Sciweavers

473 search results - page 47 / 95
» Computing excluded minors
Sort
View
ICDT
2007
ACM
105views Database» more  ICDT 2007»
15 years 6 months ago
Optimization of Query Plans in the presence of Access Limitations
We consider the problem of querying data sources that have limited capabilities and can thus only be accessed by complying with certain binding patterns for their attributes. This ...
Andrea Calì, Diego Calvanese, Davide Martin...
92
Voted
CCECE
2006
IEEE
15 years 6 months ago
Blood Impedance Characterization from Pulsatile Measurements
This paper describes an in vivo measurement technique to calculate dielectric properties of blood excluding the contributions from surrounding tissues, based on analysis of the pu...
Tao Dai, Andy Adler
ADAEUROPE
2005
Springer
15 years 6 months ago
GNAT Pro for On-board Mission-Critical Space Applications
This paper describes the design and implementation of GNAT Pro for ERC32, a flexible cross-development environment supporting the Ravenscar tasking model on top of bare ERC32 comp...
José F. Ruiz
PDP
2002
IEEE
15 years 5 months ago
A Parametrized Algorithm that Implements Sequential, Causal, and Cache Memory Consistency
In this paper we present an algorithm that can be used to implement sequential, causal, or cache consistency in distributed shared memory (DSM) systems. For this purpose it has a ...
Ernesto Jiménez, Antonio Fernández, ...
102
Voted
ENC
2004
IEEE
15 years 4 months ago
Continuous Mode Changes in Mechatronic Systems
This paper deals with the problem of controlling highly dynamic mechatronic systems. Such systems may work in several different operation modes, or even underlie continuous mode c...
Klaus Ecker, Andrei Tchernykh, Frank Drews, Silke ...