Sciweavers

4078 search results - page 670 / 816
» The COMPASS Location System
Sort
View
ISCAS
1994
IEEE
138views Hardware» more  ISCAS 1994»
14 years 2 months ago
High-Throughput Data Compressor Designs Using Content Addressable Memory
This paper presents a novel VLSI architecture for high-speed data compressor designs which implement the well-known LZ77 algorithm. The architecture mainly consists of three units...
Ren-Yang Yang, Chen-Yi Lee
DBPL
1993
Springer
125views Database» more  DBPL 1993»
14 years 2 months ago
Octopus: A Reflective Language Mechanism for Object Manipulation
A class of database programs exist which are required to operate over an infinite number of types; included in this class are object browsers and query tools. The types over which...
Alex Farkas, Alan Dearle
SAC
1994
ACM
14 years 2 months ago
Using persistence technology to control schema evolution
Traditional database technology may be extended by taking advantage of the facilities of an integrated persistent programming environment. This paper focuses on how such an enviro...
Richard C. H. Connor, Quintin I. Cutts, Graham N. ...
BIBE
2007
IEEE
149views Bioinformatics» more  BIBE 2007»
14 years 2 months ago
XML Encoding of Features Describing Rule-Based Modeling of Reaction Networks with Multi-Component Molecular Complexes
Multi-state molecules and multi-component complexes are commonly involved in cellular signaling. Accounting for molecules that have multiple potential states, such as a protein tha...
Michael L. Blinov, Ion I. Moraru
DSN
2007
IEEE
14 years 2 months ago
Understanding Resiliency of Internet Topology against Prefix Hijack Attacks
A prefix hijack attack involves an attacker announcing victim networks' IP prefixes into the global routing system. As a result, data traffic from portions of the Internet ca...
Mohit Lad, Ricardo V. Oliveira, Beichuan Zhang, Li...