Sciweavers

544 search results - page 42 / 109
» Reading to Write
Sort
View
ISCA
1994
IEEE
88views Hardware» more  ISCA 1994»
15 years 7 months ago
A Unified Architectural Tradeoff Methodology
Wepresentaunijiedapp?'each to assess thet7adeoff of architecture techniques that affect mean memory access time. The architectural features we consider inciude cache hit Tati...
Chung-Ho Chen, Arun K. Somani
VLDB
1993
ACM
73views Database» more  VLDB 1993»
15 years 7 months ago
A Model of Methods Access Authorization in Object-oriented Databases
Object-oriented databases are a recent and important development and many studies of them have been performed. These consider aspects such as data modeling, query languages, perfo...
Nurit Gal-Oz, Ehud Gudes, Eduardo B. Fernán...
SIGMETRICS
1990
ACM
15 years 7 months ago
An Evaluation of Redundant Arrays of Disks Using an Amdahl 5890
Recently we presented several disk array architectures designed to increase the data rate and I/O rate of supercomputing applications, transaction processing, and file systems [Pat...
Peter M. Chen, Garth A. Gibson, Randy H. Katz, Dav...
ECTEL
2006
Springer
15 years 6 months ago
Who Needs "Blended Learning"? Some Thoughts on a Political Concept
The paper covers the topic from an e-learning provider's perspective on the basis of practical experience and discussions with corporate and SME partners. In this paper the au...
Ray Mary Rosdale
DC
2006
15 years 2 months ago
On the inherent weakness of conditional primitives
Some well-known primitive operations, such as compare-and-swap, can be used, together with read and write, to implement any object in a wait-free manner. However, this paper shows ...
Faith Ellen Fich, Danny Hendler, Nir Shavit