Sciweavers

2000 search results - page 188 / 400
» Program Transformation and Proof Transformation
Sort
View
CL
2010
Springer
15 years 3 months ago
SystemJ: A GALS language for system level design
In this paper we present the syntax, semantics, and compilation of a new system-level programming language called SystemJ. SystemJ is a multiclock language supporting the Globally...
Avinash Malik, Zoran Salcic, Partha S. Roop, Alain...
123
Voted
CORR
2010
Springer
136views Education» more  CORR 2010»
15 years 3 months ago
A Reflective Approach to Providing Flexibility in Application Distribution
Current middleware systems suffer from drawbacks. Often one is forced to make decisions early in the design process about which classes may participate in inter-machine communicat...
Álvaro J. Rebón Portillo, Scott M. W...
IJPP
1998
91views more  IJPP 1998»
15 years 3 months ago
Reuse-Driven Tiling for Improving Data Locality
This paper applies unimodular transformations and tiling to improve data locality of a loop nest. Due to data dependences and reuse information, not all dimensions of the iteration...
Jingling Xue, Chua-Huang Huang
PKC
2009
Springer
126views Cryptology» more  PKC 2009»
16 years 4 months ago
Verifiable Rotation of Homomorphic Encryptions
Similar to verifiable shuffling (or, mixing), we consider the problem of verifiable rotating (and random re-encrypting) a given list of homomorphic encryptions. The offset by which...
Sebastiaan de Hoogh, Berry Schoenmakers, Boris Sko...
143
Voted
ASIACRYPT
2008
Springer
15 years 5 months ago
A Modular Security Analysis of the TLS Handshake Protocol
We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modul...
Paul Morrissey, Nigel P. Smart, Bogdan Warinschi