Sciweavers

5344 search results - page 1054 / 1069
» Privacy-Preserving Set Operations
Sort
View
JASIS
2010
262views more  JASIS 2010»
15 years 29 days ago
New event detection and topic tracking in Turkish
Topic detection and tracking (TDT) applications aim to organize the temporally ordered stories of a news stream according to the events. Two major problems in TDT are new event de...
Fazli Can, Seyit Kocberber, Ozgur Baglioglu, Suley...
156
Voted
JBCS
2010
152views more  JBCS 2010»
15 years 29 days ago
Evolution support in heterogeneous service-oriented landscapes
We present an incarnation of the Enterprise Physics vision sketched in [3] that provides automatic or semi-automatic support for evolution and change management in heterogeneous le...
Tiziana Margaria, Bernhard Steffen, Christian Kubc...
LATIN
2010
Springer
15 years 28 days ago
On Quadratic Threshold CSPs
A predicate P : {−1, 1}k → {0, 1} can be associated with a constraint satisfaction problem Max CSP(P). P is called “approximation resistant” if Max CSP(P) cannot be approxi...
Per Austrin, Siavosh Benabbas, Avner Magen
121
Voted
MICS
2010
81views more  MICS 2010»
15 years 28 days ago
Tactics for Hierarchical Proof
Abstract. There is something of a discontinuity at the heart of popular tactical theorem provers. Low-level, fully-checked mechanical proofs are large trees consisting of primitive...
David Aspinall, Ewen Denney, Christoph Lüth
175
Voted
OOPSLA
2010
Springer
15 years 28 days ago
Hera-JVM: a runtime system for heterogeneous multi-core architectures
Heterogeneous multi-core processors, such as the IBM Cell processor, can deliver high performance. However, these processors are notoriously difficult to program: different cores...
Ross McIlroy, Joe Sventek
« Prev « First page 1054 / 1069 Last » Next »