Sciweavers

248 search results - page 20 / 50
» Supporting UML-based development of embedded systems by form...
Sort
View
PVLDB
2010
128views more  PVLDB 2010»
13 years 6 months ago
Update Rewriting and Integrity Constraint Maintenance in a Schema Evolution Support System: PRISM++
Supporting legacy applications when the database schema evolves represents a long-standing challenge of practical and theoretical importance. Recent work has produced algorithms a...
Carlo Curino, Hyun Jin Moon, Alin Deutsch, Carlo Z...
CODES
2005
IEEE
14 years 1 months ago
Shift buffering technique for automatic code synthesis from synchronous dataflow graphs
This paper proposes a new efficient buffer management technique called shift buffering for automatic code synthesis from synchronous dataflow graphs (SDF). Two previous buffer man...
Hyunok Oh, Nikil D. Dutt, Soonhoi Ha
SP
2007
IEEE
148views Security Privacy» more  SP 2007»
14 years 1 months ago
DSSS-Based Flow Marking Technique for Invisible Traceback
Law enforcement agencies need the ability to conduct electronic surveillance to combat crime, terrorism, or other malicious activities exploiting the Internet. However, the prolif...
Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zh...
ICIP
2001
IEEE
14 years 9 months ago
Study of embedded font context and kernel space methods for improved videotext recognition
Videotext refers to text superimposed on video frames. A videotext based Multimedia Description Scheme has recently been adopted into the MPEG-7 standard. A study of published wor...
Chitra Dorai, Hrishikesh Aradhye, Jae-Chang Shim
SOFSEM
2007
Springer
14 years 1 months ago
Separation of Concerns and Consistent Integration in Requirements Modelling
Due to their increasing complexity, design of software systems is not becoming easier. Furthermore, modern applications ranging from enterprise to embedded systems require very hig...
Xin Chen, Zhiming Liu, Vladimir Mencl