Sciweavers

2356 search results - page 93 / 472
» Characterizations of postman sets
Sort
View
APPROX
2010
Springer
168views Algorithms» more  APPROX 2010»
15 years 6 months ago
Differential Privacy and the Fat-Shattering Dimension of Linear Queries
In this paper, we consider the task of answering linear queries under the constraint of differential privacy. This is a general and well-studied class of queries that captures oth...
Aaron Roth
AMAI
2006
Springer
15 years 4 months ago
Strong and uniform equivalence of nonmonotonic theories - an algebraic approach
We show that the concepts of strong and uniform equivalence of logic programs eneralized to an abstract algebraic setting of operators on complete lattices. Our results imply char...
Miroslaw Truszczynski
LOGCOM
2007
92views more  LOGCOM 2007»
15 years 4 months ago
Third-Order Computation and Bounded Arithmetic
Abstract. We describe a natural generalization of ordinary computation to a third-order setting and give a function calculus with nice properties and recursion-theoretic characteri...
Alan Skelley
VMCAI
2005
Springer
15 years 10 months ago
Generalized Typestate Checking for Data Structure Consistency
Abstract. We present an analysis to verify abstract set specifications for programs that use object field values to determine the membership of objects in abstract sets. In our a...
Patrick Lam, Viktor Kuncak, Martin C. Rinard
DM
2008
137views more  DM 2008»
15 years 4 months ago
Nordhaus-Gaddum results for restrained domination and total restrained domination in graphs
Let G = (V, E) be a graph. A set S V is a total restrained dominating set if every vertex is adjacent to a vertex in S and every vertex of V - S is adjacent to a vertex in V - S....
Johannes H. Hattingh, Elizabeth Jonck, Ernst J. Jo...