Sciweavers

1821 search results - page 82 / 365
» Security-Aware Program Transformations
Sort
View
DAWAK
2005
Springer
14 years 2 months ago
Graph-Based Modeling of ETL Activities with Multi-level Transformations and Updates
Extract-Transform-Load (ETL) workflows are data centric workflows responsible for transferring, cleaning, and loading data from their respective sources to the warehouse. Previous ...
Alkis Simitsis, Panos Vassiliadis, Manolis Terrovi...
ICDT
2005
ACM
116views Database» more  ICDT 2005»
14 years 2 months ago
The Design Space of Type Checkers for XML Transformation Languages
Abstract. We survey work on statically type checking XML transformations, covering a wide range of notations and ambitions. The concept of type may vary from idealizations of DTD t...
Anders Møller, Michael I. Schwartzbach
IPPS
2003
IEEE
14 years 2 months ago
Short Vector Code Generation for the Discrete Fourier Transform
In this paper we use a mathematical approach to automatically generate high performance short vector code for the discrete Fourier transform (DFT). We represent the well-known Coo...
Franz Franchetti, Markus Püschel
DELTA
2010
IEEE
14 years 2 months ago
Algorithm Transformation for FPGA Implementation
— High level hardware description languages aim to make hardware design more like programming software. These languages are often used to accelerate legacy software algorithms by ...
Donald G. Bailey, Christopher T. Johnston
ARCS
2006
Springer
14 years 21 days ago
Automated Construction of Dependability Models by Aspect-Oriented Modeling and Model Transformation
Abstract. In order to support the dependability analysis of a system under design in an early phase of the design process, so-called fault tolerance libraries can be created that c...
Péter Domokos, István Majzik