منابع مشابه
Data Dependence Boundary Row Boundary Row Node
Though more diicult to program, distributed-memory parallel machines provide greater scalability than their shared-memory counterparts. Distributed Shared Memory (DSM) systems provide the abstraction of shared memory on a distributed machine. While DSMs provide an attractive programming model, they currently can not eeciently support all classes of scientiic applications. One such class are tho...
متن کاملA Method for Protecting Access Pattern in Outsourced Data
Protecting the information access pattern, which means preventing the disclosure of data and structural details of databases, is very important in working with data, especially in the cases of outsourced databases and databases with Internet access. The protection of the information access pattern indicates that mere data confidentiality is not sufficient and the privacy of queries and accesses...
متن کاملData Access and Management Services on Grid
Grid computing began with an emphasis on compute-intensive tasks like prime number finding, key cracking, and so on. These applications benefit from massive parallelism for their computation needs, but are not data intensive; the data that they operate on does not scale in proportion to the computation they perform. As such, they can be easily divided into small tasks and farmed out to nodes on...
متن کاملPermuting Data on Random-Access Block Storage
Permutation is a fundamental operator for array data, with applications in, for example, changing matrix layouts and reorganizing data cubes. We consider the problem of permuting large quantities of data stored on secondary storage that supports fast random block accesses, such as solid state drives and distributed key-value stores. Faster random accesses open up interesting new opportunities f...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nature
سال: 1982
ISSN: 0028-0836,1476-4687
DOI: 10.1038/296004c0