Zobrazeno 1 - 10
of 6 339
pro vyhledávání: '"locality of reference"'
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Journal of Engineering and Sustainable Development, Vol 28, Iss 4 (2024)
Efficiency is a crucial factor when handling the retrieval and storage of data from vast amounts of records in a Big Data repository. These systems require a subset of data that can be accommodated within the combined physical memory of a cluster of
Externí odkaz:
https://doaj.org/article/f7a254958dd3415cadf2d1db54f03bcb
Publikováno v:
Procedia Technology, Elsevier, Vol 6, pages 556-563, 2012
Various list accessing algorithms have been proposed in the literature and their performances have been analyzed theoretically and experimentally. Move-To-Front (MTF) and Transpose (TRANS) are two well known primitive list accessing algorithms. MTF h
Externí odkaz:
http://arxiv.org/abs/1309.2476
Autor:
Albers, Susanne, Lauer, Sonja
Publikováno v:
In Journal of Computer and System Sciences August 2016 82(5):627-653
Autor:
Fiat, Amos, Mendel, Manor
Publikováno v:
38th Annual Symposium on Foundations of Computer Science (FOCS '97), 1997, pp. 326
The competitive analysis fails to model locality of reference in the online paging problem. To deal with it, Borodin et. al. introduced the access graph model, which attempts to capture the locality of reference. However, the access graph model has a
Externí odkaz:
http://arxiv.org/abs/cs/0601127
Autor:
Toledo, Sivan1 toledo@parc.xerox.com
Publikováno v:
SIAM Journal on Matrix Analysis & Applications. 1997, Vol. 18 Issue 4, p1065-1081. 17p.
Publikováno v:
In Procedia Technology 2012 6:556-563
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
ACSAC
X.509 certificate revocation defends against man-in-the-middle attacks involving a compromised certificate. Certificate revocation strategies face scalability, effectiveness, and deployment challenges as HTTPS adoption rates have soared. We propose C
Publikováno v:
Afshani, P, Iacono, J, Jayapaul, V, Karsin, B & Sitchinava, N 2022, Locality-of-Reference Optimality of Cache-Oblivious Algorithms . in 3rd Symposium on Algorithmic Principles of Computer Systems, (APOCS) . Society for Industrial and Applied Mathematics, pp. 31-45, Symposium on Algorithmic Principles of Computer Systems (APOCS22), 12/01/2022 . https://doi.org/10.1137/1.9781611977059.3
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=pure_au_____::2193cd0019da038d88f6c0a5bbcd4f56
https://pure.au.dk/portal/da/publications/localityofreference-optimality-of-cacheoblivious-algorithms(fa37199d-6b60-433f-b806-c986e9270a96).html
https://pure.au.dk/portal/da/publications/localityofreference-optimality-of-cacheoblivious-algorithms(fa37199d-6b60-433f-b806-c986e9270a96).html