Sciweavers

1419 search results - page 248 / 284
» A Characterization of Constructive Dimension
Sort
View
110
Voted
ICSE
2012
IEEE-ACM
13 years 19 days ago
Synthesizing API usage examples
Abstract—Key program interfaces are sometimes documented with usage examples: concrete code snippets that characterize common use cases for a particular data type. While such doc...
Raymond P. L. Buse, Westley Weimer
TCC
2010
Springer
176views Cryptology» more  TCC 2010»
15 years 7 months ago
Ideal Hierarchical Secret Sharing Schemes
The search of efficient constructions of ideal secret sharing schemes for families of nonthreshold access structures that may have useful applications has attracted a lot of atten...
Oriol Farràs, Carles Padró
TCC
2010
Springer
173views Cryptology» more  TCC 2010»
15 years 7 months ago
Bounds on the Sample Complexity for Private Learning and Private Data Release
Learning is a task that generalizes many of the analyses that are applied to collections of data, and in particular, collections of sensitive individual information. Hence, it is n...
Amos Beimel, Shiva Prasad Kasiviswanathan, Kobbi N...
KBSE
2009
IEEE
15 years 5 months ago
Static Validation of C Preprocessor Macros
—The widely used C preprocessor (CPP) is generally considered a source of difficulty for understanding and maintaining C/C++ programs. The main reason for this difficulty is CP...
Andreas Saebjoernsen, Lingxiao Jiang, Daniel J. Qu...
AMMA
2009
Springer
15 years 4 months ago
Auctions with Dynamic Populations: Efficiency and Revenue Maximization
ABSTRACT: We examine an environment where goods and privately informed buyers arrive stochastically to a market. A seller in this setting faces a sequential allocation problem with...
Maher Said