Sciweavers

2000 search results - page 148 / 400
» Program Transformation and Proof Transformation
Sort
View
152
Voted
ICAI
2010
15 years 1 months ago
Constraint-Based Dogleg Channel Routing with Via Minimization
- In this article, we present an algorithm which is capable of transforming a gridded dogleg channel routing problem into a constraint programming (CP) problem. The transformed CP ...
I-Lun Tseng, Huan-Wen Chen, Che-I Lee, Adam Postul...
131
Voted
PKC
2007
Springer
129views Cryptology» more  PKC 2007»
15 years 9 months ago
Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles
We provide a positive result about the Fiat-Shamir (FS) transform in the standard model, showing how to use it to convert threemove identification protocols into two-tier signatur...
Mihir Bellare, Sarah Shoup
125
Voted
SOCO
2008
Springer
15 years 3 months ago
Interface Composition for Web Service Intermediaries
Abstract. The use of XML as a format for message exchange makes Web services well suited for composition of heterogeneous components. However, since clients must manage differences...
Sara Forghanizadeh, Eric Wohlstadter
84
Voted
CIRA
2007
IEEE
104views Robotics» more  CIRA 2007»
15 years 10 months ago
Towards a Sensor Classification Scheme for Robotic Manipulators
— This paper analyzes the signals captured during impacts and vibrations of a mechanical manipulator. To test the impacts, a flexible beam is clamped to the end-effector of a man...
Miguel F. M. Lima, José António Tenr...
132
Voted
TPHOL
2005
IEEE
15 years 9 months ago
Axiomatic Constructor Classes in Isabelle/HOLCF
We have definitionally extended Isabelle/HOLCF to support axiomatic Haskell-style constructor classes. We have subsequently defined the functor and monad classes, together with t...
Brian Huffman, John Matthews, Peter White