Filters








264 Hits in 7.4 sec

How proofs are prepared at Camelot [article]

Andreas Björklund, Petteri Kaski
2016 arXiv   pre-print
Complexity, Report TR16-002, January 2016] with the observation that Merlin's magic is not needed for batch evaluation---mere Knights can prepare the proof, in parallel, and with intrinsic error-correction  ...  The framework builds on recent Merlin--Arthur proofs of batch evaluation of Williams [ Electron.Colloq. Comput.  ...  [11] results at the Simons Institute in fall 2015.  ... 
arXiv:1602.01295v1 fatcat:pqozv4nul5e7rakfbsra2al7pu

Frontmatter [chapter]

The Fall of Camelot  
generic strands in his cycle, in particular allegory, epic, dramatic monologue and the Alexandrian idyll, to create a complex psychological allegory of epic scope which both draws on traditional genres and extends  ...  He is warned that in Camelot priorities are not the same as they are in the outside world.  ...  Guinevere and Lancelot are both figures representative of Camelot.  ... 
doi:10.4159/harvard.9780674422957.fm fatcat:otjqdhpy4beuplexfbediplgd4

Automatic Certification of Heap Consumption [chapter]

Lennart Beringer, Martin Hofmann, Alberto Momigliano, Olha Shkaravska
2005 Lecture Notes in Computer Science  
The resulting verification conditions are of limited complexity, and are automatically discharged.  ...  The proof rules employ a uniform assertion format and have been derived from a general purpose program logic [1].  ...  implicitly abstracted over.  ... 
doi:10.1007/978-3-540-32275-7_23 fatcat:hn3cp3wuavefnoevn5av75izhy

Estimating the Cost of Native Method Calls for Resource-bounded Functional Programming Languages

Stephen Gilmore, Olha Shkaravska
2006 Electronical Notes in Theoretical Computer Science  
Acknowledgement The authors are supported by the Mobile Resource Guarantees project (MRG, project IST-2001-33149).  ...  The feedback on an earlier version of this paper presented at the TFP meeting in Munich was very valuable in helping us to improve this revision.  ...  However, we are interested in quantitative analysis here: "How soon will the memory leak cause system failure?"  ... 
doi:10.1016/j.entcs.2006.03.010 fatcat:xf6k25wxtrgwxbkrnzrkkhw7pm

Analysis of transaction management performance

D. Duchamp
1989 ACM SIGOPS Operating Systems Review  
A multithreaded transaction manager improves throughput provided that log batching exists. 4. t<.lulticast reduces the variance of distributed protocols in an extended-LAN environment. 5.  ...  The conclusions of this study are: a simple optimization to two-phase commit reduces logging activity of distributed transactions; non-blocking commit is practical for some applications; multithreaded  ...  The views and conclusions contained in this document are those of the author and should not be interpreted as representing the official policies, either expressed or implied, of any of the sponsoring agencies  ... 
doi:10.1145/74851.74868 fatcat:h4deqaxkuvdk5mgjzow45rsire

Analysis of transaction management performance

D. Duchamp
1989 Proceedings of the twelfth ACM symposium on Operating systems principles - SOSP '89  
A multithreaded transaction manager improves throughput provided that log batching exists. 4. t<.lulticast reduces the variance of distributed protocols in an extended-LAN environment. 5.  ...  The conclusions of this study are: a simple optimization to two-phase commit reduces logging activity of distributed transactions; non-blocking commit is practical for some applications; multithreaded  ...  The views and conclusions contained in this document are those of the author and should not be interpreted as representing the official policies, either expressed or implied, of any of the sponsoring agencies  ... 
doi:10.1145/74850.74868 dblp:conf/sosp/Duchamp89 fatcat:sclixtoryfc5voe4xdo5kn6fyu

Grail: a functional form for imperative mobile code

Lennart Beringer, Kenneth MacKenzie, Ian Stark
2003 Electronical Notes in Theoretical Computer Science  
We use this dual identity in the Mobile Resource Guarantees project, where Grail serves as proof-carrying code to provide assurances of time and space performance, thereby supporting secure and reliable  ...  These update the Java heap, and are used in Camelot to compile algebraic datatypes.  ...  The logic is then given in terms of a virtual machine model whose validity is either assumed or certified at lower levels of abstraction.  ... 
doi:10.1016/s1571-0661(05)80083-0 fatcat:5xdodhiwgvautkd6pbzaer3i3i

Randomization in Parameterized Complexity (Dagstuhl Seminar 17041)

Marek Cygan, Fedor V. Fomin, Danny Hermelin, Magnus Wahlström, Marc Herbstritt
2017 Dagstuhl Reports  
We also show a limit to how far our results can be strengthened by considering a smaller parameter.  ...  We note that extending our algorithmic findings to binary matroids, a superclass of regular matroids, is highly unlikely: Minimum Spanning Circuit parameterized by is W [1] -hard on binary matroids even  ...  Kaski, "How Proofs are Prepared at Camelot: Extended Abstract", in Proc. of the 2016 ACM Symposium on Principles of Distributed Computing (PODC 2016), pp. 391-400, ACM, 2016.  ... 
doi:10.4230/dagrep.7.1.103 dblp:journals/dagstuhl-reports/CyganFHW17 fatcat:vjbkuavqdzew3nbk6wjvmpbd5m

