Accumulation of abundant data from different sources of the society but a little knowledge situation has lead to Knowledge Discovery from Databases or Data Mining. Data Mining techniques use the existing data and retrieve the useful knowledge from it which is not directly visible in the original data. As Data Mining algorithms deal with huge data, the primary concerns are how to store the data in the main memory at run time and how to improve the run time performance. Sequential algorithms cannot provide scalability, in terms of the data dimension, size, or runtime performance, for such large databases. Because the data sizes are increasing to a larger quantity, we must use high-performance parallel and distributed computing to get the adva...
Many-Task Computing (MTC) is a common scenario for multiple parallel systems, such as cluster, grids...
The efficient mapping of program parallelism to multi-core processors is highly dependent on the und...
The requirement of information security on network has become more and more important. Cryptography ...
The main goal of data mining is to discover relevant information on digital content. The Apriori alg...
Frequent-itemset mining is an important part of data mining. It is a computational and memory intens...
We assess gains from parallel computation on Backlight supercomputer. The information transfers are ...
High performance computing can be associated with a method to improve the performance of an applica...
The problem of mining frequent sequential patterns (FSPs) has attracted a great deal of research att...
The focus of this thesis is on investigating efficient database algorithmsand methods for modern mul...
International audienceThis paper introduces a research about parallelization of an entire applicatio...
Big Data has an increasing impact on the use of bioinformatics software. One way to deal with this c...
Abstract: The developments of multi-core technology have induced big challenges to software structur...
In this paper we propose two new parallel formulations of the Apriori algorithm that is used for com...
A multi-core processor is a single computing unit with two or more processors (“cores”). These cores...
Recently major processor manufacturers have announced a dramatic shift in their paradigm to increas...
Many-Task Computing (MTC) is a common scenario for multiple parallel systems, such as cluster, grids...
The efficient mapping of program parallelism to multi-core processors is highly dependent on the und...
The requirement of information security on network has become more and more important. Cryptography ...
The main goal of data mining is to discover relevant information on digital content. The Apriori alg...
Frequent-itemset mining is an important part of data mining. It is a computational and memory intens...
We assess gains from parallel computation on Backlight supercomputer. The information transfers are ...
High performance computing can be associated with a method to improve the performance of an applica...
The problem of mining frequent sequential patterns (FSPs) has attracted a great deal of research att...
The focus of this thesis is on investigating efficient database algorithmsand methods for modern mul...
International audienceThis paper introduces a research about parallelization of an entire applicatio...
Big Data has an increasing impact on the use of bioinformatics software. One way to deal with this c...
Abstract: The developments of multi-core technology have induced big challenges to software structur...
In this paper we propose two new parallel formulations of the Apriori algorithm that is used for com...
A multi-core processor is a single computing unit with two or more processors (“cores”). These cores...
Recently major processor manufacturers have announced a dramatic shift in their paradigm to increas...
Many-Task Computing (MTC) is a common scenario for multiple parallel systems, such as cluster, grids...
The efficient mapping of program parallelism to multi-core processors is highly dependent on the und...
The requirement of information security on network has become more and more important. Cryptography ...