Sciweavers

241 search results - page 47 / 49
» Towards Safe Model Transformation for Constraint-driven Mode...
Sort
View
ICDE
2008
IEEE
153views Database» more  ICDE 2008»
14 years 10 months ago
Mining Views: Database Views for Data Mining
We present a system towards the integration of data mining into relational databases. To this end, a relational database model is proposed, based on the so called virtual mining vi...
Élisa Fromont, Adriana Prado, Bart Goethals...
IMAGING
2000
13 years 10 months ago
Color Management within a Spectral Image Visualization Tool
Recent developments in spectral imaging are pointing toward a future where the demands on color management will require a richer infrastructure than that which is currently offere...
Mitchell R. Rosen, Mark D. Fairchild, Garrett M. J...
EUROCRYPT
2004
Springer
14 years 1 months ago
Positive Results and Techniques for Obfuscation
Informally, an obfuscator O is an efficient, probabilistic “compiler” that transforms a program P into a new program O(P) with the same functionality as P, but such that O(P)...
Ben Lynn, Manoj Prabhakaran, Amit Sahai
ECRTS
2007
IEEE
14 years 2 months ago
A Delay Composition Theorem for Real-Time Pipelines
Uniprocessor schedulability theory made great strides, in part, due to the simplicity of composing the delay of a job from the execution times of higher-priority jobs that preempt...
Praveen Jayachandran, Tarek F. Abdelzaher
SIGMOD
2009
ACM
175views Database» more  SIGMOD 2009»
14 years 8 months ago
QoX-driven ETL design: reducing the cost of ETL consulting engagements
As business intelligence becomes increasingly essential for organizations and as it evolves from strategic to operational, the complexity of Extract-Transform-Load (ETL) processes...
Alkis Simitsis, Kevin Wilkinson, Malú Caste...