Sciweavers

5241 search results - page 716 / 1049
» Embedded Programming with C
Sort
View
248
Voted
ICDE
1996
IEEE
120views Database» more  ICDE 1996»
16 years 5 months ago
Towards the Reverse Engineering of Denormalized Relational Databases
This paper describes a method to cope with denormalized relational schemas in a database reverse engineering process. We propose two main steps to irnprove the understanding of da...
Jean-Marc Petit, Farouk Toumani, Jean-Franç...
142
Voted
DAC
1998
ACM
16 years 4 months ago
Watermarking Techniques for Intellectual Property Protection
Digital system designs are the product of valuable effort and knowhow. Their embodiments, from software and HDL program down to device-level netlist and mask data, represent caref...
Andrew B. Kahng, John Lach, William H. Mangione-Sm...
121
Voted
DAC
2004
ACM
16 years 4 months ago
Data compression for improving SPM behavior
Scratch-pad memories (SPMs) enable fast access to time-critical data. While prior research studied both static and dynamic SPM management strategies, not being able to keep all ho...
Ozcan Ozturk, Mahmut T. Kandemir, I. Demirkiran, G...
CHI
2005
ACM
16 years 4 months ago
A logic block enabling logic configuration by non-experts in sensor networks
Recent years have seen the evolution of networks of tiny low power computing blocks, known as sensor networks. In one class of sensor networks, a non-expert user, who has little o...
Susan Cotterell, Frank Vahid
123
Voted
CHI
2003
ACM
16 years 4 months ago
Peephole displays: pen interaction on spatially aware handheld computers
The small size of handheld computers provides the convenience of mobility at the expense of reduced screen space for display and interaction. Prior research [5, 6] has identified ...
Ka-Ping Yee