Sciweavers

687 search results - page 136 / 138
» Specification and Verification of Model Transformations Usin...
Sort
View
ICS
2009
Tsinghua U.
14 years 3 months ago
High-performance CUDA kernel execution on FPGAs
In this work, we propose a new FPGA design flow that combines the CUDA programming model from Nvidia with the state of the art high-level synthesis tool AutoPilot from AutoESL, to...
Alexandros Papakonstantinou, Karthik Gururaj, John...
SIGMOD
2001
ACM
134views Database» more  SIGMOD 2001»
14 years 9 months ago
Preservation of Digital Data with Self-Validating, Self-Instantiating Knowledge-Based Archives
Digital archives are dedicated to the long-term preservation of electronic information and have the mandate to enable sustained access despite rapid technology changes. Persistent...
Bertram Ludäscher, Richard Marciano, Reagan Moore
DEBU
1999
112views more  DEBU 1999»
13 years 8 months ago
Describing and Manipulating XML Data
This paper presents a brief overview of data management using the Extensible Markup Language (XML). It presents the basics of XML and the DTDs used to constrain XML data, and desc...
Sudarshan S. Chawathe
DATE
2004
IEEE
128views Hardware» more  DATE 2004»
14 years 16 days ago
Enhanced Diameter Bounding via Structural
Bounded model checking (BMC) has gained widespread industrial use due to its relative scalability. Its exhaustiveness over all valid input vectors allows it to expose arbitrarily ...
Jason Baumgartner, Andreas Kuehlmann
EUROCRYPT
2004
Springer
14 years 16 days ago
Anonymous Identification in Ad Hoc Groups
We introduce Ad Hoc Anonymous Identification schemes, a new multi-user cryptographic primitive that allows participants from a user population to form ad hoc groups, and then prove...
Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi,...