Sciweavers

5972 search results - page 1097 / 1195
» Extending Design Environments to Software Architecture Desig...
Sort
View
INFOSCALE
2007
ACM
15 years 3 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü
GEOINFO
2004
15 years 2 months ago
Ontology-driven Resolution of Semantic Heterogeneities in GDB Conceptual Schemas
: As the geographic information system (GIS) community grows, more and more people needs to share geographic information. As modern GIS data is stored in geographic databases their...
Guillermo Nudelman Hess, Cirano Iochpe
NIPS
2003
15 years 2 months ago
A Mixed-Signal VLSI for Real-Time Generation of Edge-Based Image Vectors
A mixed-signal image filtering VLSI has been developed aiming at real-time generation of edge-based image vectors for robust image recognition. A four-stage asynchronous median de...
Masakazu Yagi, Hideo Yamasaki, Tadashi Shibata
KYOTODL
2000
87views more  KYOTODL 2000»
15 years 2 months ago
Modeling Customizable Web Applications
The web is more and more used as a platform for fullfledged, increasingly complex applications, where a huge amount of change-intensive data is managed by underlying database syst...
Gerti Kappel, Werner Retschitzegger, Wieland Schwi...
83
Voted
EUROPAR
2010
Springer
15 years 2 months ago
Transactional Mutex Locks
Mutual exclusion locks limit concurrency but offer low latency. Software transactional memory (STM) typically has higher latency, but scales well. In this paper we propose transac...
Luke Dalessandro, David Dice, Michael L. Scott, Ni...
« Prev « First page 1097 / 1195 Last » Next »