A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is
IBM Systems Journal
A new approach is proposed for the design of perfect hash functions. The algorithms developed can be effectively applied to key sets of large size. ... Analytic results are given which are applicable when problem sizes are smalL Extensive experiments have been performed to test the approach for problems of larger size. ... In order to use hashing techniques in a specific application, one has to first choose a suitable hash function, then select a method for collision resolution. ...doi:10.1147/sj.92.0078 fatcat:m4rf3zx7djfe7erjzfhmnoh3uq
IBM Systems Journal
AND MERGING A model of floating buffering Guided bibliography to sorting STORAGE SYSTEMS Evaluation techniques for storage hierarchies A virtual machine time-sharing system Model of paging system performance ... Interactive simulation for banking Forecasting techniques Direct-access device simulation Skylab terminal system performance analysis Evaluation of storage hierarchies Probability for system design SORTING ...doi:10.1147/sj.134.0357 fatcat:pnqvxhwn5jhpho2zwnhfvakrt4
IBM Systems Journal
Interactive simulation for banking Forecasting techniques Direct-access device simulation Skylab terminal system performance analysis Evaluation of storage hierarchies Probability for system design SORTING ... AND MERGING A model of floating buffering Guided bibliography to sorting STORAGE SYSTEMS Evaluation techniques for storage hierarchies A virtual machine time-sharing system Model of paging system performance ...
Global NEST Journal
<p>Geologic storage of carbon dioxide (CO2) has been proposed as a viable means for reducing anthropogenic CO2 emissions. ... In this paper, we identify techniques of gas measurements in subsurface which are currently applying in the phase of characterization (pre-injection); MCDM will help decision-makers to hierarchy the most ... weight evaluated is the same for each alternative, the values will differ from each alternative. ...doi:10.30955/gnj.001241 fatcat:7zuecnselzhelmlfaury6visnq
to the storage client software, and the aggressively-collaborative caching trades off transparency for performance and requires changes to both the interface and the storage client software. ... Our study provides an empirical evaluation to address the above questions. ... techniques are used. ...doi:10.1145/1071690.1064230 fatcat:ijkfxl2pqrat7c7hrmapi64z3q
Our study provides an empirical evaluation to address the above questions. ... to the storage client software, and the aggressively-collaborative caching trades off transparency for performance and requires changes to both the interface and the storage client software. ... techniques are used. ...doi:10.1145/1064212.1064230 dblp:conf/sigmetrics/ChenZZSS05 fatcat:3sj6tovawvdfjj6wmgdyi3vaoi
Result is evaluated using Cloudsim, and our algorithm outperforms in terms of computational cost by consuming 32 MB for 150-MB files. ... Furthermore, highly secure and flexible cipher text-based attribute access control with role hierarchy user grouping in cloud storage is implemented by extending the KUNodes (revocation) storage identity-based ... Storage consumption of the proposed system is evaluated by comparing the cipher text storage capacity of the existing algorithms. The evaluated results are shown in Tab. 3. ...doi:10.32604/csse.2022.019508 fatcat:nzq5lyfcozco5eapu3q6ywziwq
Additionally, we introduce a weight-based lazy merging technique for rule selection. All of these techniques are evaluated with real world and synthetic data sets. ... These rules can impede efficient query processing when they require the business rule engine to resolve semantic hierarchies. ... Additionally, we evaluate our techniques with synthetic datasets. ...doi:10.14778/2824032.2824064 fatcat:frb7o7zgmfdohmokodrwq77pku
The Stream programming model captures this by making computation and communication explicit in a 2-level storage hierarchy. ... The levels of memory hierarchy could include on-die storage such as caches, local DRAM, or even remote memory accessed over high-speed interconnect. ... A steepest gradient search algorithm is adopted to search for the best performing working set that fits in each memory level.We evaluate each optimization by plugging Stream Scheduling into the Sequoia ...doi:10.1109/pact.2007.4336233 fatcat:m2s7y4urdjc3niwi2g4e6fwtbe
Finally, the view FU hierarchy use case displays the FU hierarchy for a program. ... Consequently, evaluation, such as checking for conformance to codes and standards at a minimum, is needed after the generation cycle is completed. ...
Current cache evaluation techniques (e.g., Miss Ratio Curves) are short-sighted: they analyze only a single tier of cache, focus primarily on performance, and fail to examine the critical relationships ... Modern cache hierarchies are tangled webs of complexity. ... It is vital that our methods of evaluating caches mature as storage technologies and cache hierarchies continuously evolve. ...dblp:conf/hotstorage/EstroBWZ20 fatcat:f3eetlewjrdylpkgk6qaagubgy
It also determines the desired storage that must be added to enhance the system flexibility for real time dispatching. ... This paper introduces a new process based on Analytical Hierarchy Process (AHP) to aid the integrating of CPV in Smart Grids. ... Acknowledgements The authors gratefully acknowledge the grant and support of "Small scale thermal solar district units for Mediterranean communities", Priority 2 -Topic 2.3 Solar Energy, Ref. ...doi:10.12720/sgce.4.3.233-240 fatcat:54famhgqiba35kti7btftjzo54
We present a framework for evaluating the dependability of data storage systems, including both individual data protection techniques and their compositions. ... Predicting the dependability provided by such compositions of techniques is difficult, yet necessary for dependable system design. ... Acknowledgements The authors are grateful to John Wilkes, Jeff Chase and Eric Anderson for their inputs on the direction of this work and comments on earlier versions of this paper. ...doi:10.1109/dsn.2004.1311958 dblp:conf/dsn/KeetonM04 fatcat:othkcz4pfnfkhc6hokhqtpfny4
Ecient indexing in a class hierarchy is essential for the achievement of high performance in query evaluation for object database management systems. ... We develop a cost model and, through experiments, demonstrate the performance of the proposed scheme over various class hierarchies. Ó ... Many indexing techniques for queries on composite hierarchies have also been studied. ...doi:10.1016/s0169-023x(00)00006-9 fatcat:ivyb55babngs3irvmjd7gjszym
We propose a general framework for improving the query processing performance on multi-level memory hierarchies. ... Our motivation is that (1) the memory hierarchy is an important performance factor for query processing, (2) both the memory hierarchy and database systems are becoming increasingly complex and diverse ... Storage models We consider two kinds of storage models, the array for static data and the linked list (LL) for dynamic data. Especially, we consider optimizing the scan on the storage models. ...doi:10.1145/1363189.1363193 dblp:conf/damon/HeLLY07 fatcat:ols4ejd2k5bjnoksaeqjccjy34
« Previous Showing results 1 — 15 out of 90,572 results