Sciweavers

1111 search results - page 190 / 223
» A Conceptual Modeling Technique Based on Semantically Comple...
Sort
View
ICICS
2009
Springer
14 years 2 months ago
GUC-Secure Join Operator in Distributed Relational Database
Privacy-preserving SQL computation in distributed relational database is one of important applications of secure multiparty computation. In contrast with comparatively more works o...
Yuan Tian, Hao Zhang
ICMCS
2008
IEEE
336views Multimedia» more  ICMCS 2008»
14 years 2 months ago
SIMD optimization of the H.264/SVC decoder with efficient data structure
H.264/scalable video coding (SVC) is a new compression technique that can adapt to various network environments and applications. However, despite its outstanding performance, H.2...
Joohyun Lee, Gwanggil Jeon, Sangjun Park, Taeyoung...
ICCS
2007
Springer
14 years 1 months ago
Learning Common Outcomes of Communicative Actions Represented by Labeled Graphs
We build a generic methodology based on learning and reasoning to detect specific attitudes of human agents and patterns of their interactions. Human attitudes are determined in te...
Boris Galitsky, Boris Kovalerchuk, Sergei O. Kuzne...
VALUETOOLS
2006
ACM
236views Hardware» more  VALUETOOLS 2006»
14 years 1 months ago
The DISCO network calculator: a toolbox for worst case analysis
In this paper we describe the design, implementation, and analytical background of the DISCO Network Calculator. The DISCO Network Calculator is an open-source toolbox written in ...
Jens B. Schmitt, Frank A. Zdarsky
CAI
2000
Springer
13 years 7 months ago
Schema Evolution in Software Engineering Databases - a New Approach in Adele Environment
Abstract. This paper discusses schema evolution in software engineering databases. After a study of existing approaches, we show that these approaches do not satisfy software engin...
Mohamed Ahmed-Nacer, Jacky Estublier