Sciweavers

5525 search results - page 1078 / 1105
» Verification of Model Transformations
Sort
View
PODS
2004
ACM
158views Database» more  PODS 2004»
14 years 11 months ago
Composing Schema Mappings: Second-Order Dependencies to the Rescue
A schema mapping is a specification that describes how data structured under one schema (the source schema) is to be transformed into data structured under a different schema (the...
Ronald Fagin, Phokion G. Kolaitis, Lucian Popa, Wa...
MOBISYS
2008
ACM
14 years 10 months ago
Cascadia: a system for specifying, detecting, and managing rfid events
Cascadia is a system that provides RFID-based pervasive computing applications with an infrastructure for specifying, extracting and managing meaningful high-level events from raw...
Evan Welbourne, Nodira Khoussainova, Julie Letchne...
ICCD
2007
IEEE
121views Hardware» more  ICCD 2007»
14 years 7 months ago
Fast power network analysis with multiple clock domains
This paper proposes an efficient analysis flow and an algorithm to identify the worst case noise for power networks with multiple clock domains. First, we apply the Laplace transf...
Wanping Zhang, Ling Zhang, Rui Shi, He Peng, Zhi Z...
CC
2010
Springer
190views System Software» more  CC 2010»
14 years 5 months ago
Is Reuse Distance Applicable to Data Locality Analysis on Chip Multiprocessors?
On Chip Multiprocessors (CMP), it is common that multiple cores share certain levels of cache. The sharing increases the contention in cache and memory-to-chip bandwidth, further h...
Yunlian Jiang, Eddy Z. Zhang, Kai Tian, Xipeng She...
ISBI
2009
IEEE
14 years 5 months ago
Posture Matching and Elastic Registration of a Mouse Atlas to Surface Topography Range Data
Estimation of internal mouse anatomy is required for quantitative bioluminescence or fluorescence tomography. However, only surface range data can be recovered from all-optical s...
Anand Joshi, Abhijit Chaudhari, Changqing Li, Davi...
« Prev « First page 1078 / 1105 Last » Next »