Sciweavers

1147 search results - page 202 / 230
» Transformation of Access Rights
Sort
View
LCPC
2001
Springer
14 years 2 months ago
Strength Reduction of Integer Division and Modulo Operations
Integer division, modulo, and remainder operations are expressive and useful operations. They are logical candidates to express complex data accesses such as the wrap-around behav...
Jeffrey Sheldon, Walter Lee, Ben Greenwald, Saman ...
IPPS
2000
IEEE
14 years 2 months ago
Dynamic Data Layouts for Cache-Conscious Factorization of DFT
Effective utilization of cache memories is a key factor in achieving high performance in computing the Discrete Fourier Transform (DFT). Most optimizationtechniques for computing ...
Neungsoo Park, Dongsoo Kang, Kiran Bondalapati, Vi...
SIGMOD
1999
ACM
110views Database» more  SIGMOD 1999»
14 years 2 months ago
Multi-dimensional Selectivity Estimation Using Compressed Histogram Information
The database query optimizer requires the estimation of the query selectivity to find the most efficient access plan. For queries referencing multiple attributes from the same rel...
Ju-Hong Lee, Deok-Hwan Kim, Chin-Wan Chung
DL
1998
Springer
138views Digital Library» more  DL 1998»
14 years 2 months ago
Digital Library Information Appliances
Although digital libraries are intended to support education and knowledge work, current digital library interfaces are narrowly focused on retrieval. Furthermore, they are design...
Bill N. Schilit, Morgan N. Price, Gene Golovchinsk...
JELIA
1998
Springer
14 years 2 months ago
Towards State Update Axioms: Reifying Successor State Axioms
Successor state axioms are an optimal solution to the famous Frame Problem in reasoning about actions--but only as far as its representational aspect is concerned. We show how by g...
Michael Thielscher