Sciweavers

2309 search results - page 187 / 462
» Efficient Topological Exploration
Sort
View
ICDE
2003
IEEE
126views Database» more  ICDE 2003»
14 years 9 months ago
Bridging the XML Relational Divide with LegoDB
We present LegoDB, a cost-based XML storage mapping engine that automatically explores a space of possible XML-to-relational mappings and selects an efficient mapping for a given ...
Jérôme Siméon, Jayant R. Harit...
CBSE
2008
Springer
13 years 10 months ago
Opportunistic Reuse: Lessons from Scrapheap Software Development
Many organizations use opportunistic reuse as a low-cost mechanism to improve the efficiency of development. Scrapheap reuse is a particular form of opportunistic development that ...
Gerald Kotonya, Simon Lock, John Mariani
WSC
2004
13 years 9 months ago
Simulation of Coherent Risk Measures
In financial risk management, a coherent risk measure equals the maximum expected loss under several different probability measures, which are analogous to systems in ranking and ...
Vadim Lesnevski, Barry L. Nelson, Jeremy Staum
DAC
2005
ACM
14 years 9 months ago
Fine-grained application source code profiling for ASIP design
Current Application Specific Instruction set Processor (ASIP) design methodologies are mostly based on iterative architecture exploration that uses Architecture Description Langua...
Kingshuk Karuri, Mohammad Abdullah Al Faruque, Ste...
ASPDAC
2007
ACM
90views Hardware» more  ASPDAC 2007»
14 years 9 days ago
Protocol Transducer Synthesis using Divide and Conquer approach
One of the efficient design methodologies for large scale System on a Chip (SoC) is IP-based design. In this methodology, a system is considered as a set of components and intercon...
Shigeru Watanabe, Kenshu Seto, Y. Ishikawa, Satosh...