What is included with this book?
1. Memory Hierarchies - Models and Lower Bounds | |||||
|
1 | (13) | |||
|
1 | (1) | |||
|
2 | (3) | |||
|
5 | (4) | |||
|
9 | (1) | |||
|
10 | (4) | |||
2. Basic External Memory Data Structures | |||||
|
14 | (22) | |||
|
15 | (2) | |||
|
17 | (2) | |||
|
19 | (8) | |||
|
27 | (6) | |||
|
33 | (2) | |||
|
35 | (1) | |||
3. A Survey of Techniques for Designing I/O-Efficient Algorithms | |||||
|
36 | (26) | |||
|
36 | (1) | |||
|
37 | (7) | |||
|
44 | (2) | |||
|
46 | (2) | |||
|
48 | (2) | |||
|
50 | (4) | |||
|
54 | (7) | |||
|
61 | (1) | |||
4. Elementary Graph Algorithms in External Memory | |||||
|
62 | (23) | |||
|
62 | (1) | |||
|
63 | (3) | |||
|
66 | (4) | |||
|
70 | (3) | |||
|
73 | (1) | |||
|
74 | ||||
|
70 | (7) | |||
|
77 | (1) | |||
|
78 | (2) | |||
|
80 | (1) | |||
|
81 | (2) | |||
|
83 | (1) | |||
|
84 | (1) | |||
5. I/O-Efficient Algorithms for Sparse Graphs | |||||
|
85 | (25) | |||
|
85 | (2) | |||
|
87 | (2) | |||
|
89 | (2) | |||
|
91 | (2) | |||
|
93 | (5) | |||
|
98 | (3) | |||
|
101 | (4) | |||
|
105 | (4) | |||
|
109 | (1) | |||
6. External Memory Computational Geometry Revisited | |||||
|
110 | (39) | |||
|
110 | (2) | |||
|
112 | (7) | |||
|
119 | (12) | |||
|
131 | (13) | |||
|
144 | (4) | |||
|
148 | (1) | |||
7. Full-Text Indexes in External Memory | |||||
|
149 | (22) | |||
|
149 | (1) | |||
|
150 | (1) | |||
|
151 | (4) | |||
|
155 | (6) | |||
|
161 | (9) | |||
|
170 | (1) | |||
8. Algorithms for Hardware Caches and TLB | |||||
|
171 | (22) | |||
|
171 | (2) | |||
|
173 | (3) | |||
|
176 | (5) | |||
|
181 | (4) | |||
|
185 | (1) | |||
|
186 | (3) | |||
|
189 | (4) | |||
9. Cache Oblivious Algorithms | |||||
|
193 | (20) | |||
|
193 | (2) | |||
|
195 | (2) | |||
|
197 | (2) | |||
|
199 | (2) | |||
|
201 | (2) | |||
|
203 | (2) | |||
|
205 | (4) | |||
|
209 | (2) | |||
|
211 | (1) | |||
|
211 | (1) | |||
|
212 | (1) | |||
10. An Overview of Cache Optimization Techniques and Cache-Aware Numerical Algorithms | |||||
|
213 | (20) | |||
|
213 | (1) | |||
|
214 | (3) | |||
|
217 | (8) | |||
|
225 | (7) | |||
|
232 | (1) | |||
11. Memory Limitations in Artificial Intelligence | |||||
|
233 | (18) | |||
|
233 | (1) | |||
|
234 | (1) | |||
|
235 | (6) | |||
|
241 | (5) | |||
|
246 | (2) | |||
|
248 | (1) | |||
|
249 | (2) | |||
12. Algorithmic Approaches for Storage Networks | |||||
|
251 | (22) | |||
|
251 | (3) | |||
|
254 | (2) | |||
|
256 | (2) | |||
|
258 | (2) | |||
|
260 | (9) | |||
|
269 | (3) | |||
|
272 | (1) | |||
13. An Overview of File System Architectures | |||||
|
273 | (17) | |||
|
273 | (1) | |||
|
274 | (2) | |||
|
276 | (4) | |||
|
280 | (9) | |||
|
289 | (1) | |||
14. Exploitation of the Memory Hierarchy in Relational DBMSs | |||||
|
290 | (30) | |||
|
290 | (1) | |||
|
291 | (2) | |||
|
293 | (4) | |||
|
297 | (1) | |||
|
298 | (2) | |||
|
300 | (7) | |||
|
307 | (4) | |||
|
311 | (6) | |||
|
317 | (1) | |||
|
318 | (1) | |||
|
318 | (2) | |||
15. Hierarchical Models and Software Tools for Parallel Programming | |||||
|
320 | (35) | |||
|
320 | (1) | |||
|
321 | (6) | |||
|
327 | (1) | |||
|
328 | (10) | |||
|
338 | (14) | |||
|
352 | (3) | |||
16. Case Study: Memory Conscious Parallel Sorting | |||||
|
355 | (24) | |||
|
355 | (3) | |||
|
358 | (3) | |||
|
361 | (10) | |||
|
371 | (5) | |||
|
376 | (1) | |||
|
377 | (2) | |||
Bibliography | 379 | (42) | |||
Index | 421 |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.