Sciweavers

680 search results - page 99 / 136
» Implementing database operations using SIMD instructions
Sort
View
OODBS
2000
110views Database» more  OODBS 2000»
14 years 8 days ago
Opportunistic Prioritised Clustering Framework (OPCF)
Ever since the `early days' of database management systems, clustering has proven to be one of the most effective performance enhancement techniques for object oriented datab...
Zhen He, Alonso Marquez, Stephen Blackburn
SIGMOD
2009
ACM
130views Database» more  SIGMOD 2009»
14 years 9 months ago
FlashLogging: exploiting flash devices for synchronous logging performance
Synchronous transactional logging is the central mechanism for ensuring data persistency and recoverability in database systems. Unfortunately, magnetic disks are ill-suited for t...
Shimin Chen
NC
2008
122views Neural Networks» more  NC 2008»
13 years 8 months ago
Computation with finite stochastic chemical reaction networks
A highly desired part of the synthetic biology toolbox is an embedded chemical microcontroller, capable of autonomously following a logic program specified by a set of instructions...
David Soloveichik, Matthew Cook, Erik Winfree, Jeh...
IDEAS
2005
IEEE
113views Database» more  IDEAS 2005»
14 years 2 months ago
Fine-Granularity Access Control in 3-Tier Laboratory Information Systems
Laboratory information systems (LIMS) are used in life science research to manage complex experiments. Since LIMS systems are often shared by different research groups, powerful a...
Xueli Li, Nomair A. Naeem, Bettina Kemme
IACR
2011
115views more  IACR 2011»
12 years 8 months ago
Multi-Server Oblivious RAM
Secure two-party computation protocol allows two players, Alice with secret input x and Bob with secret input y, to jointly execute an arbitrary program π(x, y) such that only th...
Steve Lu, Rafail Ostrovsky