Sciweavers

5344 search results - page 81 / 1069
» Privacy-Preserving Set Operations
Sort
View
DIGRA
2005
Springer
14 years 3 months ago
CameraBots: Cinematography for Games with Non-Player Characters as Camera Operators
Cinematography describes principles and techniques pertaining to the effective use of cameras to film live action. The correct application of these principles and techniques produ...
James Kneafsey, Hugh McCabe
BIRTHDAY
2004
Springer
14 years 1 months ago
On Model Checking Data-Independent Systems with Arrays with Whole-Array Operations
Abstract. We consider programs which are data independent with respect to two type variables X and Y , and can in addition use arrays indexed by X and storing values from Y . We ar...
Ranko Lazic, Thomas Christopher Newcomb, A. W. Ros...
ECOOPWEXCEPTION
2006
Springer
14 years 1 months ago
Exception Handling in the Choices Operating System
Exception handling is a powerful abstraction that can be used to help manage errors and support the construction of reliable operating systems. Using exceptions to notify system co...
Francis M. David, Jeffrey C. Carlyle, Ellick Chan,...
ENTCS
2008
120views more  ENTCS 2008»
13 years 10 months ago
Reasoning about B+ Trees with Operational Semantics and Separation Logic
The B+ tree is an ordered tree structure with a fringe list. It is the most widely used data structure for data organisation and searching in database systems specifically, and, p...
Alan P. Sexton, Hayo Thielecke
ENTCS
2006
125views more  ENTCS 2006»
13 years 10 months ago
Formalizing Type Operations Using the "Image" Type Constructor
In this paper we introduce a new approach to formalizing certain type operations in type theory. Traditionally, many type constructors in type theory are independently axiomatized...
Aleksey Nogin, Alexei Kopylov