Sciweavers

5344 search results - page 1054 / 1069
» Privacy-Preserving Set Operations
Sort
View
JASIS
2010
262views more  JASIS 2010»
14 years 10 months ago
New event detection and topic tracking in Turkish
Topic detection and tracking (TDT) applications aim to organize the temporally ordered stories of a news stream according to the events. Two major problems in TDT are new event de...
Fazli Can, Seyit Kocberber, Ozgur Baglioglu, Suley...
JBCS
2010
152views more  JBCS 2010»
14 years 10 months ago
Evolution support in heterogeneous service-oriented landscapes
We present an incarnation of the Enterprise Physics vision sketched in [3] that provides automatic or semi-automatic support for evolution and change management in heterogeneous le...
Tiziana Margaria, Bernhard Steffen, Christian Kubc...
LATIN
2010
Springer
14 years 10 months ago
On Quadratic Threshold CSPs
A predicate P : {−1, 1}k → {0, 1} can be associated with a constraint satisfaction problem Max CSP(P). P is called “approximation resistant” if Max CSP(P) cannot be approxi...
Per Austrin, Siavosh Benabbas, Avner Magen
MICS
2010
81views more  MICS 2010»
14 years 10 months ago
Tactics for Hierarchical Proof
Abstract. There is something of a discontinuity at the heart of popular tactical theorem provers. Low-level, fully-checked mechanical proofs are large trees consisting of primitive...
David Aspinall, Ewen Denney, Christoph Lüth
OOPSLA
2010
Springer
14 years 10 months ago
Hera-JVM: a runtime system for heterogeneous multi-core architectures
Heterogeneous multi-core processors, such as the IBM Cell processor, can deliver high performance. However, these processors are notoriously difficult to program: different cores...
Ross McIlroy, Joe Sventek
« Prev « First page 1054 / 1069 Last » Next »