Sciweavers

6960 search results - page 264 / 1392
» Continuity Analysis of Programs
Sort
View
CORR
2008
Springer
76views Education» more  CORR 2008»
15 years 4 months ago
An Efficient Algorithm for a Sharp Approximation of Universally Quantified Inequalities
This paper introduces a new algorithm for solving a subclass of quantified constraint satisfaction problems (QCSP) where existential quantifiers precede universally quantified ine...
Alexandre Goldsztejn, Claude Michel, Michel Rueher
CSDA
2008
86views more  CSDA 2008»
15 years 4 months ago
Transformations for semi-continuous data
Semi-continuous data arise in many applications where naturally-continuous data become contaminated by the data generating mechanism. The resulting data contain several values tha...
Galit Shmueli, Wolfgang Jank, Valerie Hyde
EOR
2008
97views more  EOR 2008»
15 years 4 months ago
Decision making with hybrid influence diagrams using mixtures of truncated exponentials
Mixtures of truncated exponentials (MTE) potentials are an alternative to discretization for representing continuous chance variables in influence diagrams. Also, MTE potentials c...
Barry R. Cobb, Prakash P. Shenoy
103
Voted
SYNTHESE
2008
78views more  SYNTHESE 2008»
15 years 3 months ago
Room for a view: on the metaphysical subject of personal identity
Sydney Shoemaker leads today's "neo-Lockean" liberation of persons from the conservative animalist charge of "neo-Aristotelians" such as Eric Olson, accord...
Daniel Kolak
USENIX
2008
15 years 6 months ago
LeakSurvivor: Towards Safely Tolerating Memory Leaks for Garbage-Collected Languages
Continuous memory leaks severely hurt program performance and software availability for garbage-collected programs. This paper presents a safe method, called LeakSurvivor, to tole...
Yan Tang, Qi Gao, Feng Qin