Sciweavers

7988 search results - page 1497 / 1598
» A Useful Undecidable Theory
Sort
View
POPL
2005
ACM
14 years 10 months ago
Enterprise privacy promises and enforcement
Several formal languages have been proposed to encode privacy policies, ranging from the Platform for Privacy Preferences (P3P), intended for communicating privacy policies to con...
Adam Barth, John C. Mitchell
RECOMB
2006
Springer
14 years 10 months ago
Simulating Protein Motions with Rigidity Analysis
Abstract. Protein motions, ranging from molecular flexibility to largescale conformational change, play an essential role in many biochemical processes. Despite the explosion in ou...
Shawna L. Thomas, Xinyu Tang, Lydia Tapia, Nancy M...
CADE
2005
Springer
14 years 10 months ago
Reflecting Proofs in First-Order Logic with Equality
Our general goal is to provide better automation in interactive proof assistants such as Coq. We present an interpreter of proof traces in first-order multi-sorted logic with equal...
Evelyne Contejean, Pierre Corbineau
STOC
2007
ACM
239views Algorithms» more  STOC 2007»
14 years 10 months ago
Approximating minimum bounded degree spanning trees to within one of optimal
In the MINIMUM BOUNDED DEGREE SPANNING TREE problem, we are given an undirected graph with a degree upper bound Bv on each vertex v, and the task is to find a spanning tree of min...
Mohit Singh, Lap Chi Lau
STOC
2006
ACM
130views Algorithms» more  STOC 2006»
14 years 10 months ago
On the fourier tails of bounded functions over the discrete cube
In this paper we consider bounded real-valued functions over the discrete cube, f : {-1, 1}n [-1, 1]. Such functions arise naturally in theoretical computer science, combinatorics...
Irit Dinur, Ehud Friedgut, Guy Kindler, Ryan O'Don...
« Prev « First page 1497 / 1598 Last » Next »