Sciweavers

248 search results - page 23 / 50
» Authentication Primitives and Their Compilation
Sort
View
UPP
2004
Springer
15 years 5 months ago
Programming an Amorphous Computational Medium
Amorphous computing considers the problem of controlling millions of spatially distributed unreliable devices which communicate only with nearby neighbors. To program such a system...
Jacob Beal
99
Voted
CF
2010
ACM
15 years 5 months ago
ERBIUM: a deterministic, concurrent intermediate representation for portable and scalable performance
Tuning applications for multi-core systems involve subtle concepts and target-dependent optimizations. New languages are being designed to express concurrency and locality without...
Cupertino Miranda, Philippe Dumont, Albert Cohen, ...
EUROPKI
2009
Springer
14 years 10 months ago
Automatic Generation of Sigma-Protocols
Efficient zero-knowledge proofs of knowledge (ZK-PoK) are basic building blocks of many cryptographic applications such as identification schemes, group signatures, and secure mult...
Endre Bangerter, Thomas Briner, Wilko Henecka, Ste...
GPCE
2005
Springer
15 years 5 months ago
Statically Safe Program Generation with SafeGen
Abstract. SafeGen is a meta-programming language for writing statically safe generators of Java programs. If a program generator written in SafeGen passes the checks of the SafeGen...
Shan Shan Huang, David Zook, Yannis Smaragdakis
OOPSLA
2010
Springer
14 years 10 months ago
MetaFJig: a meta-circular composition language for Java-like classes
We propose a Java-like language where class denitions are rst class values, hence new classes can be derived from existing, rather than by a xed mechanism like inheritance, by e...
Marco Servetto, Elena Zucca