Sciweavers

2652 search results - page 269 / 531
» Privacy-preserving linear programming
Sort
View
HASKELL
2008
ACM
15 years 4 months ago
Lightweight monadic regions
We present Haskell libraries that statically ensure the safe use of resources such as file handles. We statically prevent accessing an already closed handle or forgetting to clos...
Oleg Kiselyov, Chung-chieh Shan
227
Voted
CONCUR
2011
Springer
14 years 3 months ago
Reasoning about Threads with Bounded Lock Chains
The problem of model checking threads interacting purely via the standard synchronization primitives is key for many concurrent program analyses, particularly dataflow analysis. U...
Vineet Kahlon
ICCV
2005
IEEE
16 years 5 months ago
A New Framework for Approximate Labeling via Graph Cuts
A new framework is presented that uses tools from duality theory of linear programming to derive graph-cut based combinatorial algorithms for approximating NP-hard classification ...
Nikos Komodakis, Georgios Tziritas
113
Voted
ICIP
2000
IEEE
16 years 5 months ago
Effective Channel Coding for DCT Watermarks
We describe effective channel coding strategies which can be used in conjunction with linear programming optimization techniques for the embedding of robust perceptually adaptive ...
Shelby Pereira, Sviatoslav Voloshynovskiy, Thierry...
ICCD
2000
IEEE
116views Hardware» more  ICCD 2000»
16 years 15 days ago
Representing and Scheduling Looping Behavior Symbolically
This paper presents a very general, exact technique for scheduling looping data-flow graphs. In contrast to the conventional technique using loop iteration variables and integer ...
Steve Haynal, Forrest Brewer