Sciweavers

2516 search results - page 435 / 504
» Integrity Constraints for XML
Sort
View
KDD
1994
ACM
115views Data Mining» more  KDD 1994»
15 years 1 months ago
Extracting Domain Semantics for Knowledge Discovery in Relational Databases
Our research investigates howdomainsemantics are discovered froma relational database at a high level of automation. Thediscoveries are then represented as the extendedEntityRelat...
Roger H. L. Chiang, Terence M. Barron, Veda C. Sto...
AINA
2009
IEEE
15 years 1 months ago
Impact of Power Control in Wireless Sensor Networks Powered by Ambient Energy Harvesting (WSN-HEAP) for Railroad Health Monitori
The use of wireless sensor networks (WSNs) for structural health monitoring is gaining popularity since it allows for a low-cost, rapid and robust assessment of structural integri...
Hwee Pink Tan, Pius W. Q. Lee, Winston Khoon Guan ...
CIT
2007
Springer
15 years 1 months ago
An Aspect Enhanced Method of NFR Modeling in Software Architecture
Existence of crosscutting concerns in software requirements often intensifies complexity of software development. Modeling and analysis of these concerns at software architecture ...
Hamid Bagheri, Seyed-Hassan Mirian-Hosseinabadi, H...
DAC
2007
ACM
15 years 1 months ago
Skewed Flip-Flop Transformation for Minimizing Leakage in Sequential Circuits
Mixed Vt has been widely used to control leakage without affecting circuit performance. However, current approaches target the combinational circuits even though sequential elemen...
Jun Seomun, Jaehyun Kim, Youngsoo Shin
COMPSAC
2009
IEEE
15 years 1 months ago
Tamper Resistance for Software Defined Radio Software
The security of software defined radio (SDR) software is essential to the trustworthiness of the overall radio system. When designing and developing security solutions for SDR sof...
Shucai Xiao, Jung-Min Park, Yanzhu Ye