【摘 要】
:
Modern search engines process thousands of queries per second, searching through billions of web documents.With data sizes and query loads growing at an exp
【机 构】
:
Nankai-Baidu Joint Lab,College of Computer and Control Engineering,Nankai University,Tianjin 300071,
【出 处】
:
2015全国理论计算机科学学术年会
论文部分内容阅读
Modern search engines process thousands of queries per second, searching through billions of web documents.With data sizes and query loads growing at an exponential rate, significant performance challenges arise.To achieve fast query processing, search engines generally store their posting lists in main memory in a compressed format.The integer decoding of posting lists must be performed on the fly for every uncached query and consumes considerable CPU time.Therefore, efficient integer decoding algorithms are essential for search engine performance, and have been studied extensively in the literature.Recent research work discovered that byte-aligned and frame-based codecs are particularly amenable to parallel decoding with powerful SSE instructions in modern processors.In this paper, we apply these instructions to bit-and word-aligned codecs and, in particular, we exploit the wider bit width and more powerful instructions of Intel AVX2 to further improve the decoding speed.Our experiments on the TREC GOV2 collection demonstrate significant performance gains from applying the new Intel AVX2 instructions to decoding posting lists.
其他文献
随着电子商务和金融软件应用日益广泛,提高这类软件系统的可靠性和安全性就显得特别重要。虽然能够提高这类软件可靠性的事务处理技术早在数据库管理系统中普遍使用,近几
为了降低图像轮廓检测中纹理对检测结果的影响,提出一种基于双尺度高斯核方向导数滤波器的图像轮廓检测算法。结合大小两个尺度高斯核方向导数滤波器构造图像的边缘强度映
Kidney exchange programs have been established in several countries to organize kidney exchanges between incompatible patient-donor pairs.The core of these
FDTD算法是电磁场领域使用非常广泛的数值计算方法,该方法具有很好的精度与灵活性,已成为求解各种电磁场问题的有力的工具。半导体技术的快速发展使得CPU的计算性能有了
In this paper, a novel approach for initializing clustering centers of K-Means algorithm is presented.This method is based on the variance of dimension, whi
OAuth 2.0协议为新型开放授权协议,主要解决用户账号关联和资源共享问题.但其弱安全性导致各网络公司海量用户信息泄露,且OAuth 2.0传输数据采用的https通道效率低下,成为黑
The required time to indentify the motifs in biological networks will be sharply increased with increase of the scale of the original network or the size of
Herd behavior is a phenomenon that often appears in the stock market.It is caused by the irrational imitation of investors and is expressed as major investo
Real-time systems are usually associated with strict performance requirements, especially in safetycritical domains.The bottleneck of performance can be fou
在网络视频和实时通信应用中需要研究带长度约束的K端网络可靠性分析问题,即任意两端点之间在给定时间延迟D约束内的K端网络可靠性。论文对带长度约束的K端网络可靠性问