Sciweavers

7971 search results - page 76 / 1595
» On unbounded operators and applications
Sort
View
89
Voted
TAPSOFT
1991
Springer
15 years 4 months ago
Comparative Semantics for a Real-Time Programming Language with Integration
An operational and a denotational semantic model are presented for a real-time programming language incorporating the concept of integration. This concept of integration, which ha...
Franck van Breugel
CRYPTO
2010
Springer
170views Cryptology» more  CRYPTO 2010»
14 years 9 months ago
Securing Computation against Continuous Leakage
We present a general method to compile any cryptographic algorithm into one which resists side channel attacks of the only computation leaks information variety for an unbounded nu...
Shafi Goldwasser, Guy N. Rothblum
149
Voted
CRYPTO
2012
Springer
327views Cryptology» more  CRYPTO 2012»
13 years 3 months ago
Functional Encryption for Regular Languages
We provide a functional encryption system that supports functionality for regular languages. In our system a secret key is associated with a Deterministic Finite Automata (DFA) M....
Brent Waters
100
Voted
OSDI
1996
ACM
15 years 2 months ago
Automatic Compiler-Inserted I/O Prefetching for Out-of-Core Applications
Current operating systems offer poor performance when a numeric application's working set does not fit in main memory. As a result, programmers who wish to solve "out-of...
Todd C. Mowry, Angela K. Demke, Orran Krieger
113
Voted
MCS
2007
Springer
15 years 21 days ago
Continuous and discrete homotopy operators: A theoretical approach made concrete
Using standard calculus, explicit formulas for the one-dimensional continuous and discrete homotopy operators are derived. It is shown that these formulas are equivalent to those ...
W. Hereman, Bernard Deconinck, L. D. Poole