Sciweavers

2304 search results - page 385 / 461
» On the Vulnerability of Large Graphs
Sort
View
MSS
2000
IEEE
89views Hardware» more  MSS 2000»
14 years 3 months ago
Access Coordination of Tertiary Storage for High Energy Physics Applications
We describe a real implementation of a software component that manages caching of files from a tertiary storage management system to a large disk cache developed for use in the a...
Luis M. Bernardo, Arie Shoshani, Alex Sim, Henrik ...
ASPDAC
2000
ACM
95views Hardware» more  ASPDAC 2000»
14 years 3 months ago
FSM decomposition by direct circuit manipulation applied to low power design
Abstract— Clock-gating techniques are very effective in the reduction of the switching activity in sequential logic circuits. In particular, recent work has shown that significa...
José C. Monteiro, Arlindo L. Oliveira
SIGMOD
2000
ACM
161views Database» more  SIGMOD 2000»
14 years 3 months ago
Answering Complex SQL Queries Using Automatic Summary Tables
We investigate the problem of using materialized views to answer SQL queries. We focus on modern decision-support queries, which involve joins, arithmetic operations and other (po...
Markos Zaharioudakis, Roberta Cochrane, George Lap...
CIKM
1999
Springer
14 years 3 months ago
Indexing and Retrieval of Scientific Literature
The web hasgreatly improved accessto scientific literature. However, scientific articles on the web are largely disorganized, with research articles being spreadacrossarchive site...
Steve Lawrence, Kurt D. Bollacker, C. Lee Giles
IPPS
1998
IEEE
14 years 3 months ago
Hyper Butterfly Network: A Scalable Optimally Fault Tolerant Architecture
Boundeddegreenetworks like deBruijn graphsor wrapped butterfly networks are very important from VLSI implementation point of view as well as for applications where the computing n...
Wei Shi, Pradip K. Srimani