They involve exploiting properties of data structures and access patterns to reduce amount of I/O.
Derived primarily from profiling studies of QBIC.