نتایج جستجو برای: trace constraint

تعداد نتایج: 144250  

2011
Raluca Sauciuc George Necula

The typical debugging experience is an iterative process of setting breakpoints, running the program and inspecting the state until the source of the bug is identified. When re-executing the program is not guaranteed to reproduce the faulty execution path, the final state and the system logs can be used to mentally construct a model of the execution. By contrast, debugging by going backward in ...

2000
Giampiero Esposito

The Arnowitt–Deser–Misner (ADM) evolution equations for the induced metric and the extrinsic-curvature tensor of the spacelike surfaces which foliate the space-time manifold in canonical general relativity are a first-order system of quasi-linear partial differential equations, supplemented by the constraint equations. Such equations are here mapped into another first-order system. In particula...

Journal: :IACR Cryptology ePrint Archive 2017
Daan Leermakers Boris Skoric

We give a security proof of the ‘Round Robin Differential Phase Shift’ Quantum Key Distribution scheme, and we give a tight bound on the required amount of privacy amplification. Our proof consists of the following steps. We construct an EPR variant of the scheme. We identify Eve’s optimal way of coupling an ancilla to an EPR qudit pair under the constraint that the bit error rate between Alice...

1995
Rajeev Alur Thomas A. Henzinger

We argue that the standard constraints on liveness conditions in nonblocking trace models|machine closure for closed systems, and receptiveness for open systems|are unnecessarily weak and complex, and that liveness should, instead, be speci ed by augmenting transition systems with acceptance conditions that satisfy a locality constraint. First, locality implies machine closure and receptiveness...

2014
Li Yu Zhou Zhou Sean Wallace Zhiling Lan Michael E. Papka

As high performance computing (HPC) continues to grow in scale and complexity, energy becomes a critical constraint in the race to exascale computing. The days of “performance at all cost” are coming to an end. While performance is still a major objective, future HPC will have to deliver desired performance under the energy constraint. Among various power management methods, power capping is a ...

1995
Rajeev Alur Thomas A. Henzinger

We argue that the standard constraints on liveness conditions in nonblocking trace models|machine closure for closed systems, and receptiveness for open systems|are unnecessarily weak and complex , and that liveness should, instead, be speciied by augmenting transition systems with acceptance conditions that satisfy a locality constraint. First, locality implies machine closure and receptivenes...

1987
T. Abbod K. Brown H. Noble

A model for a historical database is described which is based upon time-stamped tuples as the unit of storage. The model includes both physical and logical time-stamps. The technical characteristics of write-once laser discs prevent the use of double logical time-stamps. The model distinguishes version from correction-updates. It is shown that if set-valued attributes are involved the use of nu...

2013
Deguang Kong Miao Zhang Chris H. Q. Ding

Noisy data recovery is an important problem in machine learning field, which has widely applications for collaborative prediction, recommendation systems, etc. One popular model is to use trace norm model for noisy data recovery. However, it is ignored that the reconstructed data could be shrank (i.e., singular values could be greatly suppressed). In this paper, we present novel noisy data reco...

Journal: :J. Funct. Program. 2008
Christian Skalka Scott F. Smith David Van Horn

This paper shows how type effect systems can be combined with model-checking techniques to produce powerful, automatically verifiable program logics for higher order programs. The properties verified are based on the ordered sequence of events that occur during program execution, so called event traces. Our type and effect systems infer conservative approximations of the event traces arising at...

2007
Yichuan Ding Chek Beng Chua

Two important topics in the study of Quadratically Constrained Quadratic Programming (QCQP) are how to exactly solve a QCQP with few constraints in polynomial time and how to find an inexpensive and strong relaxation bound for a QCQP with many constraints. In this thesis, we first review some important results on QCQP, like the S-Procedure, and the strength of Lagrangian Relaxation and the semi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید