Sciweavers

2652 search results - page 117 / 531
» Privacy-preserving linear programming
Sort
View
243
Voted
POPL
2009
ACM
16 years 3 months ago
SPEED: precise and efficient static estimation of program computational complexity
This paper describes an inter-procedural technique for computing symbolic bounds on the number of statements a procedure executes in terms of its scalar inputs and user-defined qu...
Sumit Gulwani, Krishna K. Mehra, Trishul M. Chilim...
ICIP
2003
IEEE
16 years 4 months ago
Linear approximations for rate control in video coding
An efficient method for rate control is illustrated for joint source-channel rate selection and for encoding under multiple leaky bucket buffer constraints. This method shows adva...
Yegnaswamy Sermadevi, Sheila S. Hemami
CADE
2005
Springer
16 years 3 months ago
A Focusing Inverse Method Theorem Prover for First-Order Linear Logic
We present the theory and implementation of a theorem prover for first-order intuitionistic linear logic based on the inverse method. The central proof-theoretic insights underlyin...
Kaustuv Chaudhuri, Frank Pfenning
EUROGP
2001
Springer
15 years 7 months ago
Exact Schema Theorems for GP with One-Point and Standard Crossover Operating on Linear Structures and Their Application to the S
In this paper, firstly we specialise the exact GP schema theorem for one-point crossover to the case of linear structures of variable length, for example binary strings or program...
Riccardo Poli, Nicholas Freitag McPhee
ORL
2008
111views more  ORL 2008»
15 years 3 months ago
Certificates of linear mixed integer infeasibility
A central result in the theory of integer optimization states that a system of linear diophantine equations Ax = b has no integral solution if and only if there exists a vector in...
Kent Andersen, Quentin Louveaux, Robert Weismantel