Sciweavers

620 search results - page 60 / 124
» Likelihood Computations Using Value Abstraction
Sort
View
ICTAC
2005
Springer
14 years 3 months ago
On Typing Information Flow
Abstract. We investigate the issue of typing confidentiality in a languagebased information-flow security approach, aiming at improving some previously proposed type systems, esp...
Gérard Boudol
ICTCS
2005
Springer
14 years 3 months ago
A Typed Semantics of Higher-Order Store and Subtyping
Abstract. We consider a call-by-value language, with higher-order functions, records, references to values of arbitrary type, and subtyping. We adapt an intrinsic denotational mode...
Jan Schwinghammer
TOC
2008
89views more  TOC 2008»
13 years 9 months ago
Norms, XOR Lemmas, and Lower Bounds for Polynomials and Protocols
Abstract: This paper presents a unified and simple treatment of basic questions concerning two computational models: multiparty communication complexity and polynomials over GF(2)....
Emanuele Viola, Avi Wigderson
ICDCS
2010
IEEE
14 years 1 months ago
Adam2: Reliable Distribution Estimation in Decentralised Environments
Abstract—To enable decentralised actions in very large distributed systems, it is often important to provide the nodes with global knowledge about the values of attributes across...
Jan Sacha, Jeff Napper, Corina Stratan, Guillaume ...
KI
2010
Springer
13 years 8 months ago
An Extensible Modular Recognition Concept That Makes Activity Recognition Practical
Abstract. In mobile and ubiquitous computing, there is a strong need for supporting different users with different interests, needs, and demands. Activity recognition systems for c...
Martin Berchtold, Matthias Budde, Hedda Rahel Schm...