongkun Shin, Young-Jin Kim, Jihong K...