Sciweavers

1818 search results - page 150 / 364
» Granularity-Adaptive Proof Presentation
Sort
View
120
Voted
CP
2006
Springer
15 years 7 months ago
Global Optimization of Probabilistically Constrained Linear Programs
We consider probabilistic constrained linear programs with general distributions for the uncertain parameters. These problems generally involve non-convex feasible sets. We develo...
Shabbir Ahmed
128
Voted
CRYPTO
2006
Springer
224views Cryptology» more  CRYPTO 2006»
15 years 7 months ago
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical key delegation. We give a proof of security in the standard model, based on the...
Xavier Boyen, Brent Waters
119
Voted
CSCLP
2006
Springer
15 years 7 months ago
Complexity of a CHR Solver for Existentially Quantified Conjunctions of Equations over Trees
Abstract. Constraint Handling Rules (CHR) is a concurrent, committed-choice, rule-based language. One of the first CHR programs is the classic constraint solver for syntactic equal...
Marc Meister, Khalil Djelloul, Thom W. Frühwi...
124
Voted
ESOP
2006
Springer
15 years 7 months ago
Type-Based Amortised Heap-Space Analysis
Abstract. We present a type system for a compile-time analysis of heapspace requirements of Java style object-oriented programs with explicit deallocation. Our system is based on a...
Martin Hofmann, Steffen Jost
137
Voted
AFRIGRAPH
2001
ACM
15 years 7 months ago
Exploiting coherence of shadow rays
We present independent method to reduce the number of shadow ray tests. It can be used with standard acceleration ray tracing algorithms. Our method is conservative and produces t...
Andrzej Lukaszewski