Sciweavers

822 search results - page 133 / 165
» Contention in shared memory algorithms
Sort
View
PODC
2010
ACM
15 years 6 months ago
Constant RMR solutions to reader writer synchronization
We study Reader-Writer Exclusion [1], a well-known variant of the Mutual Exclusion problem [2] where processes are divided into two classes–readers and writers–and multiple re...
Vibhor Bhatt, Prasad Jayanti
102
Voted
SSS
2009
Springer
15 years 9 months ago
Visiting Gafni's Reduction Land: From the BG Simulation to the Extended BG Simulation
: The Borowsky-Gafni (BG) simulation algorithm is a powerful tool that allows a set of t + 1 asynchronous sequential processes to wait-free simulate (i.e., despite the crash of up ...
Damien Imbs, Michel Raynal
KDD
2004
ACM
195views Data Mining» more  KDD 2004»
16 years 2 months ago
Improved robustness of signature-based near-replica detection via lexicon randomization
Detection of near duplicate documents is an important problem in many data mining and information filtering applications. When faced with massive quantities of data, traditional d...
Aleksander Kolcz, Abdur Chowdhury, Joshua Alspecto...
PAKDD
2009
ACM
170views Data Mining» more  PAKDD 2009»
15 years 11 months ago
Discovering Periodic-Frequent Patterns in Transactional Databases.
Since mining frequent patterns from transactional databases involves an exponential mining space and generates a huge number of patterns, efficient discovery of user-interest-based...
Byeong-Soo Jeong, Chowdhury Farhan Ahmed, Syed Kha...
94
Voted
SOSP
2001
ACM
15 years 11 months ago
Information and Control in Gray-Box Systems
In modern systems, developers are often unable to modify the underlying operating system. To build services in such an environment, we advocate the use of gray-box techniques. Whe...
Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau