Search the dblp DataBase
Zvi M. Kedem :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Abraham Silberschatz , Zvi M. Kedem Consistency in Hierarchical Database Systems. [Citation Graph (43, 0)][DBLP ] J. ACM, 1980, v:27, n:1, pp:72-80 [Journal ] Zvi M. Kedem , Abraham Silberschatz Locking Protocols: From Exclusive to Shared Locks [Citation Graph (12, 0)][DBLP ] J. ACM, 1983, v:30, n:4, pp:787-804 [Journal ] Zvi M. Kedem , Abraham Silberschatz Controlling Concurrency Using Locking Protocols (Preliminary Report) [Citation Graph (10, 0)][DBLP ] FOCS, 1979, pp:274-285 [Conf ] Zvi M. Kedem , Abraham Silberschatz Non-Two-Phase Locking Protocols with Shared and Exclusive Locks. [Citation Graph (10, 11)][DBLP ] VLDB, 1980, pp:309-317 [Conf ] Abraham Silberschatz , Zvi M. Kedem A Family of Locking Protocols for Database Systems that Are Modeled by Directed Graphs. [Citation Graph (10, 0)][DBLP ] IEEE Trans. Software Eng., 1982, v:8, n:6, pp:558-562 [Journal ] Donald S. Fussell , Zvi M. Kedem , Abraham Silberschatz A Theory of Correct Locking Protocols for Database Systems [Citation Graph (5, 9)][DBLP ] VLDB, 1981, pp:112-124 [Conf ] Dao-I Lin , Zvi M. Kedem Pincer Search: A New Algorithm for Discovering the Maximum Frequent Set. [Citation Graph (3, 15)][DBLP ] EDBT, 1998, pp:105-119 [Conf ] Donald S. Fussell , Zvi M. Kedem , Abraham Silberschatz Deadlock Removal Using Partial Rollback in Database Systems. [Citation Graph (3, 7)][DBLP ] SIGMOD Conference, 1981, pp:65-73 [Conf ] Zvi M. Kedem , Abraham Silberschatz A Characterization of Database Graphs Admitting a Simple Locking Protocol. [Citation Graph (3, 0)][DBLP ] Acta Inf., 1981, v:16, n:, pp:1-13 [Journal ] C. Mohan , Donald S. Fussell , Zvi M. Kedem , Abraham Silberschatz Lock Conversion in Non-Two-Phase Locking Protocols. [Citation Graph (3, 0)][DBLP ] IEEE Trans. Software Eng., 1985, v:11, n:1, pp:15-22 [Journal ] Partha Dasgupta , Zvi M. Kedem A Non-Two-Phase Locking Protocol for Concurrency Control in General Databases. [Citation Graph (2, 7)][DBLP ] VLDB, 1983, pp:92-94 [Conf ] Zvi M. Kedem , C. Mohan , Abraham Silberschatz An Efficient Deadlock Removal Scheme for Non-Two-Phase Locking Protocols. [Citation Graph (1, 13)][DBLP ] VLDB, 1982, pp:91-97 [Conf ] Henry Fuchs , Zvi M. Kedem The "highly intelligent" tablet as an efficient pointing device for interactive graphics (Preliminary Report). [Citation Graph (0, 0)][DBLP ] ACM Annual Conference (2), 1978, pp:765-769 [Conf ] Yonatan Aumann , Zvi M. Kedem , Krishna V. Palem , Michael O. Rabin Highly Efficient Asynchronous Execution of Large-Grained Parallel Programs [Citation Graph (0, 0)][DBLP ] FOCS, 1993, pp:271-280 [Conf ] Zvi M. Kedem Optimal Allocation of Computational Resources in VLSI [Citation Graph (0, 0)][DBLP ] FOCS, 1982, pp:379-385 [Conf ] Zvi M. Kedem , Alessandro Zorat On Relations Between Input and Communication/Computation in VLSI (Preliminary Report) [Citation Graph (0, 0)][DBLP ] FOCS, 1981, pp:37-44 [Conf ] Arash Baratloo , Partha Dasgupta , Vijay Karamcheti , Zvi M. Kedem Metacomputing with MILAN. [Citation Graph (0, 0)][DBLP ] Heterogeneous Computing Workshop, 1999, pp:169-183 [Conf ] Arash Baratloo , Partha Dasgupta , Zvi M. Kedem CALYPSO: A Novel Software System for Fault-Tolerant Parallel Processing on Distributed Platforms. [Citation