Sciweavers

5465 search results - page 98 / 1093
» Assigning Types to Processes
Sort
View
FASE
2009
Springer
15 years 4 months ago
Transformation of Type Graphs with Inheritance for Ensuring Security in E-Government Networks
Abstract. E-government services usually process large amounts of confidential data. Therefore, security requirements for the communication between components have to be adhered in...
Frank Hermann, Hartmut Ehrig, Claudia Ermel
66
Voted
SIGCSE
2006
ACM
135views Education» more  SIGCSE 2006»
15 years 3 months ago
Personality types, learning styles, and an agile approach to software engineering education
This paper describes an initiative at North Carolina State University in which the undergraduate software engineering class was restructured in layout and in presentation. The cha...
Lucas Layman, Travis Cornwell, Laurie A. Williams
HASKELL
2005
ACM
15 years 3 months ago
Verifying haskell programs using constructive type theory
Proof assistants based on dependent type theory are closely related to functional programming languages, and so it is tempting to use them to prove the correctness of functional p...
Andreas Abel, Marcin Benke, Ana Bove, John Hughes,...
ACSD
2004
IEEE
124views Hardware» more  ACSD 2004»
15 years 1 months ago
A Behavioral Type Inference System for Compositional System-on-Chip Design
The design productivity gap has been recognized by the semiconductor industry as one of the major threats to the continued growth of system-on-chips and embedded systems. Ad-hoc s...
Jean-Pierre Talpin, David Berner, Sandeep K. Shukl...
CORR
2007
Springer
95views Education» more  CORR 2007»
14 years 10 months ago
A Note on the Periodicity and the Output Rate of Bit Search Type Generators
We investigate the bit-search type irregular decimation algorithms that are used within LFSR-based stream ciphers. In particular, we concentrate on BSG and ABSG, and consider two ...
Yucel Altug, N. Polat Ayerden, Mehmet Kivanç...