The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Zvi M. Kedem: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Abraham Silberschatz, Zvi M. Kedem
    Consistency in Hierarchical Database Systems. [Citation Graph (43, 0)][DBLP]
    J. ACM, 1980, v:27, n:1, pp:72-80 [Journal]
  2. Zvi M. Kedem, Abraham Silberschatz
    Locking Protocols: From Exclusive to Shared Locks [Citation Graph (12, 0)][DBLP]
    J. ACM, 1983, v:30, n:4, pp:787-804 [Journal]
  3. Zvi M. Kedem, Abraham Silberschatz
    Controlling Concurrency Using Locking Protocols (Preliminary Report) [Citation Graph (10, 0)][DBLP]
    FOCS, 1979, pp:274-285 [Conf]
  4. Zvi M. Kedem, Abraham Silberschatz
    Non-Two-Phase Locking Protocols with Shared and Exclusive Locks. [Citation Graph (10, 11)][DBLP]
    VLDB, 1980, pp:309-317 [Conf]
  5. Abraham Silberschatz, Zvi M. Kedem
    A Family of Locking Protocols for Database Systems that Are Modeled by Directed Graphs. [Citation Graph (10, 0)][DBLP]
    IEEE Trans. Software Eng., 1982, v:8, n:6, pp:558-562 [Journal]
  6. Donald S. Fussell, Zvi M. Kedem, Abraham Silberschatz
    A Theory of Correct Locking Protocols for Database Systems [Citation Graph (5, 9)][DBLP]
    VLDB, 1981, pp:112-124 [Conf]
  7. Dao-I Lin, Zvi M. Kedem
    Pincer Search: A New Algorithm for Discovering the Maximum Frequent Set. [Citation Graph (3, 15)][DBLP]
    EDBT, 1998, pp:105-119 [Conf]
  8. Donald S. Fussell, Zvi M. Kedem, Abraham Silberschatz
    Deadlock Removal Using Partial Rollback in Database Systems. [Citation Graph (3, 7)][DBLP]
    SIGMOD Conference, 1981, pp:65-73 [Conf]
  9. Zvi M. Kedem, Abraham Silberschatz
    A Characterization of Database Graphs Admitting a Simple Locking Protocol. [Citation Graph (3, 0)][DBLP]
    Acta Inf., 1981, v:16, n:, pp:1-13 [Journal]
  10. C. Mohan, Donald S. Fussell, Zvi M. Kedem, Abraham Silberschatz
    Lock Conversion in Non-Two-Phase Locking Protocols. [Citation Graph (3, 0)][DBLP]
    IEEE Trans. Software Eng., 1985, v:11, n:1, pp:15-22 [Journal]
  11. Partha Dasgupta, Zvi M. Kedem
    A Non-Two-Phase Locking Protocol for Concurrency Control in General Databases. [Citation Graph (2, 7)][DBLP]
    VLDB, 1983, pp:92-94 [Conf]
  12. Zvi M. Kedem, C. Mohan, Abraham Silberschatz
    An Efficient Deadlock Removal Scheme for Non-Two-Phase Locking Protocols. [Citation Graph (1, 13)][DBLP]
    VLDB, 1982, pp:91-97 [Conf]
  13. Henry Fuchs, Zvi M. Kedem
    The "highly intelligent" tablet as an efficient pointing device for interactive graphics (Preliminary Report). [Citation Graph (0, 0)][DBLP]
    ACM Annual Conference (2), 1978, pp:765-769 [Conf]
  14. Yonatan Aumann, Zvi M. Kedem, Krishna V. Palem, Michael O. Rabin
    Highly Efficient Asynchronous Execution of Large-Grained Parallel Programs [Citation Graph (0, 0)][DBLP]
    FOCS, 1993, pp:271-280 [Conf]
  15. Zvi M. Kedem
    Optimal Allocation of Computational Resources in VLSI [Citation Graph (0, 0)][DBLP]
    FOCS, 1982, pp:379-385 [Conf]
  16. Zvi M. Kedem, Alessandro Zorat
    On Relations Between Input and Communication/Computation in VLSI (Preliminary Report) [Citation Graph (0, 0)][DBLP]
    FOCS, 1981, pp:37-44 [Conf]
  17. Arash Baratloo, Partha Dasgupta, Vijay Karamcheti, Zvi M. Kedem
    Metacomputing with MILAN. [Citation Graph (0, 0)][DBLP]
    Heterogeneous Computing Workshop, 1999, pp:169-183 [Conf]
  18. Arash Baratloo, Partha Dasgupta, Zvi M. Kedem
    CALYPSO: A Novel Software System for Fault-Tolerant Parallel Processing on Distributed Platforms. [Citation Graph (0, 0)][DBLP]
