Sciweavers

1628 search results - page 158 / 326
» Compiler Construction Using Scheme
Sort
View
CCS
2003
ACM
15 years 10 months ago
Cryptographic tamper evidence
We propose a new notion of cryptographic tamper evidence. A tamper-evident signature scheme provides an additional procedure Div which detects tampering: given two signatures, Div...
Gene Itkis
JSCIC
2006
92views more  JSCIC 2006»
15 years 5 months ago
Moving Mesh Discontinuous Galerkin Method for Hyperbolic Conservation Laws
In this paper, a moving mesh discontinuous Galerkin (DG) method is developed to solve the nonlinear conservation laws. In the mesh adaptation part, two issues have received much a...
Ruo Li, Tao Tang
PADL
2009
Springer
16 years 5 months ago
Declarative Network Verification
Abstract. In this paper, we present our initial design and implementation of a declarative network verifier (DNV). DNV utilizes theorem proving, a well established verification tec...
Anduo Wang, Prithwish Basu, Boon Thau Loo, Oleg So...
REFLECTION
1999
Springer
15 years 9 months ago
jContractor: A Reflective Java Library to Support Design by Contract
jContractor is a purely library based approach to support Design By Contract specifications such as preconditions, postconditions, class invariants, and recovery and exception hand...
Murat Karaorman, Urs Hölzle, John L. Bruno
APCSAC
2000
IEEE
15 years 8 months ago
Dataflow Java: Implicitly Parallel Java
Dataflow computation models enable simpler and more efficient management of the memory hierarchy - a key barrier to the performance of many parallel programs. This paper describes...
Gareth Lee, John Morris