Sciweavers

5344 search results - page 163 / 1069
» Privacy-Preserving Set Operations
Sort
View
AIPS
1996
15 years 4 months ago
Computing Parameter Domains as an Aid to Planning
Weshowthat by inferring parametexdomainsof planningoperators,given the definitions of the operators and the initial and goal conditions, we can often speed up the planning process...
Alfonso Gerevini, Lenhart K. Schubert
CCIA
2009
Springer
15 years 4 months ago
Secure and Optimal Base Contraction in Graded Lukasiewicz Logics
Abstract. The operation of base contraction was successfully characterized for a very general class of logics using the notion of remainder sets. Although, in the general case, thi...
Pere Pardo, Pilar Dellunde, Lluis Godo
ENTCS
2008
146views more  ENTCS 2008»
15 years 3 months ago
Complete Laziness: a Natural Semantics
Lazy evaluation (or call-by-need) is widely used and well understood, partly thanks to a clear operational semantics given by Launchbury. However, modern non-strict functional lan...
François-Régis Sinot
VLDB
2002
ACM
135views Database» more  VLDB 2002»
15 years 2 months ago
Monitoring Streams - A New Class of Data Management Applications
This paper introduces monitoring applications, which we will show differ substantially from conventional business data processing. The fact that a software system must process and...
Donald Carney, Ugur Çetintemel, Mitch Chern...
148
Voted
POPL
2012
ACM
13 years 11 months ago
Access permission contracts for scripting languages
The ideal software contract fully specifies the behavior of an operation. Often, in particular in the context of scripting languages, a full specification may be cumbersome to s...
Phillip Heidegger, Annette Bieniusa, Peter Thieman...