Sciweavers

241 search results - page 47 / 49
» Towards Safe Model Transformation for Constraint-driven Mode...
Sort
View
ICDE
2008
IEEE
153views Database» more  ICDE 2008»
14 years 7 months ago
Mining Views: Database Views for Data Mining
We present a system towards the integration of data mining into relational databases. To this end, a relational database model is proposed, based on the so called virtual mining vi...
Élisa Fromont, Adriana Prado, Bart Goethals...
IMAGING
2000
13 years 7 months ago
Color Management within a Spectral Image Visualization Tool
Recent developments in spectral imaging are pointing toward a future where the demands on color management will require a richer infrastructure than that which is currently offere...
Mitchell R. Rosen, Mark D. Fairchild, Garrett M. J...
EUROCRYPT
2004
Springer
13 years 11 months ago
Positive Results and Techniques for Obfuscation
Informally, an obfuscator O is an efficient, probabilistic “compiler” that transforms a program P into a new program O(P) with the same functionality as P, but such that O(P)...
Ben Lynn, Manoj Prabhakaran, Amit Sahai
ECRTS
2007
IEEE
14 years 4 days ago
A Delay Composition Theorem for Real-Time Pipelines
Uniprocessor schedulability theory made great strides, in part, due to the simplicity of composing the delay of a job from the execution times of higher-priority jobs that preempt...
Praveen Jayachandran, Tarek F. Abdelzaher
SIGMOD
2009
ACM
175views Database» more  SIGMOD 2009»
14 years 6 months ago
QoX-driven ETL design: reducing the cost of ETL consulting engagements
As business intelligence becomes increasingly essential for organizations and as it evolves from strategic to operational, the complexity of Extract-Transform-Load (ETL) processes...
Alkis Simitsis, Kevin Wilkinson, Malú Caste...