Sciweavers

5344 search results - page 196 / 1069
» Privacy-Preserving Set Operations
Sort
View
140
Voted
ICALP
2001
Springer
15 years 8 months ago
An Axiomatic Approach to Metareasoning on Nominal Algebras in HOAS
We present a logical framework Υ for reasoning on a very general class of languages featuring binding operators, called nominal , presented in higher-order abstract syntax (HOAS)....
Furio Honsell, Marino Miculan, Ivan Scagnetto
128
Voted
ICMCS
2000
IEEE
128views Multimedia» more  ICMCS 2000»
15 years 8 months ago
A Genetic Algorithm for Video Segmentation and Summarization
We describe a genetic segmentation algorithm for video. This algorithm operates on segments of a string representation. It is similar to both classical genetic algorithms that ope...
Patrick Chiu, Andreas Girgensohn, Wolfgang Polak, ...
HOTOS
1999
IEEE
15 years 7 months ago
The Case for Higher-Level Power Management
Reducing the energy consumed in the use of computing devices is becoming a major design challenge. While the problem obviously must be addressed with improved low-level technology...
Carla Schlatter Ellis
137
Voted
LICS
1997
IEEE
15 years 7 months ago
Full Abstraction for Functional Languages with Control
traction for Functional Languages with Control James Laird LFCS, Department of Computer Science University of Edinburgh This paper considers the consequences of relaxing the brack...
James Laird
DAC
1994
ACM
15 years 7 months ago
Incorporating Speculative Execution in Exact Control-Dependent Scheduling
- This paper describes a symbolic formulation that allows incorporation of speculative operation execution (preexecution) in an exact control-dependent scheduling of arbitrary forw...
Ivan P. Radivojevic, Forrest Brewer