Sciweavers

202 search results - page 34 / 41
» Composing and decomposing systems under security properties
Sort
View
SIGMOD
2011
ACM
270views Database» more  SIGMOD 2011»
12 years 11 months ago
Automatic discovery of attributes in relational databases
In this work we design algorithms for clustering relational columns into attributes, i.e., for identifying strong relationships between columns based on the common properties and ...
Meihui Zhang, Marios Hadjieleftheriou, Beng Chin O...
ICCAD
2008
IEEE
103views Hardware» more  ICCAD 2008»
14 years 5 months ago
Hardware protection and authentication through netlist level obfuscation
—Hardware Intellectual Property (IP) cores have emerged as an integral part of modern System–on–Chip (SoC) designs. However, IP vendors are facing major challenges to protect...
Rajat Subhra Chakraborty, Swarup Bhunia
JPDC
2007
96views more  JPDC 2007»
13 years 8 months ago
Optimal pipeline decomposition and adaptive network mapping to support distributed remote visualization
This paper discusses algorithmic and implementation aspects of a distributed remote visualization system that optimally decomposes and adaptively maps the visualization pipeline t...
Mengxia Zhu, Qishi Wu, Nageswara S. V. Rao, S. Sit...
GECCO
2007
Springer
168views Optimization» more  GECCO 2007»
14 years 2 months ago
Evolutionary benefits of evolvable component integration
A system composed of multiple interacting components is capable of responding to contextual information and producing a higher range of non-linear responses to stimuli compared to...
David Malkin, R. Beau Lotto
EMSOFT
2001
Springer
14 years 1 months ago
Interface Theories for Component-Based Design
Abstract. We classify component-based models of computation into component models and interface models. A component model speci es for each component how the component behaves in a...
Luca de Alfaro, Thomas A. Henzinger