Sciweavers

6978 search results - page 1275 / 1396
» On Proofs in System P
Sort
View
IWMM
2010
Springer
125views Hardware» more  IWMM 2010»
13 years 11 months ago
Efficient memory shadowing for 64-bit architectures
Shadow memory is used by dynamic program analysis tools to store metadata for tracking properties of application memory. The efficiency of mapping between application memory and s...
Qin Zhao, Derek Bruening, Saman P. Amarasinghe
PKC
2010
Springer
161views Cryptology» more  PKC 2010»
13 years 11 months ago
Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model
ded abstract of this paper appears in 13th International Conference on Practice and Theory in Public Key Cryptography (PKC) 2010, Lecture Notes in Computer Science Vol. ?, P. Nguye...
Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, Vi...
AIIA
2007
Springer
13 years 11 months ago
Tonal Harmony Analysis: A Supervised Sequential Learning Approach
We have recently presented CarpeDiem, an algorithm that can be used for speeding up the evaluation of Supervised Sequential Learning (SSL) classifiers. CarpeDiem provides impress...
Daniele P. Radicioni, Roberto Esposito
EWRL
2008
13 years 11 months ago
New Error Bounds for Approximations from Projected Linear Equations
We consider linear fixed point equations and their approximations by projection on a low dimensional subspace. We derive new bounds on the approximation error of the solution, whi...
Huizhen Yu, Dimitri P. Bertsekas
IMC
2007
ACM
13 years 10 months ago
Measurement and analysis of online social networks
Online social networking sites like Orkut, YouTube, and Flickr are among the most popular sites on the Internet. Users of these sites form a social network, which provides a power...
Alan Mislove, Massimiliano Marcon, P. Krishna Gumm...
« Prev « First page 1275 / 1396 Last » Next »