Sciweavers

322 search results - page 50 / 65
» Expressive power and abstraction in Essence
Sort
View
TCC
2005
Springer
163views Cryptology» more  TCC 2005»
15 years 5 months ago
Adaptive Security of Symbolic Encryption
Abstract. We prove a computational soundness theorem for the symbolic analysis of cryptographic protocols which extends an analogous theorem of Abadi and Rogaway (J. of Cryptology ...
Daniele Micciancio, Saurabh Panjwani
WMCSA
2002
IEEE
15 years 4 months ago
Composing Pervasive Data Using iQL
The emergence of pervasive networked data sources, such as web services, sensors, and mobile devices, enables context-sensitive, mobile applications. We have developed a programmi...
Norman H. Cohen, Hui Lei, Paul Castro, John S. Dav...
IFL
2001
Springer
142views Formal Methods» more  IFL 2001»
15 years 4 months ago
A Compilation Scheme for a Hierarchy of Array Types
In order to achieve a high level of abstraction, array-oriented languages provide language constructs for defining array operations in a shape-invariant way. However, when trying ...
Dietmar Kreye
FCCM
1998
IEEE
148views VLSI» more  FCCM 1998»
15 years 4 months ago
JHDL - An HDL for Reconfigurable Systems
JHDL is a design tool for reconfigurable systems that allows designers to express circuit organizations that dynamically change over time in a natural way, using only standard pro...
Peter Bellows, Brad L. Hutchings
LACL
1998
Springer
15 years 4 months ago
Strict Compositionality and Literal Movement Grammars
Abstract. The principle of compositionality, as standardly defined, regards grammars as compositional that are not compositional in an intuitive sense of the word. There is, for ex...
Marcus Kracht