Sciweavers

2777 search results - page 322 / 556
» Example centric programming
Sort
View
IFL
1997
Springer
136views Formal Methods» more  IFL 1997»
15 years 7 months ago
Fully Persistent Graphs - Which One To Choose?
Functional programs, by nature, operate on functional, or persistent, data structures. Therefore, persistent graphs are a prerequisite to express functional graph algorithms. In th...
Martin Erwig
LICS
1994
IEEE
15 years 7 months ago
Subtyping and Parametricity
In this paper we study the interaction of subtyping and parametricity. We describe a logic for a programming language with parametric polymorphism and subtyping. The logic support...
Gordon D. Plotkin, Martín Abadi, Luca Carde...
FSE
1993
Springer
101views Cryptology» more  FSE 1993»
15 years 7 months ago
SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm
: A new non-proprietary secret-key block-enciphering algorithm, SAFER K-64 (for Secure And Fast Encryption Routine with a Key of length 64 bits) is described. The blocklength is 64...
James L. Massey
CHI
1992
ACM
15 years 7 months ago
Interactive Constraint-Based Search and Replace
We describe enhancements to graphical search and replace that allow users to extend the capabilities of a graphical editor. Interactive constraint-based search and replace can sea...
David Kurlander, Steven Feiner
ISCA
1990
IEEE
186views Hardware» more  ISCA 1990»
15 years 7 months ago
Adaptive Software Cache Management for Distributed Shared Memory Architectures
An adaptive cache coherence mechanism exploits semantic information about the expected or observed access behavior of particular data objects. We contend that, in distributed shar...
John K. Bennett, John B. Carter, Willy Zwaenepoel