Sciweavers

1603 search results - page 236 / 321
» Universal Confidence Sets for Solutions of Optimization Prob...
Sort
View
SEBD
2007
148views Database» more  SEBD 2007»
14 years 11 months ago
Containment of Conjunctive Object Meta-Queries
We consider the problem of query containment over an object data model derived from F-logic. F-logic has generated considerable interest commercially, in the academia, and within ...
Andrea Calì, Michael Kifer
CCCG
1994
14 years 11 months ago
Widest Empty Corridor with Multiple Links and Right-angle Turns
We formulate the problem of computing the widest empty corridor with at most ` links and right-angle turns for a set of n points. It is a generalization of the widest empty corrid...
Siu-Wing Cheng
STOC
2007
ACM
142views Algorithms» more  STOC 2007»
15 years 10 months ago
Lower bounds for randomized read/write stream algorithms
Motivated by the capabilities of modern storage architectures, we consider the following generalization of the data stream model where the algorithm has sequential access to multi...
Paul Beame, T. S. Jayram, Atri Rudra
STOC
2009
ACM
168views Algorithms» more  STOC 2009»
15 years 11 months ago
Fault-tolerant spanners for general graphs
The paper concerns graph spanners that are resistant to vertex or edge failures. Given a weighted undirected n-vertex graph G = (V, E) and an integer k 1, the subgraph H = (V, E ...
Shiri Chechik, Michael Langberg, David Peleg, Liam...
PASTE
2004
ACM
15 years 3 months ago
Resolving and applying constraint queries on context-sensitive analyses
A context-sensitive analysis is an analysis in which program elements are assigned sets of properties that depend upon the context in which they occur. For analyses on imperative ...
James Ezick