Sciweavers

782 search results - page 140 / 157
» Can a Parser be Generated from Examples
Sort
View
ICMCS
2008
IEEE
165views Multimedia» more  ICMCS 2008»
15 years 10 months ago
Hyperacoustic instruments: Computer-controlled instruments that are not electrophones
This paper describes a musical instrument consisting of a physical process that acoustically generates sound from the material world (i.e. sound derived from matter such as solid,...
Steve Mann, Ryan E. Janzen, Raymond Lo
141
Voted
SACRYPT
2005
Springer
189views Cryptology» more  SACRYPT 2005»
15 years 9 months ago
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
The ability to link two different sightings of the same Radio Frequency Identification (RFID) tag enables invasions of privacy. The problem is aggravated when an item, and the ta...
David Molnar, Andrea Soppera, David Wagner
121
Voted
CSFW
2002
IEEE
15 years 8 months ago
Types and Effects for Asymmetric Cryptographic Protocols
We present the first type and effect system for proving authenticity properties of security protocols based on asymmetric cryptography. The most significant new features of our ...
Andrew D. Gordon, Alan Jeffrey
160
Voted
CASCON
1992
163views Education» more  CASCON 1992»
15 years 4 months ago
Practical metaprogramming
Metaprogramming is the process of specifying generic software source templates from which classes of software components, or parts thereof, can be automatically instantiated to pr...
James R. Cordy, Medha Shukla
133
Voted
TGC
2007
Springer
15 years 9 months ago
A Protocol Compiler for Secure Sessions in ML
Distributed applications can be structured using sessions that specify flows of messages between roles. We design a small specific language to declare sessions. We then build a c...
Ricardo Corin, Pierre-Malo Deniélou