Sciweavers

235 search results - page 35 / 47
» Dependent ML An approach to practical programming with depen...
Sort
View
TCS
2008
13 years 7 months ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld
PASTE
2004
ACM
14 years 29 days ago
Resolving and applying constraint queries on context-sensitive analyses
A context-sensitive analysis is an analysis in which program elements are assigned sets of properties that depend upon the context in which they occur. For analyses on imperative ...
James Ezick
COLT
2005
Springer
14 years 1 months ago
A PAC-Style Model for Learning from Labeled and Unlabeled Data
Abstract. There has been growing interest in practice in using unlabeled data together with labeled data in machine learning, and a number of different approaches have been develo...
Maria-Florina Balcan, Avrim Blum
JMLR
2010
88views more  JMLR 2010»
13 years 2 months ago
Unsupervised Aggregation for Classification Problems with Large Numbers of Categories
Classification problems with a very large or unbounded set of output categories are common in many areas such as natural language and image processing. In order to improve accurac...
Ivan Titov, Alexandre Klementiev, Kevin Small, Dan...
PRDC
2006
IEEE
14 years 1 months ago
Towards Timely ACID Transactions in DBMS
On-time data management is becoming a key difficulty faced by the information infrastructure of most organizations. In fact, database applications for critical areas are increasing...
Marco Vieira, António Casimiro Costa, Henri...