Sciweavers

5344 search results - page 235 / 1069
» Privacy-Preserving Set Operations
Sort
View
141
Voted
ECP
1997
Springer
105views Robotics» more  ECP 1997»
15 years 8 months ago
Planning, Learning, and Executing in Autonomous Systems
Systems that act autonomously in the environment have to be able to integrate three basic behaviors: planning, execution, and learning. Planning involves describing a set of action...
Ramón García-Martínez, Daniel...
120
Voted
ERLANG
2007
ACM
15 years 7 months ago
Optimising TCP/IP connectivity
With the increased use of network enabled applications and server hosted software systems, scalability with respect to network connectivity is becoming an increasingly important s...
Oscar Hellström
125
Voted
ACNS
2006
Springer
138views Cryptology» more  ACNS 2006»
15 years 7 months ago
Syntax-Driven Private Evaluation of Quantified Membership Queries
Abstract. Membership queries are basic predicate operations that apply to datasets. Quantifications of such queries express global properties between datasets, including subset inc...
Aggelos Kiayias, Antonina Mitrofanova
155
Voted
ASIAN
2006
Springer
152views Algorithms» more  ASIAN 2006»
15 years 7 months ago
Inferring Disjunctive Postconditions
Polyhedral analysis [9] is an abstract interpretation used for automatic discovery of invariant linear inequalities among numerical varia program. Convexity of this abstract domain...
Corneliu Popeea, Wei-Ngan Chin
125
Voted
ECMDAFA
2006
Springer
107views Hardware» more  ECMDAFA 2006»
15 years 7 months ago
Mutation Analysis Testing for Model Transformations
In MDE, model transformations should be efficiently tested so that it may be used and reused safely. Mutation analysis is an efficient technique to evaluate the quality of test dat...
Jean-Marie Mottu, Benoit Baudry, Yves Le Traon