Sciweavers

2162 search results - page 80 / 433
» E-Crime Investigative Technologies
Sort
View
ISCAS
2006
IEEE
98views Hardware» more  ISCAS 2006»
14 years 3 months ago
Effects of crosstalk noise on H-tree clock distribution networks
— With the transition to deep submicron technologies the density of on-chip interconnect lines has increased, together with the switching rate of the signals propagating along th...
Itisha Chanodia, Dimitrios Velenis
WIDM
2005
ACM
14 years 3 months ago
Impact of XML schema evolution on valid documents
In this paper we investigate the problem of XML Schema evolution. We first discuss the different kinds of changes that may be needed on an XML Schema. Then, we investigate how to...
Giovanna Guerrini, Marco Mesiti, Daniele Rossi 000...
EKAW
2004
Springer
14 years 3 months ago
Adaptive Link Services for the Semantic Web
There are shortcomings in using the Web to publish information which are information overload and lost in hyperspace. The aim of the research is investigating how the Semantic web,...
Thanyalak Maneewatthana, Gary Wills, Wendy Hall
FPL
2009
Springer
166views Hardware» more  FPL 2009»
14 years 2 months ago
Modeling post-techmapping and post-clustering FPGA circuit depth
This paper presents an analytical model that relates FPGA architectural parameters to the expected speed of FPGA implementation. More precisely, the model relates the lookuptable ...
Joydip Das, Steven J. E. Wilton, Philip Heng Wai L...
KDD
1998
ACM
193views Data Mining» more  KDD 1998»
14 years 1 months ago
Methods for Linking and Mining Massive Heterogeneous Databases
Manyreal-world KDDexpeditions involve investigation of relationships betweenvariables in different, heterogeneousdatabases. Wepresent a dynamic programmingtechnique for linking re...
José C. Pinheiro, Don X. Sun