Sciweavers

805 search results - page 130 / 161
» On the Role of Integrity Constraints in Data Integration
Sort
View
OOPSLA
2005
Springer
15 years 3 months ago
A delta-driven execution model for semantic computing
We describe (and demonstrate) the execution model of a computing platform where computation is both incremental and data-driven. We call such an approach delta-driven. The platfor...
Roly Perera, Jeff Foster, György Koch
ACSAC
2000
IEEE
15 years 2 months ago
A Novel Approach to On-Line Status Authentication of Public-Key Certificates
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, like legally valid documents and business transactions, poses severe security cons...
Eugenio Faldella, Marco Prandini
SIGGRAPH
1999
ACM
15 years 1 months ago
Implicit Fairing of Irregular Meshes Using Diffusion and Curvature Flow
In this paper, we develop methods to rapidly remove rough features from irregularly triangulated data intended to portray a smooth surface. The main task is to remove undesirable ...
Mathieu Desbrun, Mark Meyer, Peter Schröder, ...
ICCAD
1998
IEEE
120views Hardware» more  ICCAD 1998»
15 years 1 months ago
Communication synthesis for distributed embedded systems
Designers of distributed embedded systems face many challenges in determining the appropriate tradeoffs to make when defining a system architecture or retargeting an existing desi...
Ross B. Ortega, Gaetano Borriello
DAC
1995
ACM
15 years 1 months ago
A Transformation-Based Approach for Storage Optimization
High-level synthesis (HLS) has been successfully targeted towards the digital signal processing (DSP) domain. Both application-speci c integrated circuits (ASICs) and application-...
Wei-Kai Cheng, Youn-Long Lin