Sciweavers

959 search results - page 170 / 192
» Transfers between Logics and their Applications
Sort
View
IEEEARES
2008
IEEE
15 years 8 months ago
Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements
—Data warehouse (DW) systems integrate data from heterogeneous sources and are used by decision makers to analyze the status and the development of an organization. Traditionally...
Emilio Soler, Veronika Stefanov, Jose-Norberto Maz...
TIME
2008
IEEE
15 years 8 months ago
Time Aware Mining of Itemsets
Frequent behavioural pattern mining is a very important topic of knowledge discovery, intended to extract correlations between items recorded in large databases or Web acces logs....
Bashar Saleh, Florent Masseglia
DATE
2006
IEEE
88views Hardware» more  DATE 2006»
15 years 8 months ago
Enabling fine-grain leakage management by voltage anchor insertion
Functional unit shutdown based on MTCMOS devices is effective for leakage reduction in aggressively scaled technologies. However, the applicability of MTCMOS-based shutdown in a s...
Pietro Babighian, Luca Benini, Alberto Macii, Enri...
IJCNN
2006
IEEE
15 years 8 months ago
Combining Multi-Frame Images for Enhancement Using Self-Delaying Dynamic Networks
Abstract— This paper presents the use of a newly created network structure known as a Self-Delaying Dynamic Network (SDN). The SDNs were created to process data which varies with...
Lewis Eric Hibell, Honghai Liu, David J. Brown
DAC
2006
ACM
15 years 7 months ago
Use of C/C++ models for architecture exploration and verification of DSPs
Architectural decisions for DSP modules are often analyzed using high level C models. Such high-level explorations allow early examination of the algorithms and the architectural ...
David Brier, Raj S. Mitra