<--- Back to Details
First PageDocument Content
Mathematics / Computing / Data management / Relational model / Parallel computing / Distributed computing architecture / MapReduce / Relation / Partition / Tuple / Cuboid
Date: 2016-08-04 07:02:00
Mathematics
Computing
Data management
Relational model
Parallel computing
Distributed computing architecture
MapReduce
Relation
Partition
Tuple
Cuboid

An Efficient MapReduce Cube Algorithm for Varied Data Distributions Tova Milo Eyal Altshuler

Add to Reading List

Source URL: www.cs.tau.ac.il

Download Document from Source Website

File Size: 2,65 MB

Share Document on Facebook

Similar Documents

A Class of Greedy Algorithms And Its Relation to Greedoids Srinivas Nedunuri Dept. of Computer S
ien
es University of Texas at Austin

A Class of Greedy Algorithms And Its Relation to Greedoids Srinivas Nedunuri Dept. of Computer S ien es University of Texas at Austin

DocID: 1xVbs - View Document

Following an information request from HSBC for the Common Reporting Standard (

Following an information request from HSBC for the Common Reporting Standard ("CRS") in relation to an account holder ("Account Holder"), if you sign a CRS self-certification form and/or provide the requested information

DocID: 1xUYV - View Document

Context-Aware Text Representation for Social Relation Aided Sentiment Analysis Minh Luan Nguyen Institute for Infocomm Research Singapore

Context-Aware Text Representation for Social Relation Aided Sentiment Analysis Minh Luan Nguyen Institute for Infocomm Research Singapore

DocID: 1xUUb - View Document

A Machine learning Filter for Relation Extraction Kevin Lange Di Cesare, Michel Gagnon Polytechnique Montréal Montreal, Canada

A Machine learning Filter for Relation Extraction Kevin Lange Di Cesare, Michel Gagnon Polytechnique Montréal Montreal, Canada

DocID: 1xUt7 - View Document

Semantic Security Invariance under Variant Computational Assumptions Eftychios Theodorakis? and John C. Mitchell?? Abstract. A game-based cryptographic proof is a relation that establishes equivalence between probabilist

Semantic Security Invariance under Variant Computational Assumptions Eftychios Theodorakis? and John C. Mitchell?? Abstract. A game-based cryptographic proof is a relation that establishes equivalence between probabilist

DocID: 1xTmW - View Document