Sciweavers

2652 search results - page 195 / 531
» Privacy-preserving linear programming
Sort
View
CAV
2001
Springer
119views Hardware» more  CAV 2001»
15 years 8 months ago
Certifying Model Checkers
Model Checking is an algorithmic technique to determine whether a temporal property holds of a program. For linear time properties, a model checker produces a counterexample comput...
Kedar S. Namjoshi
STOC
1999
ACM
132views Algorithms» more  STOC 1999»
15 years 7 months ago
A Polynomial Combinatorial Algorithm for Generalized Minimum Cost Flow
We propose the first combinatorial solution to one of the most classic problems in combinatorial optimization: the generalized minimum cost flow problem (flow with losses and g...
Kevin D. Wayne
198
Voted
PLDI
1998
ACM
15 years 7 months ago
Quality and Speed in Linear-scan Register Allocation
A linear-scan algorithm directs the global allocation of register candidates to registers based on a simple linear sweep over the program being compiled. This approach to register...
Omri Traub, Glenn H. Holloway, Michael D. Smith
123
Voted
PPDP
2000
Springer
15 years 7 months ago
Enhanced sharing analysis techniques: a comprehensive evaluation
an abstract domain developed by D. Jacobs and A. Langen for the analysis of logic programs, derives useful aliasing information. It is well-known that a commonly used core of tech...
Roberto Bagnara, Enea Zaffanella, Patricia M. Hill
97
Voted
CCE
2008
15 years 3 months ago
Simultaneous targeting and design for cooling water systems with multiple cooling water supplies
This paper presents a technique for simultaneous targeting and design in cooling water systems comprising of at least two cooling towers and several cooling water using operations...
Thokozani Majozi, Anand Moodley