Sciweavers

1710 search results - page 226 / 342
» High-Level Programs and Program Conditions
Sort
View
UAI
1996
13 years 11 months ago
Bucket elimination: A unifying framework for probabilistic inference
Probabilistic inference algorithms for belief updating, nding the most probable explanation, the maximum a posteriori hypothesis, and the maximum expected utility are reformulated...
Rina Dechter
ECCC
2002
103views more  ECCC 2002»
13 years 9 months ago
Monotone complexity and the rank of matrices
We shall give simpler proofs of some lower bounds on monotone computations. We describe a simple condition on combinatorial structures, such that the rank of the matrix associated...
Pavel Pudlák
SIGCSE
2002
ACM
163views Education» more  SIGCSE 2002»
13 years 9 months ago
Design guidelines for the lab component of objects-first CS1
We adopt the view that CS1 labs are not programming assignments, and that they should not be used for grading students or assessing their level of understanding. Instead, we think...
Hamzeh Roumani
SP
2002
IEEE
161views Security Privacy» more  SP 2002»
13 years 9 months ago
Improving Computer Security Using Extended Static Checking
We describe a method for finding security flaws in source code by way of static analysis. The method is notable because it allows a user to specify a wide range of security proper...
Brian Chess
CDC
2009
IEEE
124views Control Systems» more  CDC 2009»
13 years 7 months ago
A graph-theoretic approach to distributed control over networks
We consider a network of control systems connected over a graph. Considering the graph structure as constraints on the set of permissible controllers, we show that such systems ar...
John Swigart, Sanjay Lall