Locality of queries and transformations (Invited talk)

被引:0
|
作者
Arenas, Marcelo [1 ]
机构
[1] Pontificia Univ Catolica Chile, Dept Comp Sci, Escuela Ingn, Santiago 22, Chile
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
引用
收藏
页码:3 / 3
页数:1
相关论文
共 50 条
  • [41] Invited Talk Memory: The Center of the Universe
    Murphy, Richard
    2013 IEEE WORKSHOP ON MICROELECTRONICS AND ELECTRON DEVICES (WMED), 2013, : XIX - XIX
  • [42] A comparison of locality transformations for irregular codes
    Han, HS
    Tseng, CW
    LANGUAGES, COMPILERS, AND RUN-TIME SYSTEMS FOR SCALABLE COMPUTERS, 2000, 1915 : 70 - 84
  • [43] Improving data locality with loop transformations
    McKinley, KS
    Carr, S
    Tseng, CW
    ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1996, 18 (04): : 424 - 453
  • [44] Transformations for Volumetric Range Distribution Queries
    Martin, Steven
    Shen, Han-Wei
    2013 IEEE SYMPOSIUM ON PACIFIC VISUALIZATION (PACIFICVIS), 2013, : 89 - 96
  • [45] INVITED REVIEW - TRANSFORMATIONS OF PODOCARPIC ACID
    CAMBIE, RC
    RUTLEDGE, PS
    WOODGATE, PD
    AUSTRALIAN JOURNAL OF CHEMISTRY, 1993, 46 (10) : 1447 - 1471
  • [46] Mathematics and Cryptography: A Marriage of Convenience? INVITED TALK
    Silverberg, Alice
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT I, 2020, 12105 : 3 - 9
  • [47] A Brief Introduction to Probabilistic Argumentation (Invited Talk)
    Hunter, Anthony
    KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT (KSEM 2018), PT I, 2018, 11061 : XI - XIII
  • [48] Strong secrecy for wireless channels (Invited talk)
    Barros, Joao
    Bloch, Matthieu
    INFORMATION THEORETIC SECURITY, PROCEEDINGS, 2008, 5155 : 40 - +
  • [49] The CaPiTo Approach to Protocol Validation (Invited Talk)
    Nielson, Flemming
    Gao, Han
    Nielson, Hanne Riis
    AUTOMATED REASONING FOR SECURITY PROTOCOL ANALYSIS AND ISSUES IN THE THEORY OF SECURITY, 2010, 6186 : 1 - 1
  • [50] When the sensors hit the roads - (Invited talk)
    Balakrishnan, Hari
    Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, Proceedings, 2007, : 97 - 97