Big memory

Results: 100



#Item
41Big Data Transfer WP v1_Layout 1

Big Data Transfer WP v1_Layout 1

Add to Reading List

Source URL: asperasoft.com

Language: English - Date: 2014-05-22 20:43:55
42KVM and Big VMs KVM Forum 2012 Andrew Theurer IBM Linux Technology Center  Topics

KVM and Big VMs KVM Forum 2012 Andrew Theurer IBM Linux Technology Center Topics

Add to Reading List

Source URL: www.linux-kvm.org

Language: English - Date: 2012-11-20 21:55:03
43BDMPI — Big Data Message Passing Interface User/Reference Manual Karypis Lab Department of Computer Science & Engineering University of Minnesota Release 0.1, April 2014

BDMPI — Big Data Message Passing Interface User/Reference Manual Karypis Lab Department of Computer Science & Engineering University of Minnesota Release 0.1, April 2014

Add to Reading List

Source URL: glaros.dtc.umn.edu

Language: English - Date: 2014-04-21 15:03:07
44IEEE TRANSACTIONS ON COMPUTERS, VOL. X, NO. Y, MONTH YEAR  1 DVM: A Big Virtual Machine for Cloud Computing

IEEE TRANSACTIONS ON COMPUTERS, VOL. X, NO. Y, MONTH YEAR 1 DVM: A Big Virtual Machine for Cloud Computing

Add to Reading List

Source URL: www.cse.ust.hk

Language: English - Date: 2014-11-17 13:28:46
45T echn o logy Ne w s  Storage Challenge: Where Will All That Big Data Go? Neal Leavitt

T echn o logy Ne w s Storage Challenge: Where Will All That Big Data Go? Neal Leavitt

Add to Reading List

Source URL: leavcom.com

Language: English - Date: 2013-08-28 08:13:03
46CHAPTER 1.7  Harnessing the Power of Big Data in Real Time through In-Memory Technology and Analytics

CHAPTER 1.7 Harnessing the Power of Big Data in Real Time through In-Memory Technology and Analytics

Add to Reading List

Source URL: www3.weforum.org

Language: English - Date: 2012-03-27 11:31:41
47Moderately Hard, Memory-bound Functions Mart´ın Abadi University of California at Santa Cruz Abstract A resource may be abused if its users incur little or no cost. For example, e-mail abuse is rampant because sending

Moderately Hard, Memory-bound Functions Mart´ın Abadi University of California at Santa Cruz Abstract A resource may be abused if its users incur little or no cost. For example, e-mail abuse is rampant because sending

Add to Reading List

Source URL: www.hashcash.org

Language: English - Date: 2005-01-15 19:23:53
48KVM and Big VMs KVM Forum 2012 Andrew Theurer IBM Linux Technology Center  Topics

KVM and Big VMs KVM Forum 2012 Andrew Theurer IBM Linux Technology Center Topics

Add to Reading List

Source URL: kvm.et.redhat.com

Language: English - Date: 2012-11-20 21:55:03
49Memory Association Machine: Growing Form from Context Benjamin David Robert Bogart   Thecla Schiphorst

Memory Association Machine: Growing Form from Context Benjamin David Robert Bogart Thecla Schiphorst

Add to Reading List

Source URL: puredata.info

Language: English - Date: 2012-02-22 09:40:24
50The odd kid on the block or: to boldly run ARM like no one did before Martin Husemann  Abstract Modern ARM SoCs offer bi-endian support: the CPU can switch between little and big endian mode. Similar to

The odd kid on the block or: to boldly run ARM like no one did before Martin Husemann Abstract Modern ARM SoCs offer bi-endian support: the CPU can switch between little and big endian mode. Similar to

Add to Reading List

Source URL: www.netbsd.org

Language: English - Date: 2015-03-17 05:18:30