Sciweavers

1928 search results - page 192 / 386
» Integrity Constraints in OWL
Sort
View
FPGA
2009
ACM
209views FPGA» more  FPGA 2009»
14 years 5 months ago
SPR: an architecture-adaptive CGRA mapping tool
In this paper we present SPR, a new architecture-adaptive mapping tool for use with Coarse-Grained Reconfigurable Architectures (CGRAs). It combines a VLIW style scheduler and FP...
Stephen Friedman, Allan Carroll, Brian Van Essen, ...
ISCC
2009
IEEE
170views Communications» more  ISCC 2009»
14 years 5 months ago
A directly public verifiable signcryption scheme based on elliptic curves
A directly public verifiable signcryption scheme is introduced in this paper that provides the security attributes of message confidentiality, authentication, integrity, non-repud...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
ACSC
2007
IEEE
14 years 4 months ago
Domination Normal Form - Decomposing Relational Database Schemas
A common approach in designing relational databases is to start with a universal relation schema, which is then decomposed into multiple subschemas. A good choice of subschemas ca...
Henning Köhler
SUM
2007
Springer
14 years 4 months ago
The Consistency Extractor System: Querying Inconsistent Databases Using Answer Set Programs
Abstract. We present the Consistency Extractor System (ConsEx) that uses answer set programming to compute consistent answers to first-order queries posed to relational databases ...
Mónica Caniupán Marileo, Leopoldo E....
ICARCV
2006
IEEE
128views Robotics» more  ICARCV 2006»
14 years 4 months ago
Modeling Supply Chain Configuration Based on Colored Petri Nets
—This paper introduces an integrated modeling and analysis formalism based on colored Petri nets (CPNs) for supply chain configuration and evaluation. The structural changes of d...
Lianfeng Zhang, Xiao You, Jianxin Jiao, Petri Helo