Sciweavers

5344 search results - page 155 / 1069
» Privacy-Preserving Set Operations
Sort
View
CODAS
1996
157views more  CODAS 1996»
15 years 4 months ago
Flexible Workflow Framework for Supporting Collaborative Works
Database technologies are indispensable for workflow management system, one of the remarkable groupware supporting asynchronous distributed cooperative work. In this paper, a form...
Takeo Kunishima, Kazumasa Yokota
JOLLI
2008
67views more  JOLLI 2008»
15 years 3 months ago
Optionality, Scope, and Licensing: An Application of Partially Ordered Categories
Abstract. This paper uses a partially ordered set of syntactic categories to accommodate optionality and licensing in natural language syntax. A complex but well-studied data set p...
Raffaella Bernardi, Anna Szabolcsi
ENTCS
2007
108views more  ENTCS 2007»
15 years 3 months ago
Simulating and Compiling Code for the Sequential Quantum Random Access Machine
We present the SQRAM architecture for quantum computing, which is based on Knill’s QRAM model. We detail a suitable instruction set, which implements a universal set of quantum ...
Rajagopal Nagarajan, Nikolaos Papanikolaou, David ...
166
Voted
ORL
2011
14 years 6 months ago
Random half-integral polytopes
We show that half-integral polytopes obtained as the convex hull of a random set of half-integral points of the 0/1 cube have rank as high as Ω(log n/ log log n) with positive pr...
Gábor Braun, Sebastian Pokutta
CGO
2004
IEEE
15 years 7 months ago
Probabilistic Predicate-Aware Modulo Scheduling
Predicated execution enables the removal of branches by converting segments of branching code into sequences of conditional operations. An important side effect of this transforma...
Mikhail Smelyanskiy, Scott A. Mahlke, Edward S. Da...