Sciweavers

250 search results - page 33 / 50
» Lost source provenance
Sort
View
JIPS
2007
74views more  JIPS 2007»
13 years 7 months ago
Use of Mobile Devices in the Performance of Group Decision-Making under Contextual Pressure
: Mobile technology appears promising as a method to promote group performance in circumstances dependent on time, but not member proximity. However, the success of mobile technolo...
Oh Byung Kwon, Tae Kyung Kim, Choong Rhyun Kim
TSE
2008
99views more  TSE 2008»
13 years 7 months ago
Modular Information Hiding and Type-Safe Linking for C
This paper presents CMOD, a novel tool that provides a sound module system for C. CMOD works by enforcing a set of four rules that are based on principles of modular reasoning and...
Saurabh Srivastava, Michael Hicks, Jeffrey S. Fost...
PODS
2002
ACM
98views Database» more  PODS 2002»
14 years 7 months ago
On Propagation of Deletions and Annotations Through Views
We study two classes of view update problems in relational databases. We are given a source database S, a monotone query Q, and the view Q(S) generated by the query. The first pro...
Peter Buneman, Sanjeev Khanna, Wang Chiew Tan
RSP
2000
IEEE
156views Control Systems» more  RSP 2000»
13 years 12 months ago
Quasi-Static Scheduling of Reconfigurable Dataflow Graphs for DSP Systems
Dataflow programming has proven to be popular for representing applications in rapid prototyping tools for digital signal processing (DSP); however, existing dataflow design tools...
Bishnupriya Bhattacharya, Shuvra S. Bhattacharyya
CORR
2008
Springer
122views Education» more  CORR 2008»
13 years 7 months ago
To Code or Not To Code in Multi-Hop Relay Channels
Multi-hop relay channels use multiple relay stages, each with multiple relay nodes, to facilitate communication between a source and destination. Previously, distributed space-tim...
Rahul Vaze, Robert W. Heath Jr.