Sciweavers

1888 search results - page 58 / 378
» Proof theory and computational analysis
Sort
View

Lecture Notes
742views
15 years 7 months ago
Computer Systems Analysis
Comparing systems using measurement, simulation, and queueing models. Common mistakes and how to avoid them, selection of techniques and metrics, art of data presentation, summariz...
Raj Jain
PODS
2012
ACM
240views Database» more  PODS 2012»
12 years 7 days ago
Approximate computation and implicit regularization for very large-scale data analysis
Database theory and database practice are typically the domain of computer scientists who adopt what may be termed an algorithmic perspective on their data. This perspective is ve...
Michael W. Mahoney
MOBIHOC
2008
ACM
14 years 9 months ago
Self-monitoring for sensor networks
Local monitoring is an effective mechanism for the security of wireless sensor networks (WSNs). Existing schemes assume the existence of sufficient number of active nodes to carry...
Dezun Dong, Yunhao Liu, Xiangke Liao
CHI
2009
ACM
14 years 2 months ago
Interaction criticism and aesthetics
As HCI becomes more self-consciously implicated in culture, theories from cultural studies, in particular aesthetics and critical theory, are increasingly working their way into t...
Jeffrey Bardzell
JACM
2002
122views more  JACM 2002»
13 years 9 months ago
Cosmological lower bound on the circuit complexity of a small problem in logic
An exponential lower bound on the circuit complexity of deciding the weak monadic second-order theory of one successor (WS1S) is proved. Circuits are built from binary operations, ...
Larry J. Stockmeyer, Albert R. Meyer