Sciweavers

2652 search results - page 225 / 531
» Privacy-preserving linear programming
Sort
View
SEKE
2001
Springer
15 years 8 months ago
Temporal Logic Properties of Java Objects
ct 7 Applying finite-state verification techniques to software systems looks attractive because they are capable of detecting very subtle 8 defects in the logic design of these s...
Radu Iosif, Riccardo Sisto
IFL
1998
Springer
113views Formal Methods» more  IFL 1998»
15 years 8 months ago
Shared Memory Multiprocessor Support for SAC
Abstract. Sac (Single Assignment C) is a strict, purely functional programming language primarily designed with numerical applications in mind. Particular emphasis is on efficient ...
Clemens Grelck
PLDI
1997
ACM
15 years 8 months ago
Data-centric Multi-level Blocking
We present a simple and novel framework for generating blocked codes for high-performance machines with a memory hierarchy. Unlike traditional compiler techniques like tiling, whi...
Induprakas Kodukula, Nawaaz Ahmed, Keshav Pingali
FSTTCS
2006
Springer
15 years 7 months ago
Approximation Algorithms for 2-Stage Stochastic Optimization Problems
Abstract. Stochastic optimization is a leading approach to model optimization problems in which there is uncertainty in the input data, whether from measurement noise or an inabili...
Chaitanya Swamy, David B. Shmoys
KONVENS
2000
15 years 7 months ago
Automatic Labeling of Prosodic Events
An approach for a program is presented that automatically detects the position of pitch accents and intonation phrase (IP) boundaries from waveforms. The technique maps acoustic c...
Norbert Braunschweiler