Sciweavers

892 search results - page 92 / 179
» Action respecting embedding
Sort
View
SEMWEB
2010
Springer
13 years 7 months ago
Evolution of DL - Lite Knowledge Bases
Abstract. We study the problem of evolution for Knowledge Bases (KBs) expressed in Description Logics (DLs) of the DL-Lite family. DL-Lite is at the basis of OWL 2 QL, one of the t...
Diego Calvanese, Evgeny Kharlamov, Werner Nutt, Dm...
SEE
2011
Springer
13 years 23 days ago
Dissolving the Engineering Moral Dilemmas Within the Islamic Ethico-Legal Praxes
The goal of responsible engineers is the creation of useful and safe technological products and commitment to public health, while respecting the autonomy of the clients and the pu...
Abdul Kabir Hussain Solihu, Abdul Rauf Ambali
CF
2004
ACM
14 years 1 months ago
Reducing traffic generated by conflict misses in caches
Off-chip memory accesses are a major source of power consumption in embedded processors. In order to reduce the amount of traffic between the processor and the off-chip memory as ...
Pepijn J. de Langen, Ben H. H. Juurlink
TISSEC
2010
119views more  TISSEC 2010»
13 years 4 months ago
Storage-Based Intrusion Detection
Storage-based intrusion detection allows storage systems to transparently watch for suspicious activity. Storage systems are well-positioned to spot several common intruder action...
Adam G. Pennington, John Linwood Griffin, John S. ...
VLSID
2008
IEEE
122views VLSI» more  VLSID 2008»
14 years 4 months ago
Implementing the Best Processor Cores
It is well-known that varying architectural, technological and implementation aspects of embedded microprocessors, such as ARM, can produce widely differing performance and power ...
Vamsi Boppana, Rahoul Varma, S. Balajee