Sciweavers

6149 search results - page 1030 / 1230
» Revealing the programming process
Sort
View
ICDE
1996
IEEE
120views Database» more  ICDE 1996»
16 years 6 months ago
Towards the Reverse Engineering of Denormalized Relational Databases
This paper describes a method to cope with denormalized relational schemas in a database reverse engineering process. We propose two main steps to irnprove the understanding of da...
Jean-Marc Petit, Farouk Toumani, Jean-Franç...
VIS
2009
IEEE
150views Visualization» more  VIS 2009»
16 years 6 months ago
VisMashup: Streamlining the Creation of Custom Visualization Applications
Visualization is essential for understanding the increasing volumes of digital data. However, the process required to create insightful visualizations is involved and time consumin...
Emanuele Santos, Lauro Lins, James P. Ahrens, J...
DAC
2008
ACM
16 years 6 months ago
Concurrent topology and routing optimization in automotive network integration
In this paper, a novel automatic approach for the concurrent topology and routing optimization that achieves a high quality network layout is proposed. This optimization is based ...
Bardo Lang, Christian Haubelt, Jürgen Teich, ...
DAC
2008
ACM
16 years 6 months ago
Energy-optimal software partitioning in heterogeneous multiprocessor embedded systems
Embedded systems with heterogeneous processors extend the energy/timing trade-off flexibility and provide the opportunity to fine tune resource utilization for particular applicat...
Michel Goraczko, Jie Liu, Dimitrios Lymberopoulos,...
DAC
1998
ACM
16 years 6 months ago
Watermarking Techniques for Intellectual Property Protection
Digital system designs are the product of valuable effort and knowhow. Their embodiments, from software and HDL program down to device-level netlist and mask data, represent caref...
Andrew B. Kahng, John Lach, William H. Mangione-Sm...
« Prev « First page 1030 / 1230 Last » Next »