Sciweavers

2076 search results - page 291 / 416
» Functional logic overloading
Sort
View
TCC
2005
Springer
118views Cryptology» more  TCC 2005»
15 years 7 months ago
On the Relationships Between Notions of Simulation-Based Security
Several compositional forms of simulation-based security have been proposed in the literature, including universal composability, black-box simulatability, and variants thereof. Th...
Anupam Datta, Ralf Küsters, John C. Mitchell,...
ASPDAC
2004
ACM
118views Hardware» more  ASPDAC 2004»
15 years 7 months ago
Minimization of memory size for heterogeneous MDDs
Abstract— In this paper, we propose exact and heuristic algorithms for minimizing the memory size for heterogeneous Multivalued Decision Diagrams (MDDs). In a heterogeneous MDD, ...
Shinobu Nagayama, Tsutomu Sasao
PASTE
2004
ACM
15 years 7 months ago
Validation of assembler programs for DSPs: a static analyzer
Digital Signal Processors are widely used in critical embedded systems to pilot low-level, often critical functionalities. We describe a static analyzer based on abstract interpre...
Matthieu Martel
FASE
2004
Springer
15 years 7 months ago
Actor-Centric Modeling of User Rights
Abstract. In this paper we present a novel approach for the predicative specification of user rights in the context of an object oriented use case driven development process. We e...
Ruth Breu, Gerhard Popp
LOPSTR
2004
Springer
15 years 7 months ago
Natural Rewriting for General Term Rewriting Systems
We address the problem of an efficient rewriting strategy for general term rewriting systems. Several strategies have been proposed over the last two decades for rewriting, the mos...
Santiago Escobar, José Meseguer, Prasanna T...