Sciweavers

2000 search results - page 89 / 400
» Program Transformation and Proof Transformation
Sort
View
SAC
2006
ACM
15 years 3 months ago
Transformation of B specifications into UML class diagrams and state machines
We propose a rule-based approach for transforming B abstract machines into UML diagrams. We believe that important insight into the structure underlying a B model can be gained by...
Houda Fekih, Leila Jemni Ben Ayed, Stephan Merz
139
Voted
IACR
2011
132views more  IACR 2011»
14 years 2 months ago
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
Abstract. Tampering attacks are cryptanalytic attacks on the implementation of cryptographic algorithms (e.g., smart cards), where an adversary introduces faults with the hope that...
Sebastian Faust, Krzysztof Pietrzak, Daniele Ventu...
94
Voted
AMAST
2006
Springer
15 years 7 months ago
Data Movement Optimisation in Point-Free Form
Programs written in point-free form express computation purely in terms of functions. Such programs are especially amenable to local transformation. In this paper, we describe a pr...
Brad Alexander, Andrew L. Wendelborn
128
Voted
WWW
2005
ACM
16 years 4 months ago
Building adaptable and reusable XML applications with model transformations
We present an approach in which the semantics of an XML language is defined by means of a transformation from an XML document model (an XML schema) to an application specific mode...
Ivan Kurtev, Klaas van den Berg
GECCO
2005
Springer
129views Optimization» more  GECCO 2005»
15 years 8 months ago
Search space modulation in genetic algorithms: evolving the search space by sinusoidal transformations
An experimental form of Modulation (Reinterpretation) of the Search Space is presented. This modulation is developed as a mathematical method that can be implemented directly into...
José Antonio Martin H.