Sciweavers

2299 search results - page 302 / 460
» Logical Data Expiration
Sort
View
213
Voted
CORR
2004
Springer
177views Education» more  CORR 2004»
15 years 4 months ago
Typestate Checking and Regular Graph Constraints
We introduce regular graph constraints and explore their decidability properties. The motivation for regular graph constraints is 1) type checking of changing types of objects in ...
Viktor Kuncak, Martin C. Rinard
ICDE
2006
IEEE
120views Database» more  ICDE 2006»
16 years 6 months ago
Updates Through Views: A New Hope
Database views are extensively used to represent unmaterialized tables. Applications rarely distinguish between a materialized base table and a virtual view, thus, they may issue ...
Yannis Kotidis, Divesh Srivastava, Yannis Velegrak...
223
Voted
ICDE
2004
IEEE
124views Database» more  ICDE 2004»
16 years 6 months ago
Authenticating Query Results in Edge Computing
Edge computing pushes application logic and the underlying data to the edge of the network, with the aim of improving availability and scalability. As the edge servers are not nec...
HweeHwa Pang, Kian-Lee Tan
DAC
2000
ACM
16 years 5 months ago
The role of custom design in ASIC Chips
Custom design, in which the designer controls the physical structure of the chip, can greatly improve the speed, power, and delay of an ASIC chip without affecting design time. Th...
William J. Dally, Andrew Chang
DAC
2006
ACM
16 years 5 months ago
Synthesis of high-performance packet processing pipelines
Packet editing is a fundamental building block of data communication systems such as switches and routers. Circuits that implement this function are critical and define the featur...
Cristian Soviani, Ilija Hadzic, Stephen A. Edwards