• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 389
Next 10 →

Modular verification of software components in C

by Sagar Chaki, Edmund Clarke, Alex Groce, et al. - IEEE TRANSACTIONS ON SOFTWARE ENGINEERING , 2003
"... We present a new methodology for automatic verification of C programs against finite state machine specifications. Our approach is compositional, naturally enabling us to decompose the verification of large software systems into subproblems of manageable complexity. The decomposition reflects the mo ..."
Abstract - Cited by 233 (23 self) - Add to MetaCart
We present a new methodology for automatic verification of C programs against finite state machine specifications. Our approach is compositional, naturally enabling us to decompose the verification of large software systems into subproblems of manageable complexity. The decomposition reflects

Query Evaluation via Tree-Decompositions

by Jörg Flum, Markus Frick, Martin Grohe - JOURNAL OF THE ACM , 2001
"... A number of efficient methods for evaluating first-order and monadic-second order queries on finite relational structures are based on tree-decompositions of structures or queries. We systematically study these methods. In the first part of the paper we consider arbitrary formulas on tree-like struc ..."
Abstract - Cited by 105 (16 self) - Add to MetaCart
-like formulas on arbitrary structures. We generalize the notions of acyclicity and bounded tree-width from conjunctive queries to arbitrary first-order formulas in a straightforward way and analyze the complexity of evaluating formulas of these fragments. Moreover, we show that the acyclic and bounded tree

Reformulation of xml queries and constraints

by Alin Deutsch, Val Tannen, Alin Deutsch, Val Tannen - In ICDT’03 , 2003
"... Abstract. We state and solve the query reformulation problem for XML publishing in a general setting that allows mixed (XML and relational) storage for the proprietary data and exploits redundancies (materialized views, indexes and caches) to enhance performance. The correspondence between published ..."
Abstract - Cited by 103 (15 self) - Add to MetaCart
published and proprietary schemas is specified by views in both directions, and the same algorithm performs rewriting-with-views, composition-with-views, or the combined effect of both, unifying the Global-As-View and Local-As-View approaches to data integration. We prove a completeness theorem which

Lower bounds for randomized and quantum query complexity using Kolmogorov arguments

by Sophie Laplante - in Proc. of the 19th IEEE Conference on Computational Complexity , 2004
"... Abstract. We prove a very general lower bound technique for quantum and randomized query complexity that is easy to prove as well as to apply. To achieve this, we introduce the use of Kolmogorov complexity to query complexity. Our technique generalizes the weighted and unweighted methods of Ambainis ..."
Abstract - Cited by 50 (3 self) - Add to MetaCart
Abstract. We prove a very general lower bound technique for quantum and randomized query complexity that is easy to prove as well as to apply. To achieve this, we introduce the use of Kolmogorov complexity to query complexity. Our technique generalizes the weighted and unweighted methods

Approximation Theory of Output Statistics

by Te Sun Han, Sergio Verdg - IEEE Trans. Inform. Theory , 1993
"... Abstract-Given a channel and an input process, the minimum randomness of those input processes whose output statistics approximate the original output statistics with arbitrary accuracy is studied. The notion of resolvability of a channel, defined as the number of random bits required per channel us ..."
Abstract - Cited by 171 (11 self) - Add to MetaCart
of the channel coding theorem. Index Terms- Shannon theory, channel output statistics, re-solvability, random number generation complexity; channel ca-pacity, noiseless source coding theorem, identification via chan-nels. T

A strong direct product theorem for quantum query complexity.

by Troy Lee , Jérémie Roland - In Proceedings of the 27th IEEE Conference on Computational Complexity, , 2012
"... Abstract. We show that quantum query complexity satisfies a strong direct product theorem. This means that computing k copies of a function with fewer than k times the quantum queries needed to compute one copy of the function implies that the overall success probability will be exponentially small ..."
Abstract - Cited by 9 (2 self) - Add to MetaCart
Abstract. We show that quantum query complexity satisfies a strong direct product theorem. This means that computing k copies of a function with fewer than k times the quantum queries needed to compute one copy of the function implies that the overall success probability will be exponentially

Kolmogorov Complexity and the Second Incompleteness Theorem

by Makoto Kikuchi - Arch. Math. Logic , 1997
"... : We shall prove the second incompleteness theorem via Kolmogorov complexity. 0. Introduction Kolmogorov complexity is a measure of the quantity of information in nite objects. Roughly speaking, the Kolmogorov complexity of a number n, denoted by K(n), is the size of a program which generates n, ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
: We shall prove the second incompleteness theorem via Kolmogorov complexity. 0. Introduction Kolmogorov complexity is a measure of the quantity of information in nite objects. Roughly speaking, the Kolmogorov complexity of a number n, denoted by K(n), is the size of a program which generates n

Query Evaluation with Constant Delay

by Thèse De Doctorat, Normale Supérieure, De Cachan, Présentée Par, Monsieur Wojciech Kazana, Docteur De, Supérieure De Cachan, Nicole Bidoit, Professeur Président, Arnaud Durand, Patrice Ossona, Mendez Chargé, Victor Vianu, Professeur Examinateur, Luc Segoufin, Directeur Recherche Directeur
"... I am grateful to Luc Segoufin who kindly accepted me to be his PhD student. He introduced me to the problem of query enumeration and encouraged me to look for the answers to all the questions that emerged during our collaboration. He was a truly great advisor, always supportive and available for dis ..."
Abstract - Add to MetaCart
I am grateful to Luc Segoufin who kindly accepted me to be his PhD student. He introduced me to the problem of query enumeration and encouraged me to look for the answers to all the questions that emerged during our collaboration. He was a truly great advisor, always supportive and available

Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles). In: Dwork

by Xavier Boyen , Brent Waters - CRYPTO 2006. LNCS, , 2006
"... Abstract We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical key delegation. We give a proof of security in the standard model, based on the mild Decision Linear complexity assumption in bilinear groups. The system is efficient and practical, with sm ..."
Abstract - Cited by 119 (10 self) - Add to MetaCart
well formed, and the simulator behaved as in game Γ 1 . If instead Y is independent of z 1 , z 2 , s, s 1 , s 2 , which happens when Z is random, then the simulator responded as in game Γ 2 . Phase 2: The simulator answer the query in the same way as Phase 1. Output: The adversary outputs a bit γ

A Compositional Framework for Complex Queries over Uncertain Data

by Michaela Götz, Christoph Koch
"... The ability to flexibly compose confidence computation with the operations of relational algebra is an important feature of probabilistic database query languages. Computing confidences is computationally hard, however, and has to be approximated in practice. In a compositional query language, even ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
The ability to flexibly compose confidence computation with the operations of relational algebra is an important feature of probabilistic database query languages. Computing confidences is computationally hard, however, and has to be approximated in practice. In a compositional query language, even
Next 10 →
Results 1 - 10 of 389
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University