Sciweavers

1357 search results - page 138 / 272
» Compositionality in Graph Transformation
Sort
View
168
Voted
EUROCRYPT
2000
Springer
15 years 7 months ago
Cryptanalysis of Patarin's 2-Round Public Key System with S Boxes (2R)
In a series of papers Patarin proposes new efficient public key systems. A very interesting proposal, called 2-Round Public Key System with S Boxes, or 2R, is based on the difficul...
Eli Biham
102
Voted
DSVIS
1995
Springer
15 years 7 months ago
On the Expression of Interaction Properties within an Interactor Model
This paper introduces a formal model for the description of interactive systems based on the interactor model of [15, 17]. Similarly to that model, it is intended to be used constr...
Panos Markopoulos
141
Voted
FPCA
1995
15 years 7 months ago
Shortcut Deforestation in Calculational Form
In functional programming, intermediate data structures are often used to “glue’) together small programs. Deforestation is a program transformation to remove these intermedia...
Akihiko Takano, Erik Meijer
112
Voted
JUCS
2008
165views more  JUCS 2008»
15 years 3 months ago
Shortcut Fusion of Monadic Programs
: Functional programs often combine separate parts of the program using intermediate data structures for communicating results. Programs so defined are easier to understand and mai...
Cecilia Manzino, Alberto Pardo
136
Voted
HICSS
2007
IEEE
145views Biometrics» more  HICSS 2007»
15 years 10 months ago
Next-Generation Software Engineering: Function Extraction for Computation of Software Behavior
The ultra-large-scale systems of the future require the transformation of software engineering into a computational discipline capable of fast and dependable software development....
Richard C. Linger, Mark G. Pleszkoch, Luanne Burns...