Sciweavers

5766 search results - page 1121 / 1154
» Reverse Engineering of Data
Sort
View
SPW
2004
Springer
15 years 3 months ago
Privacy Is Linking Permission to Purpose
Abstract Fabio Massacci1 and Nicola Zannone1 Department of Information and Communication Technology University of Trento - Italy {massacci,zannone} at dit.unitn.it The last years h...
Fabio Massacci, Nicola Zannone
UPP
2004
Springer
15 years 3 months ago
Inverse Design of Cellular Automata by Genetic Algorithms: An Unconventional Programming Paradigm
Evolving solutions rather than computing them certainly represents an unconventional programming approach. The general methodology of evolutionary computation has already been know...
Thomas Bäck, Ron Breukelaar, Lars Willmes
VLDB
2004
ACM
151views Database» more  VLDB 2004»
15 years 3 months ago
Query Rewrite for XML in Oracle XML DB
Oracle XML DB integrates XML storage and querying using the Oracle relational and object relational framework. It has the capability to physically store XML documents by shredding...
Muralidhar Krishnaprasad, Zhen Hua Liu, Anand Mani...
DATE
2003
IEEE
102views Hardware» more  DATE 2003»
15 years 3 months ago
G-MAC: An Application-Specific MAC/Co-Processor Synthesizer
: A modern special-purpose processor (e.g., for image and graphical applications) usually contains a set of instructions supporting complex multiply-operations. These instructions ...
Alex C.-Y. Chang, Wu-An Kuo, Allen C.-H. Wu, TingT...
DATE
2003
IEEE
135views Hardware» more  DATE 2003»
15 years 3 months ago
Creating Value Through Test
Test is often seen as a necessary evil; it is a fact of life that ICs have manufacturing defects and those need to be filtered out by testing before the ICs are shipped to the cu...
Erik Jan Marinissen, Bart Vermeulen, Robert Madge,...
« Prev « First page 1121 / 1154 Last » Next »