Results 1  10
of
856
Efficiently computing static single assignment form and the control dependence graph
 ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS
, 1991
"... In optimizing compilers, data structure choices directly influence the power and efficiency of practical program optimization. A poor choice of data structure can inhibit optimization or slow compilation to the point that advanced optimization features become undesirable. Recently, static single ass ..."
Abstract

Cited by 1003 (8 self)
 Add to MetaCart
assignment form and the control dependence graph have been proposed to represent data flow and control flow propertiee of programs. Each of these previously unrelated techniques lends efficiency and power to a useful class of program optimization. Although both of these structures are attractive
Motivation through the Design of Work: Test of a Theory. Organizational Behavior and Human Performance,
, 1976
"... A model is proposed that specifies the conditions under which individuals will become internally motivated to perform effectively on their jobs. The model focuses on the interaction among three classes of variables: (a) the psychological states of employees that must be present for internally motiv ..."
Abstract

Cited by 622 (2 self)
 Add to MetaCart
under government sponsorship are encouraged to express their own judgment freely, this report does not necessarily represent the official opinion or policy of the government. redesign are not fully adequate to meet the problems encountered in their application. Especially troublesome is the paucity
A fast and flexible statistical model for largescale population genotype data: Applications to inferring missing genotypes and haplotype phase
 American Journal of Human Genetics
, 2005
"... We present a statistical model for patterns of genetic variation in samples of unrelated individuals from natural populations. This model is based on the idea that, over short regions, haplotypes in a population tend to cluster into groups of similar haplotypes. To capture the fact that, because of ..."
Abstract

Cited by 408 (10 self)
 Add to MetaCart
We present a statistical model for patterns of genetic variation in samples of unrelated individuals from natural populations. This model is based on the idea that, over short regions, haplotypes in a population tend to cluster into groups of similar haplotypes. To capture the fact that, because
Differential Fault Analysis of Secret Key Cryptosystems
, 1997
"... In September 1996 Boneh, Demillo, and Lipton from Bellcore announced a new type of cryptanalytic attack which exploits computational errors to find cryptographic keys. Their attack is based on algebraic properties of modular arithmetic, and thus it is applicable only to public key cryptosystems suc ..."
Abstract

Cited by 315 (3 self)
 Add to MetaCart
In September 1996 Boneh, Demillo, and Lipton from Bellcore announced a new type of cryptanalytic attack which exploits computational errors to find cryptographic keys. Their attack is based on algebraic properties of modular arithmetic, and thus it is applicable only to public key cryptosystems
Comparing top k lists
 In Proceedings of the ACMSIAM Symposium on Discrete Algorithms
, 2003
"... Motivated by several applications, we introduce various distance measures between “top k lists.” Some of these distance measures are metrics, while others are not. For each of these latter distance measures, we show that they are “almost ” a metric in the following two seemingly unrelated aspects: ( ..."
Abstract

Cited by 272 (4 self)
 Add to MetaCart
Motivated by several applications, we introduce various distance measures between “top k lists.” Some of these distance measures are metrics, while others are not. For each of these latter distance measures, we show that they are “almost ” a metric in the following two seemingly unrelated aspects
Fast Approximation Algorithms for Fractional Packing and Covering Problems
, 1995
"... This paper presents fast algorithms that find approximate solutions for a general class of problems, which we call fractional packing and covering problems. The only previously known algorithms for solving these problems are based on general linear programming techniques. The techniques developed ..."
Abstract

Cited by 260 (13 self)
 Add to MetaCart
theoretical analysis of the running time of a Lagrangean relaxationbased algorithm. We give several applications of our algorithms. The new approach yields several orders of magnitude of improvement over the best previously known running times for algorithms for the scheduling of unrelated parallel
LowCost Traffic Analysis Of Tor
 In Proceedings of the 2005 IEEE Symposium on Security and Privacy. IEEE CS
, 2005
"... Tor is the second generation Onion Router, supporting the anonymous transport of TCP streams over the Internet. Its low latency makes it very suitable for common tasks, such as web browsing, but insecure against trafficanalysis attacks by a global passive adversary. We present new trafficanalysis t ..."
Abstract

Cited by 231 (8 self)
 Add to MetaCart
analysis techniques that allow adversaries with only a partial view of the network to infer which nodes are being used to relay the anonymous streams and therefore greatly reduce the anonymity provided by Tor. Furthermore, we show that otherwise unrelated streams can be linked back to the same initiator. Our attack
Dynamic Seemingly Unrelated Cointegrating Regression
, 2003
"... Multiple cointegrating regressions are frequently encountered in empirical work as, for example, in the analysis of panel data. When the equilibrium errors are correlated across equations, the seemingly unrelated regression estimation strategy can be applied to cointegrating regressions to obtain as ..."
Abstract

Cited by 42 (3 self)
 Add to MetaCart
Multiple cointegrating regressions are frequently encountered in empirical work as, for example, in the analysis of panel data. When the equilibrium errors are correlated across equations, the seemingly unrelated regression estimation strategy can be applied to cointegrating regressions to obtain
Linearly Unrelated Sequences
 PACIFIC JOURNAL OF MATHEMATICS VOL. 190, NO. 2, 1999
, 1999
"... The paper deals with the socalled linearly unrelated sequences. The criterion and the application for irrational sequences and series is included too. ..."
Abstract

Cited by 2 (0 self)
 Add to MetaCart
The paper deals with the socalled linearly unrelated sequences. The criterion and the application for irrational sequences and series is included too.
LINEARLY UNRELATED SEQUENCES
, 1999
"... The paper deals with the socalled linearly unrelated sequences. The criterion and the application for irrational sequences and series is included too. 1. Introduction. There are not many new results concerning the linear independence of numbers. Exceptions in the last decade are, e.g., the resul ..."
Abstract
 Add to MetaCart
The paper deals with the socalled linearly unrelated sequences. The criterion and the application for irrational sequences and series is included too. 1. Introduction. There are not many new results concerning the linear independence of numbers. Exceptions in the last decade are, e
Results 1  10
of
856