Index Construction
Dictionary data structures. Tolerant retrieval: Wildcards, Spell correction, Soundex. Sort-based index construction. Blocked sort-based Indexing (Sorting with fewer disk seeks). Remaining problem with sort-based algorithm. Single-pass in-memory indexing.
Подобные документы
Consideration of four major requirements when a biometric template protection algorithm is designed. The definition of a secure authentication model, based on fingerprint template protection by using the approaches of cryptography and watermarking.
статья, добавлен 26.01.2018Reducing the amount of required memory, reducing the time for data processing and reducing the number of copies of documents when updating information in the automation process. Analysis of the choice of technologies for application development.
статья, добавлен 31.08.2022Theoretical bases of construction of geographically distributed networks and mechanisms to ensure quality of service (QoS) in such networks. Principles of construction of networks with guaranteed quality of service. The main types of interfaces.
методичка, добавлен 11.10.2014The optimization problem to identify the classifier scalable objects based on two-layer perceptron. The ratio of standard deviations of pixel distortion and scale for the formation of learning sets. Minimization of the error rate of classification.
статья, добавлен 27.03.2016The comparative analysis of multiple commonly used approaches of the analysis of system logs, and streaming data massively generated by company IT infrastructure with an unattended anomaly detection feature. Hierarchical temporary memory algorithms.
статья, добавлен 18.09.2020The methods for adaptive, knowledge-based learning, such as online incremental feature selection, spiking neural networks, adaptive data and model integration, and artificial life systems, particle swarm optimisation, ensembles of evolving systems.
книга, добавлен 09.04.2013Intellectual information systems as hybrid neural networks. Using the topology of neural networks based on a fuzzy perceptron, ANFIS, TSK, Wang & Mendel’s network to solve diagnostic problems in medicine. Influence of the fuzzy rule on output signal.
статья, добавлен 22.12.2016Make translation of paper-based procedures to networked digital ones hard. Specific non-repudiation services. General contribution to multi-party problem. Summary of MPNR protocol properties. Supporting legal framework. Main model simulation event.
книга, добавлен 08.03.2014One of the basic primitives in cryptography and of computer science is a pseudo-random generator. The number of important applications, including the construction of a private provably secure key cryptosystem. The construct a pseudo-random generator.
статья, добавлен 15.09.2012Development and implementation of new technologies in banking services. The ability to improve the existing anti-fraud model used in real banking practice. Clusters and their impact on the assessment of the existing anti-fraud model. Data Chart Analysis.
дипломная работа, добавлен 10.12.2019- 86. Virtual Memory
Levels in Memory Hierarchy. Design of DRAM caches. Locating an Object in a "Cache". A System with Physical Memory Only and with Virtual Memory. Servicing a Page Fault. Multiple processes in physical memory. Macintosh Memory Model. Page Table Operation.
презентация, добавлен 03.06.2012 Analysis of the mobile banking information system based on biometric authentication. A function is proposed that ensures the closure of biometric template data in information networks. Estimation of the number of customer requests to the payment system.
статья, добавлен 29.09.2016- 88. The Main memory
Types of main memory: Random Access Memory and Read Only Memory. The operation of cache memory. Electrically Erasable Programmable Read Only Memory. Memory configurations for Intel CPU’s. Erasable Programmable Read Only Memory and Virtual memory.
презентация, добавлен 03.06.2012 Higher-level programming language (commonly C, C++, or java) and familiarity with the fundamentals of data structures and algorithms. The study of the theory of computation. A hierarchy of formal language and automata. Limits of algorithmic computation.
книга, добавлен 08.03.2014- 90. Improving the efficiency of the solution of linear programming tasks applying the CUDA-technology
Methods for improving the efficiency of the solution of large dimensional linear programming tasks based on application of parallel data processing technology – CUDA. The specific features and algorithmic peculiarities of implementing of the program.
статья, добавлен 26.09.2016 Transactional memory, the interface matters. Programmability is the key motivation for transactional memory. Processors support small (few memory operations) easily. Unlimited transactions are convenient for software. Virtualize transactional memory.
презентация, добавлен 03.06.2012The massage recovery feature as independent of the choice of the signature equation and that all ElGamal type schemes have variants giving message recovery and archive five new signature schemes giving message recovery with different properties.
статья, добавлен 15.09.2012Computer facilities and microprocessor systems and data manipulation. Digital automata synthesis. Programming of Intel microprocessors, generic architecture. Construction principles of telecommunications nodes. Initialization of purpose registers.
методичка, добавлен 11.10.2014The essence of using a functionally complete tolerant elements. Comparison of the exponential reliability functional performance. Rating and characteristic tree of the transmitting transistors. Description of redundancy of the transmitting transistors.
статья, добавлен 28.02.2016The problem of the development of mathematical support to automate the process of diagnostic and recognizing model construction by precedents. The software realizing proposed transformations and indicators characterizing their properties was developed.
статья, добавлен 29.07.2016Vector computers, main memory background. Multilevel caches, a typical memory hierarchy. Core memory, semiconductor memory, DRAM. Fast hit times via trace cache. Increasing cache bandwidth by pipelining, non-blocking caches. Merging arrays example.
презентация, добавлен 03.06.2012The principles of construction of the integrated modular avionics aircraft and its functional elements. Methods and means of control of IMA computer systems. Evaluate the reliability of IMA computing structures for different hardware configurations.
статья, добавлен 13.07.2022Target Server Memory Pool. A pool of memory on the target reserved for use by the Tornado tools. The target server manages the pool, keeping overhead such as block lists on the host. Additional memory is allocated from the system memory pool if needed.
презентация, добавлен 03.06.2012Concept of algorithm and its appointment. Algorithmic method - precisely established procedure or a set of instructions which can be applied to all cases of a problem. Mathematical properties of algorithms described by the British mathematician Turing.
реферат, добавлен 31.10.2012A Bayesian algorithm for determining the statistical accuracy factor, which can be used to estimate the accuracy characteristics of on-board automatic landing system on the stage of operational control. Solution of the statistical accuracy problem.
статья, добавлен 26.06.2016