Sciweavers

1085 search results - page 23 / 217
» On the performance of one-to-many data transformations
Sort
View
DFT
2000
IEEE
119views VLSI» more  DFT 2000»
14 years 2 days ago
An Experimental Evaluation of the Effectiveness of Automatic Rule-Based Transformations for Safety-Critical Applications
1 Over the last years, an increasing number of safety-critical tasks have been demanded to computer systems. In particular, safety-critical computer-based applications are hitting ...
Maurizio Rebaudengo, Matteo Sonza Reorda, Marco To...
JSA
2007
84views more  JSA 2007»
13 years 7 months ago
Optimizing data structures at the modeling level in embedded multimedia
Traditional design techniques for embedded systems apply transformations on the source code to optimize hardwarerelated cost factors. Unfortunately, such transformations cannot ad...
Marijn Temmerman, Edgar G. Daylight, Francky Catth...
SIGGRAPH
1999
ACM
13 years 12 months ago
Shape Transformation Using Variational Implicit Functions
Traditionally, shape transformation using implicit functions is performed in two distinct steps: 1) creating two implicit functions, and 2) interpolating between these two functio...
Greg Turk, James F. O'Brien
CRYPTO
2005
Springer
97views Cryptology» more  CRYPTO 2005»
14 years 1 months ago
Generic Transformation for Scalable Broadcast Encryption Schemes
Broadcast encryption schemes allow a message sender to broadcast an encrypted data so that only legitimate receivers decrypt it. Because of the intrinsic nature of one-to-many comm...
Jung Yeon Hwang, Dong Hoon Lee, Jongin Lim
DEXA
2003
Springer
222views Database» more  DEXA 2003»
14 years 27 days ago
Process Data Store: A Real-Time Data Store for Monitoring Business Processes
With access to real-time information on critical performance indicators of business processes, managers and staff members can play a crucial role in improving the speed and effecti...
Josef Schiefer, Beate List, Robert M. Bruckner