    HPDC, 1995, pp:122-129 [Conf]
  19. Partha Dasgupta, Zvi M. Kedem, Michael O. Rabin
    Parallel Processing on Networks of Workstations: A Fault-Tolerant, High Performance Approach. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1995, pp:467-474 [Conf]
  20. Shih-Chen Huang, Zvi M. Kedem
    Supporting a Flexible Parallel Programming Model on a Network of Workstations. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1996, pp:75-82 [Conf]
  21. Alexander Tuzhilin, Zvi M. Kedem
    Querying and Controlling the Future Behaviour of Complex Objects. [Citation Graph (0, 21)][DBLP]
    ICDE, 1989, pp:434-442 [Conf]
  22. PeiZong Lee, Zvi M. Kedem
    Mapping Nested Loop Algorithms into Multi-Dimensional Systolic Arrays. [Citation Graph (0, 0)][DBLP]
    ICPP (3), 1989, pp:206-210 [Conf]
  23. Xin Yu, Zvi M. Kedem
    A distributed adaptive cache update algorithm for the dynamic source routing protocol. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2005, pp:730-739 [Conf]
  24. Arash Baratloo, Ayal Itzkovitz, Zvi M. Kedem, Yuanyuan Zhao
    Mechanisms for Just-in-Time Allocation of Resources to Adaptive Parallel Programs. [Citation Graph (0, 0)][DBLP]
    IPPS/SPDP, 1999, pp:506-512 [Conf]
  25. Fangzhe Chang, Vijay Karamcheti, Zvi M. Kedem
    Exploiting Application Tunability for Efficient, Predictable Parallel Resource Management. [Citation Graph (0, 0)][DBLP]
    IPPS/SPDP, 1999, pp:749-0 [Conf]
  26. Partha Dasgupta, Vijay Karamcheti, Zvi M. Kedem
    Transparent Distribution Middleware for General Purpose Computations. [Citation Graph (0, 0)][DBLP]
    PDPTA, 1999, pp:417-423 [Conf]
  27. Zvi M. Kedem, Alexander Tuzhilin
    Relational Database Behavior: Utilizing Relational Discrete Event Systems and Models. [Citation Graph (0, 9)][DBLP]
    PODS, 1989, pp:336-346 [Conf]
  28. PeiZong Lee, Zvi M. Kedem
    On high-speed computing with a programmable linear array. [Citation Graph (0, 0)][DBLP]
    SC, 1988, pp:425-432 [Conf]
  29. Zvi M. Kedem, Gad M. Landau, Krishna V. Palem
    Optimal Parallel Suffix-Prefix Matching Algorithm and Applications. [Citation Graph (0, 0)][DBLP]
    SPAA, 1989, pp:388-398 [Conf]
  30. Zvi M. Kedem
    Combining Dimensionality and Rate of Growth Arguments for Establishing Lower Bounds on the Number of Multiplications [Citation Graph (0, 0)][DBLP]
    STOC, 1974, pp:334-341 [Conf]
  31. Zvi M. Kedem, Krishna V. Palem, Michael O. Rabin, A. Raghunathan
    Efficient Program Transformations for Resilient Parallel Computation via Randomization (Preliminary Version) [Citation Graph (0, 0)][DBLP]
    STOC, 1992, pp:306-317 [Conf]
  32. Zvi M. Kedem, Krishna V. Palem, A. Raghunathan, Paul G. Spirakis
    Combining Tentative and Definite Executions for Very Fast Dependable Parallel Computing (Extended Abstract) [Citation Graph (0, 0)][DBLP]
    STOC, 1991, pp:381-390 [Conf]
  33. Zvi M. Kedem, Krishna V. Palem, Paul G. Spirakis
    Efficient Robust Parallel Computations (Extended Abstract) [Citation Graph (0, 0)][DBLP]
    STOC, 1990, pp:138-148 [Conf]
  34. Zvi M. Kedem, Krishna V. Palem, Grammati E. Pantziou, Paul G. Spirakis, Christos D. Zaroliagis
    Fast Parallel Algorithms for Coloring Random Graphs. [Citation Graph (0, 0)][DBLP]
    WG, 1991, pp:135-147 [Conf]
  35. Alexander Tuzhilin, Zvi M. Kedem
    Modeling Data-Intensive Reactive Systems with Relational Transition Systems. [Citation Graph (0, 0)][DBLP]
    Acta Inf., 1996, v:33, n:3, pp:203-231 [Journal]
