Search
Now showing items 451-460 of 648
Machine-Checkable Correctness Proofs forIntra-procedural Dataflow Analyses
(2004-12-16)
This technical report describes our experience using the interactive theorem proverAthena for proving the correctness of abstract interpretation-based dataflow analyses.For each analysis, our methodology requires the ...
A Dynamic Data Structure for Checking Hyperacyclicity
(2005-01-03)
We present a dynamic data structure that keeps track of an acyclic hypergraph (equivalently, a triangulated graph) and enables verifying that adding a candidate hyperedge (clique) will not break the acyclicity of the ...
Virtual Stationary Automata for Mobile Networks
(2005-01-21)
We define a programming abstraction formobile networks called the Virtual Stationary Automataprogramming layer, consisting of real mobile clients, virtualtimed I/O automata called virtual stationary automata(VSAs), and a ...
How Much of a Hypertree can be Captured by Windmills?
(2005-01-03)
Current approximation algorithms for maximum weight {\em hypertrees} find heavy {\em windmill farms}, and are based on the fact that a constant ratio (for constant width $k$) of the weight of a $k$-hypertree can be captured ...
Gestural Cues for Sentence Segmentation
(2005-04-19)
In human-human dialogues, face-to-face meetings are often preferred over phone conversations.One explanation is that non-verbal modalities such as gesture provide additionalinformation, making communication more efficient ...
Efficient, Verifiable Binary Sandboxing for a CISC Architecture
(2005-05-02)
Executing untrusted code while preserving security requiresenforcement of memory and control-flow safety policies:untrusted code must be prevented from modifying memory orexecuting code except as explicitly allowed. ...
A Region-based Architecture for Service-Providing Distributed Systems
(2005-05-17)
A service-providing system consists of hosts that provide services such as data, content, computational and memory resources and data-based services to other entities in the system. Consumers that wish to use services ...
Simultaneous Localization, Calibration, and Tracking in an ad Hoc Sensor Network
(2005-04-26)
We introduce Simultaneous Localization and Tracking (SLAT), the problem of tracking a target in a sensor network while simultaneously localizing and calibrating the nodes of the network. Our proposed solution, LaSLAT, ...
Fast Rates for Regularized Least-squares Algorithm
(2005-04-14)
We develop a theoretical analysis of generalization performances of regularized least-squares on reproducing kernel Hilbert spaces for supervised learning. We show that the concept of effective dimension of an integral ...
Risk Bounds for Regularized Least-squares Algorithm with Operator-valued kernels
(2005-05-16)
We show that recent results in [3] on risk bounds for regularized least-squares on reproducing kernel Hilbert spaces can be straightforwardly extended to the vector-valued regression setting. We first briefly introduce ...