Sciweavers

1528 search results - page 70 / 306
» Implementing Generalized Operator Overloading
Sort
View
118
Voted
ICFP
2007
ACM
16 years 4 months ago
Functional pearl: the great escape or, how to jump the border without getting caught
Filinski showed that callcc and a single mutable reference cell are sufficient to express the delimited control operators shift and reset. However, this implementation interacts p...
David Herman
ECSQARU
2007
Springer
15 years 10 months ago
COBA 2.0: A Consistency-Based Belief Change System
We describe COBA 2.0, an implementation of a consistency-based framework for expressing belief change, focusing on revision and contraction (possibly) incorporating integrity cons...
James P. Delgrande, Daphne H. Liu, Torsten Schaub,...
ICDE
2007
IEEE
128views Database» more  ICDE 2007»
15 years 8 months ago
Realizing Privacy-Preserving Features in Hippocratic Databases
Preserving privacy has become a crucial requirement for operating a business that manages personal data. Hippocratic databases have been proposed to answer this requirement throug...
Yasin Laura-Silva, Walid G. Aref
116
Voted
FPL
2000
Springer
103views Hardware» more  FPL 2000»
15 years 8 months ago
Evaluation of Accelerator Designs for Subgraph Isomorphism Problem
Many applications can be modeled as subgraph isomorphism problems. However, this problem is generally NP-complete and difficult to compute. A custom computing circuit is a prospect...
Shuichi Ichikawa, Hidemitsu Saito, Lerdtanaseangth...
WCET
2008
15 years 6 months ago
Traces as a Solution to Pessimism and Modeling Costs in WCET Analysis
WCET analysis models for superscalar out-of-order CPUs generally need to be pessimistic in order to account for a wide range of possible dynamic behavior. CPU hardware modificatio...
Jack Whitham, Neil C. Audsley