Sciweavers

501 search results - page 80 / 101
» Simplification of Integrity Constraints for Data Integration
Sort
View
64
Voted
ACSAC
2000
IEEE
15 years 1 months ago
A Novel Approach to On-Line Status Authentication of Public-Key Certificates
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, like legally valid documents and business transactions, poses severe security cons...
Eugenio Faldella, Marco Prandini
SIGGRAPH
1999
ACM
15 years 1 months ago
Implicit Fairing of Irregular Meshes Using Diffusion and Curvature Flow
In this paper, we develop methods to rapidly remove rough features from irregularly triangulated data intended to portray a smooth surface. The main task is to remove undesirable ...
Mathieu Desbrun, Mark Meyer, Peter Schröder, ...
DAC
1995
ACM
15 years 1 months ago
A Transformation-Based Approach for Storage Optimization
High-level synthesis (HLS) has been successfully targeted towards the digital signal processing (DSP) domain. Both application-speci c integrated circuits (ASICs) and application-...
Wei-Kai Cheng, Youn-Long Lin
AMW
2010
14 years 11 months ago
Generating XML/GML Schemas from Geographic Conceptual Schemas
Abstract. A large volume of data with complex structures is currently represented in GML (Geography Markup Language) for storing and exchanging geographic information. As the size ...
André C. Hora, Clodoveu A. Davis Jr., Mirel...
SDM
2010
SIAM
165views Data Mining» more  SDM 2010»
14 years 11 months ago
Exact Passive-Aggressive Algorithm for Multiclass Classification Using Support Class
The Passive Aggressive framework [1] is a principled approach to online linear classification that advocates minimal weight updates i.e., the least required so that the current tr...
Shin Matsushima, Nobuyuki Shimizu, Kazuhiro Yoshid...