Sciweavers

2652 search results - page 135 / 531
» Privacy-preserving linear programming
Sort
View
MP
2002
113views more  MP 2002»
15 years 2 months ago
A note on sensitivity of value functions of mathematical programs with complementarity constraints
Using standard nonlinear programming (NLP) theory, we establish formulas for first and second order directional derivatives for optimal value functions of parametric mathematical ...
Xinmin Hu, Daniel Ralph
AMAI
2008
Springer
15 years 3 months ago
Stable models and difference logic
The paper studies the relationship between logic programs with the stable model semantics and difference logic recently considered in the Satisfiability Modulo Theories framework....
Ilkka Niemelä
ISCAS
2003
IEEE
97views Hardware» more  ISCAS 2003»
15 years 8 months ago
Optimal design of FIR frequency-response-masking filters using second-order cone programming
Since Limís 1986 paper on the frequency-response masking (FRM) technique for the design of FIR digital Ýlters with very small transition widths, the analysis and design of FRM ...
Wu-Sheng Lu, Takao Hinamoto
CDC
2009
IEEE
138views Control Systems» more  CDC 2009»
15 years 7 months ago
Semidefinite programming methods for system realization and identification
We describe semidefinite programming methods for system realization and identification. For each of these two applications, a variant of a simple subspace algorithm is presented, i...
Zhang Liu, Lieven Vandenberghe
NAACL
2007
15 years 4 months ago
Joint Determination of Anaphoricity and Coreference Resolution using Integer Programming
Standard pairwise coreference resolution systems are subject to errors resulting from their performing anaphora identification as an implicit part of coreference resolution. In t...
Pascal Denis, Jason Baldridge