Sciweavers

17789 search results - page 3351 / 3558
» Exceptional Use Cases
Sort
View
POPL
2009
ACM
16 years 5 months ago
Compositional shape analysis by means of bi-abduction
This paper describes a compositional shape analysis, where each procedure is analyzed independently of its callers. The analysis uses an abstract domain based on a restricted frag...
Cristiano Calcagno, Dino Distefano, Peter W. O'Hea...
STOC
2009
ACM
159views Algorithms» more  STOC 2009»
16 years 5 months ago
Message passing algorithms and improved LP decoding
Linear programming decoding for low-density parity check codes (and related domains such as compressed sensing) has received increased attention over recent years because of its p...
Sanjeev Arora, Constantinos Daskalakis, David Steu...
STOC
2009
ACM
160views Algorithms» more  STOC 2009»
16 years 5 months ago
CSP gaps and reductions in the lasserre hierarchy
We study integrality gaps for SDP relaxations of constraint satisfaction problems, in the hierarchy of SDPs defined by Lasserre. Schoenebeck [25] recently showed the first integra...
Madhur Tulsiani
CCS
2009
ACM
16 years 5 months ago
A conceptual framework for Group-Centric secure information sharing
In this paper, we propose a conceptual framework for developing a family of models for Group-Centric information sharing. The traditional approach to information sharing, characte...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...
CHI
2009
ACM
16 years 5 months ago
StoryTags: once upon a time, there was a photo
Nuno Tom?s Daniel Gon?alves With the growing volume of digital information users must deal with, management and retrieval tasks have become increasingly problematic. A popular way ...
Nuno Tomás, Tiago João Vieira Guerre...
« Prev « First page 3351 / 3558 Last » Next »