Sciweavers

2421 search results - page 27 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
ADVIS
2006
Springer
14 years 5 months ago
Checking Violation Tolerance of Approaches to Database Integrity
A hitherto unquestioned assumption made by all methods for integrity checking has been that the database satisfies its constraints before each update. This consistency assumption ...
Hendrik Decker, Davide Martinenghi
HICSS
2002
IEEE
153views Biometrics» more  HICSS 2002»
14 years 3 months ago
Technology Supported Learning Applied to an Innovative, Integrated Curriculum for First-Year Engineering Majors
In September of 1998, the College of Engineering at the University of Massachusetts Dartmouth piloted an innovative, integrated, first-year curriculum. It dramatically changed 31 ...
Paul J. Fortier, Emily Fowler, Raymond N. Laoulach...
ICCAD
2006
IEEE
119views Hardware» more  ICCAD 2006»
14 years 7 months ago
FastRoute: a step to integrate global routing into placement
Because of the increasing dominance of interconnect issues in advanced IC technology, placement has become a critical step in the IC design flow. To get accurate interconnect inf...
Min Pan, Chris C. N. Chu
SCCC
1999
IEEE
14 years 3 months ago
MetaFT-A Reflective Approach to Implement Replication Techniques in CORBA
A model was introduced in [Fraga97] for integrating replication techniques in heterogeneous systems. The model adopts a reflective structure based on the meta-object approach [10]...
Lau Cheuk Lung, Joni da Silva Fraga, Carlos Mazier...
AISB
1997
Springer
14 years 3 months ago
Modelling Bounded Rationality Using Evolutionary Techniques
A technique for the credible modelling of economic agents with bounded rationality based on the evolutionary techniques is described. The genetic programming paradigm is most suite...
Bruce Edmonds, Scott Moss