Sciweavers

90 search results - page 17 / 18
» Many holes in hindley-milner
Sort
View
PODS
2005
ACM
136views Database» more  PODS 2005»
14 years 5 months ago
Context-sensitive program analysis as database queries
Program analysis has been increasingly used in software engineering tasks such as auditing programs for security vulnerabilities and finding errors in general. Such tools often re...
Monica S. Lam, John Whaley, V. Benjamin Livshits, ...
INFOCOM
2008
IEEE
13 years 11 months ago
Randomized 3D Geographic Routing
—We reconsider the problem of geographic routing in wireless ad hoc networks. We are interested in local, memoryless routing algorithms, i.e. each network node bases its routing ...
Roland Flury, Roger Wattenhofer
COMPGEOM
2004
ACM
13 years 10 months ago
Single-strip triangulation of manifolds with arbitrary topology
Triangle strips have been widely used for efficient rendering. It is NP-complete to test whether a given triangulated model can be represented as a single triangle strip, so many...
David Eppstein, M. Gopi
MOBICOM
2010
ACM
13 years 5 months ago
Differential forms for target tracking and aggregate queries in distributed networks
Consider mobile targets moving in a plane and their movements being monitored by a network such as a field of sensors. We develop distributed algorithms for in-network tracking an...
Rik Sarkar, Jie Gao
HVEI
2010
13 years 5 months ago
Preference for art: similarity, statistics, and selling price
Factors governing human preference for artwork have long been studied but there remain many holes in our understanding. Bearing in mind contextual factors (both the conditions und...
Daniel J. Graham, Jay D. Friedenberg, Cyrus H. McC...