Sciweavers

2516 search results - page 432 / 504
» Integrity Constraints for XML
Sort
View
ECRTS
1999
IEEE
15 years 2 months ago
Distributed real-time task monitoring in the safety-critical system Melody
Safety-critical systems typically operate in unpredictable environments. Requirements for safety and reliability are in conflict with those for real-time responsiveness. Due to un...
Horst F. Wedde, Jon A. Lind, Guido Seghert
SIGGRAPH
1999
ACM
15 years 2 months ago
Implicit Fairing of Irregular Meshes Using Diffusion and Curvature Flow
In this paper, we develop methods to rapidly remove rough features from irregularly triangulated data intended to portray a smooth surface. The main task is to remove undesirable ...
Mathieu Desbrun, Mark Meyer, Peter Schröder, ...
HICSS
1999
IEEE
152views Biometrics» more  HICSS 1999»
15 years 2 months ago
Incorporating Semantic Relationships into an Object-Oriented Database System
Semantic relationships, those class-to-class connections that carry inherent support for constraints and various other functionalities, play an important role when building inform...
Li-min Liu, Michael Halper
MICRO
1999
IEEE
109views Hardware» more  MICRO 1999»
15 years 2 months ago
Compiler-Directed Dynamic Computation Reuse: Rationale and Initial Results
Recent studies on value locality reveal that many instructions are frequently executed with a small variety of inputs. This paper proposes an approach that integrates architecture...
Daniel A. Connors, Wen-mei W. Hwu
SP
1999
IEEE
145views Security Privacy» more  SP 1999»
15 years 2 months ago
A User-Centered, Modular Authorization Service Built on an RBAC Foundation
Psychological acceptability has been mentioned as a requirement for secure systems for as long as least privilege and fail safe defaults, but until now has been all but ignored in...
Mary Ellen Zurko, Richard Simon, Tom Sanfilippo