Graph (0, 0)][DBLP ] HPDC, 1995, pp:122-129 [Conf ] Partha Dasgupta , Zvi M. Kedem , Michael O. Rabin Parallel Processing on Networks of Workstations: A Fault-Tolerant, High Performance Approach. [Citation Graph (0, 0)][DBLP ] ICDCS, 1995, pp:467-474 [Conf ] Shih-Chen Huang , Zvi M. Kedem Supporting a Flexible Parallel Programming Model on a Network of Workstations. [Citation Graph (0, 0)][DBLP ] ICDCS, 1996, pp:75-82 [Conf ] Alexander Tuzhilin , Zvi M. Kedem Querying and Controlling the Future Behaviour of Complex Objects. [Citation Graph (0, 21)][DBLP ] ICDE, 1989, pp:434-442 [Conf ] PeiZong Lee , Zvi M. Kedem Mapping Nested Loop Algorithms into Multi-Dimensional Systolic Arrays. [Citation Graph (0, 0)][DBLP ] ICPP (3), 1989, pp:206-210 [Conf ] Xin Yu , Zvi M. Kedem A distributed adaptive cache update algorithm for the dynamic source routing protocol. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2005, pp:730-739 [Conf ] Arash Baratloo , Ayal Itzkovitz , Zvi M. Kedem , Yuanyuan Zhao Mechanisms for Just-in-Time Allocation of Resources to Adaptive Parallel Programs. [Citation Graph (0, 0)][DBLP ] IPPS/SPDP, 1999, pp:506-512 [Conf ] Fangzhe Chang , Vijay Karamcheti , Zvi M. Kedem Exploiting Application Tunability for Efficient, Predictable Parallel Resource Management. [Citation Graph (0, 0)][DBLP ] IPPS/SPDP, 1999, pp:749-0 [Conf ] Partha Dasgupta , Vijay Karamcheti , Zvi M. Kedem Transparent Distribution Middleware for General Purpose Computations. [Citation Graph (0, 0)][DBLP ] PDPTA, 1999, pp:417-423 [Conf ] Zvi M. Kedem , Alexander Tuzhilin Relational Database Behavior: Utilizing Relational Discrete Event Systems and Models. [Citation Graph (0, 9)][DBLP ] PODS, 1989, pp:336-346 [Conf ] PeiZong Lee , Zvi M. Kedem On high-speed computing with a programmable linear array. [Citation Graph (0, 0)][DBLP ] SC, 1988, pp:425-432 [Conf ] Zvi M. Kedem , Gad M. Landau , Krishna V. Palem Optimal Parallel Suffix-Prefix Matching Algorithm and Applications. [Citation Graph (0, 0)][DBLP ] SPAA, 1989, pp:388-398 [Conf ] Zvi M. Kedem Combining Dimensionality and Rate of Growth Arguments for Establishing Lower Bounds on the Number of Multiplications [Citation Graph (0, 0)][DBLP ] STOC, 1974, pp:334-341 [Conf ] Zvi M. Kedem , Krishna V. Palem , Michael O. Rabin , A. Raghunathan Efficient Program Transformations for Resilient Parallel Computation via Randomization (Preliminary Version) [Citation Graph (0, 0)][DBLP ] STOC, 1992, pp:306-317 [Conf ] Zvi M. Kedem , Krishna V. Palem , A. Raghunathan , Paul G. Spirakis Combining Tentative and Definite Executions for Very Fast Dependable Parallel Computing (Extended Abstract) [Citation Graph (0, 0)][DBLP ] STOC, 1991, pp:381-390 [Conf ] Zvi M. Kedem , Krishna V. Palem , Paul G. Spirakis Efficient Robust Parallel Computations (Extended Abstract) [Citation Graph (0, 0)][DBLP ] STOC, 1990, pp:138-148 [Conf ] Zvi M. Kedem , Krishna V. Palem , Grammati E. Pantziou , Paul G. Spirakis , Christos D. Zaroliagis Fast Parallel Algorithms for Coloring Random Graphs. [Citation Graph (0, 0)][DBLP ] WG, 1991, pp:135-147 [Conf ] Alexander Tuzhilin , Zvi M. Kedem Modeling Data-Intensive Reactive Systems with Relational Transition Systems. [Citation Graph (0, 0)][DBLP ] Acta Inf., 1996, v:33, n:3, pp:203-231 [Journal ] Henry Fuchs , Zvi M. Kedem , Samuel P. Uselton Optimal Surface Reconstruction from Planar Contours. