Sciweavers

5344 search results - page 159 / 1069
» Privacy-Preserving Set Operations
Sort
View
DISOPT
2008
82views more  DISOPT 2008»
15 years 3 months ago
Note on pseudolattices, lattices and submodular linear programs
A pseudolattice L is a poset with lattice-type binary operations. Assuming that the pseudolattice permits a modular representation as a family of subsets of a set U with certain c...
Ulrich Faigle, Britta Peis
COMBINATORICS
2006
126views more  COMBINATORICS 2006»
15 years 3 months ago
The Induced Subgraph Order on Unlabelled Graphs
A differential poset is a partially ordered set with raising and lowering operators U and D which satisfy the commutation relation DU-UD = rI for some constant r. This notion may ...
Craig A. Sloss
INFORMATICALT
2006
115views more  INFORMATICALT 2006»
15 years 3 months ago
Sequent Calculi for Temporal Logics of Common Knowledge and Belief
In this paper we consider two logics: temporal logic of common knowledge and temporal logic of common belief. These logics involve the discrete time linear temporal logic operators...
Jurate Sakalauskaite
INFSOF
2007
148views more  INFSOF 2007»
15 years 3 months ago
Mutating database queries
A set of mutation operators for SQL queries that retrieve information from a database is developed and tested against a set of queries drawn from the NIST SQL Conformance Test Sui...
Javier Tuya, María José Suáre...
MICRO
1994
IEEE
85views Hardware» more  MICRO 1994»
15 years 7 months ago
A high-performance microarchitecture with hardware-programmable functional units
This paper explores a novel way to incorporate hardware-programmable resources into a processor microarchitecture to improve the performance of general-purpose applications. Throu...
Rahul Razdan, Michael D. Smith