Sciweavers

2652 search results - page 120 / 531
» Privacy-preserving linear programming
Sort
View
GECCO
2004
Springer
115views Optimization» more  GECCO 2004»
15 years 8 months ago
Robotic Control Using Hierarchical Genetic Programming
In this paper, we compare the performance of hierarchical GP methods (Automatically Defined Functions, Module Acquisition, Adaptive Representation through Learning) with the canon...
Marcin L. Pilat, Franz Oppacher
NETWORKS
2006
15 years 3 months ago
A simple algorithm that proves half-integrality of bidirected network programming
In a bidirected graph, each end of each edge is independently oriented. We show how to express any column of the incidence matrix as a half-integral linear combination of any colum...
Ethan D. Bolker, Thomas Zaslavsky
KBSE
2009
IEEE
15 years 10 months ago
Cache-Based Model Checking of Networked Applications: From Linear to Branching Time
Abstract—Many applications are concurrent and communicate over a network. The non-determinism in the thread and communication schedules makes it desirable to model check such sys...
Cyrille Artho, Watcharin Leungwattanakit, Masami H...
118
Voted
FM
2009
Springer
104views Formal Methods» more  FM 2009»
15 years 9 months ago
A Smooth Combination of Linear and Herbrand Equalities for Polynomial Time Must-Alias Analysis
Abstract. We present a new domain for analyzing must-equalities between address expressions. The domain is a smooth combination of Herbrand and affine equalities which enables us t...
Helmut Seidl, Vesal Vojdani, Varmo Vene
SCN
2004
Springer
102views Communications» more  SCN 2004»
15 years 8 months ago
On the Size of Monotone Span Programs
Abstract. Span programs provide a linear algebraic model of computation. Monotone span programs (MSP) correspond to linear secret sharing schemes. This paper studies the properties...
Ventzislav Nikov, Svetla Nikova, Bart Preneel