Sciweavers

1366 search results - page 206 / 274
» Modularizing Contexted Constraints
Sort
View
ICDE
2008
IEEE
178views Database» more  ICDE 2008»
16 years 4 months ago
On the Optimal Selection of k in the k-Anonymity Problem
When disseminating data involving human subjects, researchers have to weigh in the requirements of privacy of the individuals involved in the data. A model widely used for enhancin...
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...
235
Voted
ICDE
2007
IEEE
132views Database» more  ICDE 2007»
16 years 4 months ago
XPlainer: Visual Explanations of XPath Queries
The popularity of XML has motivated the development of novel XML processing tools many of which embed the XPath language for XML querying, transformation, constraint specification...
Mariano P. Consens, John W. S. Liu, Flavio Rizzolo
134
Voted
DAC
2009
ACM
16 years 4 months ago
Evaluating design trade-offs in customizable processors
The short time-to-market window for embedded systems demands automation of design methodologies for customizable processors. Recent research advances in this direction have mostly...
Unmesh D. Bordoloi, Huynh Phung Huynh, Samarjit Ch...
DAC
2008
ACM
16 years 4 months ago
Cache modeling in probabilistic execution time analysis
Multimedia-dominated consumer electronics devices (such as cellular phone, digital camera, etc.) operate under soft real-time constraints. Overly pessimistic worst-case execution ...
Yun Liang, Tulika Mitra
DAC
1998
ACM
16 years 4 months ago
Reducing Power in High-Performance Microprocessors
Power consumption has become one of the biggest challenges in high-performance microprocessor design. The rapid increase in the complexity and speed of each new CPU generation is ...
Vivek Tiwari, Deo Singh, Suresh Rajgopal, Gaurav M...