Sciweavers

5344 search results - page 146 / 1069
» Privacy-Preserving Set Operations
Sort
View
INFORMATICALT
2007
111views more  INFORMATICALT 2007»
15 years 3 months ago
Sequent Calculi for Branching Time Temporal Logics of Knowledge and Belief
In this paper we consider branching time temporal logics of knowledge and belief. These logics involve the discrete time linear temporal logic operators “next” and “until” ...
Jurate Sakalauskaite
TOG
2002
170views more  TOG 2002»
15 years 2 months ago
Cut-and-paste editing of multiresolution surfaces
Cutting and pasting to combine different elements into a common structure are widely used operations that have been successfully adapted to many media types. Surface design could ...
Henning Biermann, Ioana M. Martin, Fausto Bernardi...
125
Voted
TCS
2011
14 years 10 months ago
Block insertion and deletion on trajectories
In this paper, we introduce block insertion and deletion on trajectories, which provide us with a new framework to study properties of language operations. With the parallel synta...
Bo Cui, Lila Kari, Shinnosuke Seki
OSDI
1996
ACM
15 years 4 months ago
Automatic Compiler-Inserted I/O Prefetching for Out-of-Core Applications
Current operating systems offer poor performance when a numeric application's working set does not fit in main memory. As a result, programmers who wish to solve "out-of...
Todd C. Mowry, Angela K. Demke, Orran Krieger
SOSP
2005
ACM
16 years 4 days ago
The taser intrusion recovery system
Recovery from intrusions is typically a very time-consuming operation in current systems. At a time when the cost of human resources dominates the cost of computing resources, we ...
Ashvin Goel, Kenneth Po, Kamran Farhadi, Zheng Li,...