Sciweavers

10666 search results - page 1768 / 2134
» Quantum programming languages
Sort
View
TCS
2008
15 years 4 months ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld
JWSR
2007
83views more  JWSR 2007»
15 years 4 months ago
Web Service Discovery and Composition for Virtual Enterprises
: One main characteristic of virtual enterprises are short-term collaborations between business partners to provide efficient and individualized services to customers. The MOVE pro...
Jürgen Dorn, Peter Hrastnik, Albert Rainer
CJ
2000
101views more  CJ 2000»
15 years 4 months ago
Safe Structural Conformance for Java
In Java, an interface specifies public abstract methods and associated public constants. Conformance of a class to an interface is by name. We propose to allow structural conforma...
Konstantin Läufer, Gerald Baumgartner, Vincen...
CL
1999
Springer
15 years 4 months ago
Optimizing floating point operations in Scheme
It is well known that dynamic typing in languages like Lisp is costly in terms of performance. Besides the cost of tag checking, the other major source of ine ciency comes from th...
W. F. Wong
SPE
2002
141views more  SPE 2002»
15 years 4 months ago
Data collection and restoration for heterogeneous process migration
This study presents a practical solution for data collection and restoration to migrate a process written in high level stack-based languages such as C and Fortran over a network ...
Kasidit Chanchio, Xian-He Sun
« Prev « First page 1768 / 2134 Last » Next »