Sciweavers

2652 search results - page 379 / 531
» Privacy-preserving linear programming
Sort
View
PODS
2006
ACM
138views Database» more  PODS 2006»
15 years 10 months ago
Efficiently ordering subgoals with access constraints
d Abstract] Guizhen Yang Artificial Intelligence Center SRI International Menlo Park, CA 94025, USA Michael Kifer Dept. of Computer Science Stony Brook University Stony Brook, NY 1...
Guizhen Yang, Michael Kifer, Vinay K. Chaudhri
95
Voted
CGO
2007
IEEE
15 years 4 months ago
Microarchitecture Sensitive Empirical Models for Compiler Optimizations
This paper proposes the use of empirical modeling techniques for building microarchitecture sensitive models for compiler optimizations. The models we build relate program perform...
Kapil Vaswani, Matthew J. Thazhuthaveetil, Y. N. S...
85
Voted
ATAL
2005
Springer
15 years 3 months ago
Thespian: using multi-agent fitting to craft interactive drama
There has been a growing interest in designing multi-agent based interactive dramas. A key research challenge faced in the design of these systems is to support open-ended user in...
Mei Si, Stacy Marsella, David V. Pynadath
93
Voted
BMCBI
2006
240views more  BMCBI 2006»
14 years 10 months ago
Statistical analysis of real-time PCR data
Background: Even though real-time PCR has been broadly applied in biomedical sciences, data processing procedures for the analysis of quantitative real-time PCR are still lacking;...
Joshua S. Yuan, Ann Reed, Feng Chen, C. Neal Stewa...
TOPLAS
2008
81views more  TOPLAS 2008»
14 years 10 months ago
Size-change termination with difference constraints
lem of inferring termination from such abstract information is not the halting problem for programs and may well be decidable. If this is the case, the decision algorithm forms a &...
Amir M. Ben-Amram