The Nash equilibrium: A perspective

C. A. Holt, A. E. Roth
2004 Proceedings of the National Academy of Sciences of the United States of America  
Read more about this classic PNAS article online at www.pnas.org͞misc͞ classics.shtml.  ...  Nash, a young mathematics graduate student at Princeton, was a part of the Camelot of game theory centered around von Neumann and Morgenstern.  ...  are small (see ref. 46 for an existence proof and ref. 47 for application to bidding in an auction).  ... 
doi:10.1073/pnas.0308738101 pmid:15024100 pmcid:PMC384684 fatcat:fxgij4pdhne6baguwmjxa5cyoq

A serialization graph construction for nested transactions

Alan Fekete, Nancy Lynch, William E. Weihl
1990 Proceedings of the ninth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems - PODS '90  
Third, we make explicit the assumptions used for this proof technique, assumptions that are usually made implicitly in the classical theory, and therefore we clarify the type of system for which the classical  ...  First, we present a proof technique that offers system designers the same ease of reasoning about nested transaction systems as is given by the classical theory for systems without nesting, and yet can  ...  Beeri, Bernstein and Goodman [2] present proof techniques that are useful for systems organized using multiple levels of abstraction, with concurrency control performed separately at each level.  ... 
doi:10.1145/298514.298547 dblp:conf/pods/FeketeLW90 fatcat:vnsncxwt65b4vflgfyye56sto4

The skull beneath the skin: entity-relationship models of information artifacts

T.R.G. Green, D.R. Benyon
1996 International Journal of Human-Computer Studies  
Data modelling reveals the internal structure of an information system, abstracting away from details of the physical representation.  ...  By extending the conventional ER notation slightly (to give ERMIA, Entity-Relationship Modelling for Information Artefacts) it can be used to describe differences between different representations of the  ...  Acknowledgements We are grateful to many colleagues and friends for discussion of these issues, notably Denise Whitelock, Diana Bental, and Darrell Raymond, and to numerous detailed constructive comments  ... 
doi:10.1006/ijhc.1996.0034 fatcat:uk7rko2ogndjjgz2ghn7cd4bli

Afterword [chapter]

Peter Holland
2020 Rethinking Theatrical Documents in Shakespeare's England  
performance might be researched and how it might be written about.  ...  Worrying at the word, even in Shakespeare, is not the point. Worrying at what the early modern senses might offer us as we rethink the (written) documents is more valuable.  ... 
doi:10.5040/9781350051379.0007 fatcat:xng34iv5evfyxe5y64da2uysfa

The impact of research on the development of middleware technology

Wolfgang Emmerich, Mikio Aoyama, Joe Sventek
2008 ACM Transactions on Software Engineering and Methodology  
For each of these technologies we are able to show ample influence of research and conclude that without the research conducted by PhD students and researchers in university computer science labs at Brown  ...  , CMU, Cambridge, Newcastle, MIT, Vrije, and University of Washington as well as research in industrial labs at APM, AT&T Bell Labs, DEC Systems Research, HP Labs, IBM Research, and Xerox PARC we would  ...  The authors are also indebted to the members of the Impact project and in particular to the steering committee members, Lee Osterweil, Jeff Kramer, Alexander L.  ... 
doi:10.1145/13487689.13487692 fatcat:gxcxlbysx5cyzaeseynwkd7ecu

Formulations and formalisms in software architecture [chapter]

Mary Shaw, David Garlan
1995 Lecture Notes in Computer Science  
It provides a focus for certain aspects of design and development that are not appropriately addressed within the constituent modules.  ...  Unfortunately, the available formal methods are only a partial match for architectural needs, which e n tail description of structure, packaging, environmental assumptions, representation, and performance  ...  In many cases architectural descriptions are at a su ciently abstract level that they must be re ned into lower-level architectural descriptions.  ... 
doi:10.1007/bfb0015251 fatcat:iw6vdstm65dkdaiwm5rob4dbb4

"I'll Never Know Exactly Who Did What": Broadway Composers as Musical Collaborators

D. McHugh
2015 Journal of the American Musicological Society  
He also quotes a letter from Porter to Sirmay in which Porter returns the proofs of two of his songs, commenting, "Oh God! How it bored me.  ...  The How to Succeed manuscripts are in the Frank Loesser Papers (New York Public Library), JPB 84-6. a suggested "baritone thumbline" to be developed as an ostinato figure at the beginning of the song.  ...  Abstract Though published vocal scores of Broadway musicals imply sole musical authorship the archives reveal a more complex picture.  ... 
doi:10.1525/jams.2015.68.3.605 fatcat:nljokv2dsbbanoyfmrlslyieay
« Previous Showing results 1 — 15 out of 264 results