Timo Lilja

  • Citations Per Year
Learn More
We consider online bulk-delete operations on a large database table organized as a primary (sparse) B<sup>+</sup>-tree index on a multi-attribute key. Using the natural range partitions induced by prefixes of the key, we define a multi-granular key-range locking protocol in which a bulk operation locks a small number of logical fragments of the table(More)
At SSH Communications Security, we've employed functional programming for a long time in some of our projects. Over the years, we've shipped a number of products written mostly in Scheme, and are about to ship some software which is in part written in Standard ML. We have also written several pieces of software for internal use in Haskell, Standard ML,(More)
of Licentiate Thesis Author Timo Lilja Title of Thesis Fine-grained Energy Profiling in Mobile Devices Abstract Mobile phones have several use cases such as making a phone call, sending an SMS, browsing the Internet, or playing a game. Mobile phones are also equipped with a wide variety of hardware allowing these activities. The overall energy consumption(More)
  • 1