  36. Henry Fuchs, Zvi M. Kedem, Samuel P. Uselton
    Optimal Surface Reconstruction from Planar Contours. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1977, v:20, n:10, pp:693-702 [Journal]
  37. Arash Baratloo, Mehmet Karaul, Holger Karl, Zvi M. Kedem
    An infrastructure for network computing with Java applets. [Citation Graph (0, 0)][DBLP]
    Concurrency - Practice and Experience, 1998, v:10, n:11-13, pp:1029-1041 [Journal]
  38. Alain Fournier, Zvi M. Kedem
    Comments on the All Nearest-Neighbor Problem for Convex Polygons. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1979, v:9, n:3, pp:105-107 [Journal]
  39. Zvi M. Kedem
    Combining Dimensionality and Rate of Growth Arguments for Establishing Lower Bounds on the Number of Multiplications and Divisions. [Citation Graph (0, 0)][DBLP]
    J. ACM, 1979, v:26, n:3, pp:582-601 [Journal]
  40. Fangzhe Chang, Vijay Karamcheti, Zvi M. Kedem
    Exploiting Application Tunability for Efficient, Predictable Resource Management in Parallel and Distributed Systems. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2000, v:60, n:11, pp:1420-1445 [Journal]
  41. Zvi M. Kedem
    Optimal Allocation of Area for Single-Chip Computations. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1985, v:14, n:3, pp:730-742 [Journal]
  42. Zvi M. Kedem, Gad M. Landau, Krishna V. Palem
    Parallel Suffix-Prefix-Matching Algorithm and Applications. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1996, v:25, n:5, pp:998-1023 [Journal]
  43. David G. Kirkpatrick, Zvi M. Kedem
    Adequate Requirements for Rational Functions. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1977, v:6, n:1, pp:188-199 [Journal]
  44. PeiZong Lee, Zvi M. Kedem
    Synthesizing Linear Array Algorithms from Nested For Loop Algorithms. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1988, v:37, n:12, pp:1578-1598 [Journal]
  45. Zvi M. Kedem, Krishna V. Palem
    Optimal Parallel Algorithms for Forest and Term Matching. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1992, v:93, n:2, pp:245-264 [Journal]
  46. Dao-I Lin, Zvi M. Kedem
    Pincer-Search: An Efficient Algorithm for Discovering the Maximum Frequent Set. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2002, v:14, n:3, pp:553-566 [Journal]
  47. Partha Dasgupta, Zvi M. Kedem
    The Five Color Concurrency Control Protocol: Non-Two-Phase Locking in General Databases. [Citation Graph (0, 26)][DBLP]
    ACM Trans. Database Syst., 1990, v:15, n:2, pp:281-307 [Journal]
  48. PeiZong Lee, Zvi M. Kedem
    Automatic data and computation decomposition on distributed memory parallel computers. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 2002, v:24, n:1, pp:1-50 [Journal]
  49. PeiZong Lee, Zvi M. Kedem
    Mapping Nested Loop Algorithms into Multidimensional Systolic Arrays. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 1990, v:1, n:1, pp:64-76 [Journal]
  50. Arash Baratloo, Mehmet Karaul, Zvi M. Kedem, P. Wijckoff
    Charlotte: Metacomputing on the Web. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 1999, v:15, n:5-6, pp:559-570 [Journal]

  51. Sustaining moore's law in embedded computing through probabilistic and approximate design: retrospects and prospects. [Citation Graph (, )][DBLP]


  52. Detecting malicious network traffic using inverse distributions of packet contents. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.458secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002