Sciweavers

8468 search results - page 1409 / 1694
» The Technology of Data Stashing
Sort
View
SPIRE
2005
Springer
15 years 4 months ago
Using the k-Nearest Neighbor Graph for Proximity Searching in Metric Spaces
Proximity searching consists in retrieving from a database, objects that are close to a query. For this type of searching problem, the most general model is the metric space, where...
Rodrigo Paredes, Edgar Chávez
WAIM
2005
Springer
15 years 4 months ago
An Ontology Based Approach to Construct Behaviors in Web Information Systems
System behaviors specify the major functions of domain specific Web Information Systems (WIS). Traditional techniques can not satisfy various requirements or manage innumerous data...
Lv-an Tang, Hongyan Li, Zhiyong Pan, Dongqing Yang...
WEBDB
2005
Springer
151views Database» more  WEBDB 2005»
15 years 4 months ago
Constructing Maintainable Semantic Mappings in XQuery
Semantic mapping is one of the important components underlying the data sharing systems. As is known, constructing and maintaining such mappings both are necessary yet extremely h...
Gang Qian, Yisheng Dong
XPU
2005
Springer
15 years 4 months ago
A Case Study on Naked Objects in Agile Software Development
Naked Objects and agile software development have been suggested to complement each other. Very few empirical studies to date exist where a product has been developed using the Nak...
Heikki Keränen, Pekka Abrahamsson
ASPDAC
2004
ACM
96views Hardware» more  ASPDAC 2004»
15 years 4 months ago
Register binding and port assignment for multiplexer optimization
- Data path connection elements, such as multiplexers, consume a significant amount of area on a VLSI chip, especially for FPGA designs. Multiplexer optimization is a difficult pro...
Deming Chen, Jason Cong
« Prev « First page 1409 / 1694 Last » Next »