Sciweavers

1272 search results - page 21 / 255
» Implementation of Bitmap Based Incognito and Performance Eva...
Sort
View
IOLTS
2002
IEEE
127views Hardware» more  IOLTS 2002»
14 years 20 days ago
Fault Tolerance Evaluation Using Two Software Based Fault Injection Methods
A silicon independent C-Based model of the TTP/C protocol was implemented within the EU-founded project FIT. The C-based model is integrated in the C-Sim simulation environment. T...
Astrit Ademaj, Petr Grillinger, Pavel Herout, Jan ...
SYRCODIS
2008
120views Database» more  SYRCODIS 2008»
13 years 9 months ago
Efficient Implementation of XQuery Constructor Expressions
Element constructor is one of most expensive operations of the XQuery language as it requires deep copy of the nodes which make up the content of the constructed element. In this ...
Leonid Novak, Maxim Grinev, Ilya Taranov
DSN
2005
IEEE
14 years 1 months ago
Testing the Dependability and Performance of Group Communication Based Database Replication Protocols
Database replication based on group communication systems has recently been proposed as an efficient and resilient solution for large-scale data management. However, its evaluati...
A. Sousa, José Pereira, L. Soares, Alfr&aci...
VLSISP
2002
199views more  VLSISP 2002»
13 years 7 months ago
Evaluation of CORDIC Algorithms for FPGA Design
Abstract. This paper presents a study of the suitability for FPGA design of full custom based CORDIC implementations. Since all these methods are based on redundant arithmetic, the...
Javier Valls, Martin Kuhlmann, Keshab K. Parhi
COLING
2002
13 years 7 months ago
Integrating Linguistic and Performance-Based Constraints for Assigning Phrase Breaks
The mapping between syntactic structure and prosodic structure is a widely discussed topic in linguistics. In this work we use insights gained from research on syntax-to-prosody m...
Michaela Atterer, Ewan Klein