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1977, v:20, n:10, pp:693-702 [Journal ] Arash Baratloo , Mehmet Karaul , Holger Karl , Zvi M. Kedem An infrastructure for network computing with Java applets. [Citation Graph (0, 0)][DBLP ] Concurrency - Practice and Experience, 1998, v:10, n:11-13, pp:1029-1041 [Journal ] Alain Fournier , Zvi M. Kedem Comments on the All Nearest-Neighbor Problem for Convex Polygons. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1979, v:9, n:3, pp:105-107 [Journal ] Zvi M. Kedem Combining Dimensionality and Rate of Growth Arguments for Establishing Lower Bounds on the Number of Multiplications and Divisions. [Citation Graph (0, 0)][DBLP ] J. ACM, 1979, v:26, n:3, pp:582-601 [Journal ] Fangzhe Chang , Vijay Karamcheti , Zvi M. Kedem Exploiting Application Tunability for Efficient, Predictable Resource Management in Parallel and Distributed Systems. [Citation Graph (0, 0)][DBLP ] J. Parallel Distrib. Comput., 2000, v:60, n:11, pp:1420-1445 [Journal ] Zvi M. Kedem Optimal Allocation of Area for Single-Chip Computations. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1985, v:14, n:3, pp:730-742 [Journal ] Zvi M. Kedem , Gad M. Landau , Krishna V. Palem Parallel Suffix-Prefix-Matching Algorithm and Applications. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1996, v:25, n:5, pp:998-1023 [Journal ] David G. Kirkpatrick , Zvi M. Kedem Adequate Requirements for Rational Functions. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1977, v:6, n:1, pp:188-199 [Journal ] PeiZong Lee , Zvi M. Kedem Synthesizing Linear Array Algorithms from Nested For Loop Algorithms. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1988, v:37, n:12, pp:1578-1598 [Journal ] Zvi M. Kedem , Krishna V. Palem Optimal Parallel Algorithms for Forest and Term Matching. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 1992, v:93, n:2, pp:245-264 [Journal ] Dao-I Lin , Zvi M. Kedem Pincer-Search: An Efficient Algorithm for Discovering the Maximum Frequent Set. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2002, v:14, n:3, pp:553-566 [Journal ] Partha Dasgupta , Zvi M. Kedem The Five Color Concurrency Control Protocol: Non-Two-Phase Locking in General Databases. [Citation Graph (0, 26)][DBLP ] ACM Trans. Database Syst., 1990, v:15, n:2, pp:281-307 [Journal ] PeiZong Lee , Zvi M. Kedem Automatic data and computation decomposition on distributed memory parallel computers. [Citation Graph (0, 0)][DBLP ] ACM Trans. Program. Lang. Syst., 2002, v:24, n:1, pp:1-50 [Journal ] PeiZong Lee , Zvi M. Kedem Mapping Nested Loop Algorithms into Multidimensional Systolic Arrays. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Parallel Distrib. Syst., 1990, v:1, n:1, pp:64-76 [Journal ] Arash Baratloo , Mehmet Karaul , Zvi M. Kedem , P. Wijckoff Charlotte: Metacomputing on the Web. [Citation Graph (0, 0)][DBLP ] Future Generation Comp. Syst., 1999, v:15, n:5-6, pp:559-570 [Journal ] Sustaining moore's law in embedded computing through probabilistic and approximate design: retrospects and prospects. [Citation Graph (, )][DBLP ] Detecting malicious network traffic using inverse distributions of packet contents. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.458secs