B-Trees Considered Harmful

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

B-Trees Considered Harmful

The development of the lookaside buffer has simulated wide-area networks, and current trends suggest that the simulation of congestion control will soon emerge. In this paper, we validate the evaluation of the World Wide Web. RidingSoken, our new methodology for the visualization of 2 bit architectures, is the solution to all of these issues.

متن کامل

Data Structures Considered Harmful

We describe an approach to logic programming where the execution of a pure logic program is ordered on “temporal” values in the program. The resulting programs are relational and avoid a premature commitment to data structures. This is a strong advantage in a programming language. We present the programming language Starlog as an example of this approach and give a summary of its denotational a...

متن کامل

Independence Assumptions Considered Harmful

Many current approaches to statistical language modeling rely on independence a.~sumptions 1)etween the different explanatory variables. This results in models which are computationally simple, but which only model the main effects of the explanatory variables oil the response variable. This paper presents an argmnent in favor of a statistical approach that also models the interactions between ...

متن کامل

Use Cases Considered Harmful

This article traces the unstable semantics of use cases from Jacobson to UML 1.3. The UML 1.1 metamodel formally defined the «uses» and «extends» use case relationships as stereotypes of generalisation, yet both received interpretations that varied between inheritance and composition, reflecting a large degree of confusion among developers. The recently revised UML 1.3 has quietly dropped these...

متن کامل

Layered Multiplexing Considered Harmful

Traditionally, computer communication networks have been optimized with respect to throughput, robustness and absolute delay, with little or no concern for the variation in delay (jitter) induced by the network. It is now desirable that high speed networks support a greater range of telecommunication services by providing a multi-service environment. If the transmission of jitter-sensitive tra ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2016

ISSN: 0975-8887

DOI: 10.5120/ijca2016909182