Publication | Open Access
Detecting redundant accesses to array data
47
Citations
10
References
1991
Year
Unknown Venue
EngineeringDetecting RedundantData DeduplicationSoftware AnalysisHardware SecurityArray ComputingData ScienceAccess MethodComputing SystemsData ManagementComputer EngineeringData PrivacyNetworked Computer SystemsIllinois CenterComputer ScienceData-intensive ComputingData SecurityCryptographyTheory Of ComputingData AccessAlert PreferencesRedundant Accesses
Article Free Access Share on Detecting redundant accesses to array data Authors: Elana D. Granston Center for Supercomputing Research and Development, University of Illinois at Urbana-Champaign, Urbana, Illinois Center for Supercomputing Research and Development, University of Illinois at Urbana-Champaign, Urbana, IllinoisView Profile , Alexander V. Veidenbaum Center for Supercomputing Research and Development, University of Illinois at Urbana-Champaign, Urbana, Illinois Center for Supercomputing Research and Development, University of Illinois at Urbana-Champaign, Urbana, IllinoisView Profile Authors Info & Claims Supercomputing '91: Proceedings of the 1991 ACM/IEEE conference on SupercomputingAugust 1991Pages 854–865https://doi.org/10.1145/125826.126714Published:01 August 1991Publication History 50citation202DownloadsMetricsTotal Citations50Total Downloads202Last 12 Months16Last 6 weeks3 Get Citation AlertsNew Citation Alert added!This alert has been successfully added and will be sent to:You will be notified whenever a record that you have chosen has been cited.To manage your alert preferences, click on the button below.Manage my AlertsNew Citation Alert!Please log in to your account Save to BinderSave to BinderCreate a New BinderNameCancelCreateExport CitationPublisher SiteeReaderPDF
| Year | Citations | |
|---|---|---|
Page 1
Page 1