Sciweavers

4139 search results - page 213 / 828
» Designing and Implementing Combinator Languages
Sort
View
IFIP
2009
Springer
15 years 1 months ago
On the Automated Correction of Protocols with Improper Message Encoding
Security protocols are crucial to achieve trusted computing. However, designing security protocols is not easy and so security protocols are typically faulty and have to be repaire...
Dieter Hutter, Raul Monroy
109
Voted
ANLP
1997
92views more  ANLP 1997»
15 years 5 months ago
CommandTalk: A Spoken-Language Interface for Battlefield Simulations
CommandTalk is a spoken-language interface to battlefield simulations that allows the use of ordinary spoken English to create forces and control measures, assign missions to forc...
Robert C. Moore, John Dowding, Harry Bratt, Jean M...
POPL
1992
ACM
15 years 7 months ago
Semantic Foundations of Jade
Jade is a language designed to support coarse-grain parallelism on both shared and distributed addressspace machines. Jade is data-oriented: a Jade programmer simply augments a se...
Martin C. Rinard, Monica S. Lam
150
Voted
ESOP
2011
Springer
14 years 7 months ago
A New Method for Dependent Parsing
Abstract. Dependent grammars extend context-free grammars by allowing semantic values to be bound to variables and used to constrain parsing. Dependent grammars can cleanly specify...
Trevor Jim, Yitzhak Mandelbaum
142
Voted
CODES
2006
IEEE
15 years 9 months ago
Generic netlist representation for system and PE level design exploration
Designer productivity and design predictability are vital factors for successful embedded system design. Shrinking time-to-market and increasing complexity of these systems requir...
Bita Gorjiara, Mehrdad Reshadi, Pramod Chandraiah,...