Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,389,631 papers from all fields of science
Search
Sign In
Create Free Account
Auxiliary memory
Known as:
Auxiliary storage
, Secondary memory
, Storage device (computing)
Expand
Auxiliary memory, also known as auxiliary storage, secondary storage, secondary memory or external memory, is a non-volatile memory (does not lose…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
16 relations
Camera phone
Compressed suffix array
Computer data storage
Drum memory
Expand
Broader (1)
Computer memory
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
A Survey of Software Techniques for Using Non-Volatile Memories for Storage and Main Memory Systems
Sparsh Mittal
,
J. Vetter
IEEE Transactions on Parallel and Distributed…
2016
Corpus ID: 206771165
Non-volatile memory (NVM) devices, such as Flash, phase change RAM, spin transfer torque RAM, and resistive RAM, offer several…
Expand
Highly Cited
2012
Highly Cited
2012
Energy-Efficient Virtual Machine Replication and Placement in a Cloud Computing System
H. Goudarzi
,
Massoud Pedram
IEEE Fifth International Conference on Cloud…
2012
Corpus ID: 8960089
By utilizing Virtual Machines (VM) and doing server consolidation in a datacenter, a cloud provider can reduce the total energy…
Expand
Highly Cited
2009
Highly Cited
2009
HYDRAstor: A Scalable Secondary Storage
C. Dubnicki
,
Leszek Gryz
,
+6 authors
Michal Welnicki
USENIX Conference on File and Storage…
2009
Corpus ID: 5961935
HYDRAstor is a scalable, secondary storage solution aimed at the enterprise market. The system consists of a back-end…
Expand
Highly Cited
2005
Highly Cited
2005
A compact space decomposition for effective metric indexing
Edgar Chávez
,
G. Navarro
Pattern Recognition Letters
2005
Corpus ID: 5603095
Highly Cited
1996
Highly Cited
1996
Universality of a Reversible Two-Counter Machine
K. Morita
Theoretical Computer Science
1996
Corpus ID: 17861096
Highly Cited
1986
Highly Cited
1986
Voting with Witnesses: A Constistency Scheme for Replicated Files
Jehan-Francois Pâris
IEEE International Conference on Distributed…
1986
Corpus ID: 1481395
Voting schemes ensure the consistency of replicated files by disallowing all read and write requests that cannot collect an…
Expand
Highly Cited
1979
Highly Cited
1979
Optimization of query evaluation algorithms
S. B. Yao
ACM Transactions on Database Systems
1979
Corpus ID: 5020228
A model of database storage and access is presented. The model represents many evaluation algorithms as special cases, and helps…
Expand
Highly Cited
1978
Highly Cited
1978
An Efficient Integer Programming Algorithm with Network Cuts for Solving Resource-Constrained Scheduling Problems
F. B. Talbot
,
J. Patterson
1978
Corpus ID: 62697179
In this paper we describe an integer programming algorithm for allocating limited resources to competing activities jobs, tasks…
Expand
Highly Cited
1977
Highly Cited
1977
EXPRESS: a data EXtraction, Processing, and Restructuring System
N. C. Shu
,
Barron C. Housel
,
R. W. Taylor
,
Sakti P. Ghosh
,
V. Lum
TODS
1977
Corpus ID: 18436141
EXPRESS is an experimental prototype data translation system which can access a wide variety of data and restructure it for new…
Expand
Highly Cited
1971
Highly Cited
1971
The Sparse Tableau Approach to Network Analysis and Design
G. Hachtel
,
R. Brayton
,
F. Gustavson
1971
Corpus ID: 6356757
The tableau approach to automated network design optimization via implicit, variable order, variable time-step integration, and…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE