Sciweavers

1183 search results - page 197 / 237
» Risk Management with Benchmarking
Sort
View
DAWAK
2000
Springer
15 years 4 months ago
Applying Vertical Fragmentation Techniques in Logical Design of Multidimensional Databases
In the context of multidimensional databases implemented on relational DBMSs through star schemes, the most effective technique to enhance performances consists of materializing re...
Matteo Golfarelli, Dario Maio, Stefano Rizzi
SIGMOD
2010
ACM
310views Database» more  SIGMOD 2010»
15 years 4 months ago
The DataPath system: a data-centric analytic processing engine for large data warehouses
Since the 1970’s, database systems have been “compute-centric”. When a computation needs the data, it requests the data, and the data are pulled through the system. We belie...
Subi Arumugam, Alin Dobra, Christopher M. Jermaine...
ISCA
1999
IEEE
187views Hardware» more  ISCA 1999»
15 years 4 months ago
Area Efficient Architectures for Information Integrity in Cache Memories
Information integrity in cache memories is a fundamental requirement for dependable computing. Conventional architectures for enhancing cache reliability using check codes make it...
Seongwoo Kim, Arun K. Somani
MICRO
1999
IEEE
104views Hardware» more  MICRO 1999»
15 years 4 months ago
Control Independence in Trace Processors
Branch mispredictions are a major obstacle to exploiting instruction-level parallelism, at least in part because all instructions after a mispredicted branch are squashed. However...
Eric Rotenberg, James E. Smith
ICPP
1998
IEEE
15 years 4 months ago
Supporting Software Distributed Shared Memory with an Optimizing Compiler
To execute a shared memory program efficiently, we have to manage memory consistency with low overheads, and have to utilize communication bandwidth of the platform as much as pos...
Tatsushi Inagaki, Junpei Niwa, Takashi Matsumoto, ...