Sciweavers

8468 search results - page 1443 / 1694
» The Technology of Data Stashing
Sort
View
63
Voted
CIKM
1997
Springer
15 years 3 months ago
An Analysis of Cardinality Constraints in Redundant Relationships
In this paper, we present a complete analysis of redundant relationships in the entity-relationship model. Existing approaches use the concept of functional dependencies for ident...
James Dullea, Il-Yeol Song
CIKM
1997
Springer
15 years 3 months ago
A Framework for the Management of Past Experiences with Time-Extended Situations
: In the context of knowledge management, we focus on the representation and the retrieval of past experiences called cases within the Case-Based Reasoning (CBR) paradigm. CBR is a...
Michel Jaczynski
LCN
1996
IEEE
15 years 3 months ago
An Enhanced Timed-Round-Robin Traffic Control Scheme for ATM Networks
ATM (asynchronous transfer mode) aims at providing both guaranteed bandwidth to support real-time communications and dynamic bandwidth sharing to accommodate bursty data traffic. ...
Qin Zheng
ICCD
1993
IEEE
90views Hardware» more  ICCD 1993»
15 years 3 months ago
Subterranean: A 600 Mbit/Sec Cryptographic VLSI Chip
In this paper the design of a high-speed cryptographic coprocessor is presented. This coprocessor is named Subterranean and can be used for both cryptographic pseudorandom sequenc...
Luc J. M. Claesen, Joan Daemen, Mark Genoe, G. Pee...
VR
1993
IEEE
176views Virtual Reality» more  VR 1993»
15 years 3 months ago
Explorations of Display Interfaces for Virtual Reality
The technical limitations of early Virtual Reality systems made them almost teasers for showing the potential of the technology. Since these early days, many researchers have focu...
Michael F. Deering
« Prev « First page 1443 / 1694 Last » Next »