Sciweavers

998 search results - page 194 / 200
» From Feasible Proofs to Feasible Computations
Sort
View
SIGMOD
1997
ACM
131views Database» more  SIGMOD 1997»
14 years 2 months ago
Maintenance of Data Cubes and Summary Tables in a Warehouse
Data warehouses contain large amounts of information, often collected from a variety of independent sources. Decision-support functions in a warehouse, such as on-line analytical ...
Inderpal Singh Mumick, Dallan Quass, Barinderpal S...
ASSETS
2007
ACM
14 years 1 months ago
Variable frame rate for low power mobile sign language communication
The MobileASL project aims to increase accessibility by enabling Deaf people to communicate over video cell phones in their native language, American Sign Language (ASL). Real-tim...
Neva Cherniavsky, Anna Cavender, Richard E. Ladner...
CAV
2010
Springer
225views Hardware» more  CAV 2010»
14 years 1 months ago
Merit: An Interpolating Model-Checker
Abstract. We present the tool MERIT, a CEGAR model-checker for safety propf counter-systems, which sits in the Lazy Abstraction with Interpolants (LAWI) framework. LAWI is parametr...
Nicolas Caniart
FCCM
2004
IEEE
152views VLSI» more  FCCM 2004»
14 years 1 months ago
Implementing and Evaluating Stream Applications on the Dynamically Reconfigurable Processor
Dynamically Reconfigurable Processor (DRP)[1] developed by NEC Electronics is a coarse grain reconfigurable processor that selects a data path from the on-chip repository of sixte...
Noriaki Suzuki, Shunsuke Kurotaki, Masayasu Suzuki...
NGC
2000
Springer
14 years 1 months ago
The use of hop-limits to provide survivable ATM group communications
We examine the use of a hop-limit constraint with techniques to provide survivability for connection-oriented ATM group communications. A hop-limit constraint is an approach that ...
William Yurcik, David Tipper, Deep Medhi