Sciweavers

2652 search results - page 122 / 531
» Privacy-preserving linear programming
Sort
View
DAM
1998
88views more  DAM 1998»
15 years 2 months ago
Neither Reading Few Bits Twice Nor Reading Illegally Helps Much
We first consider so-called (1,+s)-branching programs in which along every consistent path at most s variables are tested more than once. We prove that any such program computing...
Stasys Jukna, Alexander A. Razborov
WSC
1997
15 years 4 months ago
Taking the Work Out of Simulation Modeling: An Application of Technology Integration
This paper presents an implementation methodology appropriate for providing a broad range of proven, classical Operations Research methods and techniques to the simulation modeler...
Gregory S. Baker
ICTAC
2010
Springer
15 years 1 months ago
A Modality for Safe Resource Sharing and Code Reentrancy
Abstract. The potential of linear logic in facilitating reasoning on resource usage has long been recognized. However, convincing uses of linear types in practical programming are ...
Rui Shi, Dengping Zhu, Hongwei Xi
CVPR
2005
IEEE
15 years 8 months ago
Linear Combination Representation for Outlier Detection in Motion Tracking
In this paper we show that Ullman and Basri’s linear combination (LC) representation, which was originally proposed for alignment-based object recognition, can be used for outli...
Guodong Guo, Charles R. Dyer, Zhengyou Zhang
CAV
2008
Springer
158views Hardware» more  CAV 2008»
15 years 5 months ago
Linear Arithmetic with Stars
We consider an extension of integer linear arithmetic with a "star" operator takes closure under vector addition of the solution set of a linear arithmetic subformula. We...
Ruzica Piskac, Viktor Kuncak