Sciweavers

2421 search results - page 429 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
ICDE
2004
IEEE
105views Database» more  ICDE 2004»
14 years 11 months ago
SPINE: Putting Backbone into String Indexing
The indexing technique commonly used for long strings, such as genomes, is the suffix tree, which is based on a vertical (intra-path) compaction of the underlying trie structure. ...
Naresh Neelapala, Romil Mittal, Jayant R. Haritsa
VIS
2004
IEEE
126views Visualization» more  VIS 2004»
14 years 11 months ago
Physically Based Methods for Tensor Field Visualization
The physical interpretation of mathematical features of tensor fields is highly application-specific. Existing visualization methods for tensor fields only cover a fraction of the...
Bernd Hamann, Boris Jeremic, Hans Hagen, Ingrid Ho...
WWW
2005
ACM
14 years 10 months ago
WEESA: Web engineering for semantic Web applications
The success of the Semantic Web crucially depends on the existence of Web pages that provide machine-understandable meta-data. This meta-data is typically added in the semantic an...
Gerald Reif, Harald Gall, Mehdi Jazayeri
WWW
2005
ACM
14 years 10 months ago
Cataclysm: policing extreme overloads in internet applications
In this paper we present the Cataclysm server platform for handling extreme overloads in hosted Internet applications. The primary contribution of our work is to develop a low ove...
Bhuvan Urgaonkar, Prashant J. Shenoy
ICCD
2008
IEEE
111views Hardware» more  ICCD 2008»
14 years 6 months ago
Test-access mechanism optimization for core-based three-dimensional SOCs
— Test-access mechanisms (TAMs) and test wrappers (e.g., the IEEE Standard 1500 wrapper) facilitate the modular testing of embedded cores in a core-based system-on-chip (SOC). Su...
Xiaoxia Wu, Yibo Chen, Krishnendu Chakrabarty, Yua...