Results 1 - 10
of
243
The Cache Performance and Optimizations of Blocked Algorithms
- In Proceedings of the Fourth International Conference on Architectural Support for Programming Languages and Operating Systems
, 1991
"... Blocking is a well-known optimization technique for improving the effectiveness of memory hierarchies. Instead of operating on entire rows or columns of an array, blocked algorithms operate on submatrices or blocks, so that data loaded into the faster levels of the memory hierarchy are reused. This ..."
Abstract
-
Cited by 574 (5 self)
- Add to MetaCart
Blocking is a well-known optimization technique for improving the effectiveness of memory hierarchies. Instead of operating on entire rows or columns of an array, blocked algorithms operate on submatrices or blocks, so that data loaded into the faster levels of the memory hierarchy are reused
ROW LEVEL ACCESS RIGHTS MODEL IN THE INFORMATION SYSTEM*
"... During design of university information system we were faced with the problem to build so called access list to every record in several tables. Approach, currently known as Virtual Private Databases in the ORACLE DBMS, is not supported in our DBMS environment. The paper describes the approach we hav ..."
Abstract
- Add to MetaCart
During design of university information system we were faced with the problem to build so called access list to every record in several tables. Approach, currently known as Virtual Private Databases in the ORACLE DBMS, is not supported in our DBMS environment. The paper describes the approach we
Whom You Know Matters: Venture Capital Networks and Investment Performance,
- Journal of Finance
, 2007
"... Abstract Many financial markets are characterized by strong relationships and networks, rather than arm's-length, spot-market transactions. We examine the performance consequences of this organizational choice in the context of relationships established when VCs syndicate portfolio company inv ..."
Abstract
-
Cited by 138 (8 self)
- Add to MetaCart
in the first round from the unconditional expectation of 66.8% to 72.4%, in the second round from 77.7% to 83.4%, and in the third round from 79.2% to 86.4%. As in the fund-level models, the network measures capturing the number and quality of relationships (degree and eigenvector) and access to other VCs
Reducing DRAM latencies with an integrated memory hierarchy design
- In Proceedings of the 7th International Symposium on High Performance Computer Architecture (HPCA-7
, 2001
"... In this papel; we address the severe performance gap caused by high processor clock rates and slow DRAM accesses. We show that even with an aggressive, next-generation memory system using four Direct Rambus channels and an integrated one-megabyte level-two cache, a processor still spends over half o ..."
Abstract
-
Cited by 109 (7 self)
- Add to MetaCart
In this papel; we address the severe performance gap caused by high processor clock rates and slow DRAM accesses. We show that even with an aggressive, next-generation memory system using four Direct Rambus channels and an integrated one-megabyte level-two cache, a processor still spends over half
Column-Stores vs. Row-Stores: How Different Are They Really
- In SIGMOD
, 2008
"... There has been a significant amount of excitement and recent work on column-oriented database systems (“column-stores”). These database systems have been shown to perform more than an order of magnitude better than traditional row-oriented database systems (“row-stores”) on analytical workloads such ..."
Abstract
-
Cited by 85 (5 self)
- Add to MetaCart
by a query. This simplistic view leads to the assumption that one can obtain the performance benefits of a column-store using a row-store: either by vertically partitioning the schema, or by indexing every column so that columns can be accessed independently. In this paper, we demonstrate
Database-Agnostic Transaction Support for
"... In this paper, we present and empirically evaluate the performance of database-agnostic transaction (DAT) support for the cloud. Our design and implementation of DAT is scalable, fault-tolerant, and requires only that the datastore provide atomic, row-level access. Our approach enables applications ..."
Abstract
- Add to MetaCart
In this paper, we present and empirically evaluate the performance of database-agnostic transaction (DAT) support for the cloud. Our design and implementation of DAT is scalable, fault-tolerant, and requires only that the datastore provide atomic, row-level access. Our approach enables applications
A burst-mode word-serial address-event Link-III: Analysis and test results
- IEEE Trans. Circuits Syst. I, Reg. Papers
, 2004
"... Abstract—We present a transmitter for a scalable multiple-access inter-chip link that communicates binary activity between two-dimensional arrays fabricated in deep submicrometer CMOS. Transmission is initiated by active cells but cells are not read individually. An entire row is read in parallel; t ..."
Abstract
-
Cited by 31 (8 self)
- Add to MetaCart
Abstract—We present a transmitter for a scalable multiple-access inter-chip link that communicates binary activity between two-dimensional arrays fabricated in deep submicrometer CMOS. Transmission is initiated by active cells but cells are not read individually. An entire row is read in parallel
Approach for Information Leakage and Redundancy in Fine Grained Access Control
"... Fine Grained Access Control (FGAC) provides a row-level security mechanism that's built-in to the Oracle database engine. FGAC allows to granularly specifying the exact information elements that each user may access. Several proposals have been made for fine grained access control which has res ..."
Abstract
- Add to MetaCart
Fine Grained Access Control (FGAC) provides a row-level security mechanism that's built-in to the Oracle database engine. FGAC allows to granularly specifying the exact information elements that each user may access. Several proposals have been made for fine grained access control which has
iPrivacy: a distributed approach to privacy on the cloud
- International Journal on Advances in Security
"... Abstract—The increasing adoption of Cloud storage poses a number of privacy issues. Users wish to preserve full control over their sensitive data and cannot accept that it is accessible by the remote storage provider. Previous research was made on techniques to protect data stored on untrusted serve ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
-and-revoke permission of shared data and we have developed a system test implementation, using an in-memory Relational Data Base Management System with row-level data encryption for fine-grained data access control. Keywords-cloud; database; encryption; data sharing; privacy; distributed data. I.
The Application of VPD in University Entrance Examination Management System
"... Virtual Private Database (VPD) ensures the privacy of information and prevents direct data leakage through computer terminals by providing Fine-grained Access Control (FGAC). This paper firstly introduces the security requirements of the test database management system and based on which, further an ..."
Abstract
- Add to MetaCart
problems of the system are solved. Index Terms: grained access control; database; virtual private database; security policy; row-level security © 2011 Published by MECS Publisher. Selection and/or peer review under responsibility of the Research
Results 1 - 10
of
243