Sciweavers

5255 search results - page 938 / 1051
» Formal Methods for Privacy
Sort
View
123
Voted
ICSE
2010
IEEE-ACM
15 years 6 months ago
STORM: static unit checking of concurrent programs
Concurrency is inherent in today’s software. Unexpected interactions between concurrently executing threads often cause subtle bugs in concurrent programs. Such bugs are hard to...
Zvonimir Rakamaric
124
Voted
DBPL
2007
Springer
103views Database» more  DBPL 2007»
15 years 6 months ago
Datalog Programs over Infinite Databases, Revisited
Traditionally, infinite databases were studied as a data model for queries that may contain function symbols (since functions may be expressed as infinite relations). Recently, th...
Sara Cohen, Joseph Gil, Evelina Zarivach
DAC
2010
ACM
15 years 6 months ago
An efficient algorithm to verify generalized false paths
Timing exception verification has become a center of interest as incorrect constraints can lead to chip failures. Proving that a false path is valid or not is a difficult problem ...
Olivier Coudert
KDD
2010
ACM
244views Data Mining» more  KDD 2010»
15 years 6 months ago
Connecting the dots between news articles
The process of extracting useful knowledge from large datasets has become one of the most pressing problems in today’s society. The problem spans entire sectors, from scientists...
Dafna Shahaf, Carlos Guestrin
109
Voted
KDD
2010
ACM
195views Data Mining» more  KDD 2010»
15 years 6 months ago
Universal multi-dimensional scaling
In this paper, we propose a unified algorithmic framework for solving many known variants of MDS. Our algorithm is a simple iterative scheme with guaranteed convergence, and is m...
Arvind Agarwal, Jeff M. Phillips, Suresh Venkatasu...