Sciweavers

4702 search results - page 208 / 941
» How to Copyright a Function
Sort
View
ICLP
1995
Springer
15 years 8 months ago
A Method for Implementing Equational Theories as Logic Programs
Equational theories underly many elds of computing, including functional programming, symbolic algebra, theorem proving, term rewriting and constraint solving. In this paper we sh...
Mantis H. M. Cheng, Douglas Stott Parker Jr., Maar...
JASIS
2002
72views more  JASIS 2002»
15 years 4 months ago
Combining and selecting characteristics of information use
In this paper we report on a series of experiments designed to investigate the combination of term and document weighting functions in Information Retrieval. We describe a series ...
Ian Ruthven, Mounia Lalmas, C. J. van Rijsbergen
IACR
2011
97views more  IACR 2011»
14 years 4 months ago
Two-Output Secure Computation with Malicious Adversaries
We present a method to compile Yao’s two-player garbled circuit protocol into one that is secure against malicious adversaries that relies on witness indistinguishability. Our ap...
Abhi Shelat, Chih-Hao Shen
146
Voted
STOC
2010
ACM
176views Algorithms» more  STOC 2010»
15 years 10 months ago
Complexity Theory for Operators in Analysis
We propose a new framework for discussing computational complexity of problems involving uncountably many objects, such as real numbers, sets and functions, that can be represente...
Akitoshi Kawamura and Stephen Cook
ATAL
2008
Springer
15 years 7 months ago
Aligning social welfare and agent preferences to alleviate traffic congestion
Multiagent coordination algorithms provide unique insights into the challenging problem of alleviating traffic congestion. What is particularly interesting in this class of proble...
Kagan Tumer, Zachary T. Welch, Adrian K. Agogino