Sciweavers

544 search results - page 42 / 109
» Reading to Write
Sort
View
ISCA
1994
IEEE
88views Hardware» more  ISCA 1994»
14 years 28 days ago
A Unified Architectural Tradeoff Methodology
Wepresentaunijiedapp?'each to assess thet7adeoff of architecture techniques that affect mean memory access time. The architectural features we consider inciude cache hit Tati...
Chung-Ho Chen, Arun K. Somani
VLDB
1993
ACM
73views Database» more  VLDB 1993»
14 years 26 days ago
A Model of Methods Access Authorization in Object-oriented Databases
Object-oriented databases are a recent and important development and many studies of them have been performed. These consider aspects such as data modeling, query languages, perfo...
Nurit Gal-Oz, Ehud Gudes, Eduardo B. Fernán...
SIGMETRICS
1990
ACM
14 years 25 days ago
An Evaluation of Redundant Arrays of Disks Using an Amdahl 5890
Recently we presented several disk array architectures designed to increase the data rate and I/O rate of supercomputing applications, transaction processing, and file systems [Pat...
Peter M. Chen, Garth A. Gibson, Randy H. Katz, Dav...
ECTEL
2006
Springer
14 years 14 days ago
Who Needs "Blended Learning"? Some Thoughts on a Political Concept
The paper covers the topic from an e-learning provider's perspective on the basis of practical experience and discussions with corporate and SME partners. In this paper the au...
Ray Mary Rosdale
DC
2006
13 years 8 months ago
On the inherent weakness of conditional primitives
Some well-known primitive operations, such as compare-and-swap, can be used, together with read and write, to implement any object in a wait-free manner. However, this paper shows ...
Faith Ellen Fich, Danny Hendler, Nir Shavit