Sciweavers

2652 search results - page 166 / 531
» Privacy-preserving linear programming
Sort
View
FSS
2006
86views more  FSS 2006»
15 years 3 months ago
An omission approach for detecting outliers in fuzzy regression models
Since Tanaka et al. in 1982 proposed a study in linear regression with a fuzzy model, fuzzy regression analysis has been widely studied and applied in various areas. However, Tana...
Wen-Liang Hung, Miin-Shen Yang
137
Voted
JDA
2006
85views more  JDA 2006»
15 years 3 months ago
Average case analysis of DJ graphs
Abstract. Sreedhar et al. [SGL98, Sre95] have presented an eliminationbased algorithm to solve data flow problems. A thorough analysis of the algorithm shows that the worst-case pe...
Johann Blieberger
RR
2010
Springer
15 years 1 months ago
Defeasibility in Answer Set Programs via Argumentation Theories
Defeasible reasoning has been studied extensively in the last two decades and many different and dissimilar approaches are currently on the table. This multitude of ideas has made...
Hui Wan, Michael Kifer, Benjamin N. Grosof
144
Voted
NJC
2000
169views more  NJC 2000»
15 years 3 months ago
A Type System for Bounded Space and Functional In-Place Update
We show how linear typing can be used to obtain functional programs which modify heap-allocated data structures in place. We present this both as a "design pattern" for ...
Martin Hofmann
ASPDAC
2000
ACM
159views Hardware» more  ASPDAC 2000»
15 years 7 months ago
Analytical minimization of half-perimeter wirelength
Global placement of hypergraphs is critical in the top-down placement of large timing-driven designs 10, 16 . Placement quality is evaluated in terms of the half-perimeter wirelen...
Andrew A. Kennings, Igor L. Markov