Sciweavers

2482 search results - page 352 / 497
» Characterizing Programming Systems Allowing Program Self-ref...
Sort
View
ICDE
2008
IEEE
129views Database» more  ICDE 2008»
14 years 11 months ago
Optimal Boolean Matrix Decomposition: Application to Role Engineering
Abstract-- A decomposition of a binary matrix into two matrices gives a set of basis vectors and their appropriate combination to form the original matrix. Such decomposition solut...
Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri
POPL
2005
ACM
14 years 10 months ago
Enterprise privacy promises and enforcement
Several formal languages have been proposed to encode privacy policies, ranging from the Platform for Privacy Preferences (P3P), intended for communicating privacy policies to con...
Adam Barth, John C. Mitchell
CDC
2008
IEEE
145views Control Systems» more  CDC 2008»
14 years 4 months ago
Parameter estimation with expected and residual-at-risk criteria
In this paper we study a class of uncertain linear estimation problems in which the data are affected by random uncertainty. In this setting, we consider two estimation criteria,...
Giuseppe Carlo Calafiore, Ufuk Topcu, Laurent El G...
GECCO
2005
Springer
151views Optimization» more  GECCO 2005»
14 years 3 months ago
The application of antigenic search techniques to time series forecasting
Time series have been a major topic of interest and analysis for hundreds of years, with forecasting a central problem. A large body of analysis techniques has been developed, par...
Ian Nunn, Tony White
TLDI
2005
ACM
151views Formal Methods» more  TLDI 2005»
14 years 3 months ago
Strict bidirectional type checking
Completely annotated lambda terms (such as are arrived at via the straightforward encodings of various types from System F) contain much redundant type information. Consequently, ...
Adam J. Chlipala, Leaf Petersen, Robert Harper