Sciweavers

133 search results - page 20 / 27
» Recognizing Mathematical Expressions Using Tree Transformati...
Sort
View
ITP
2010
159views Mathematics» more  ITP 2010»
15 years 3 months ago
Programming Language Techniques for Cryptographic Proofs
CertiCrypt is a general framework to certify the security of cryptographic primitives in the Coq proof assistant. CertiCrypt adopts the code-based paradigm, in which the statement ...
Gilles Barthe, Benjamin Grégoire, Santiago ...
AISC
2008
Springer
15 years 1 months ago
Case Studies in Model Manipulation for Scientific Computing
Abstract. The same methodology is used to develop 3 different applications. We begin by using a very expressive, appropriate Domain Specific Language, to write down precise problem...
Jacques Carette, Spencer Smith, John McCutchan, Ch...
SAC
2005
ACM
15 years 5 months ago
A two-dimensional separation of concerns for compiler construction
During language evolution, compiler construction is usually d along two dimensions: defining new abstract syntax tree (AST) classes, or adding new operations. In order to facilita...
Xiaoqing Wu, Suman Roychoudhury, Barrett R. Bryant...
ICDE
2007
IEEE
132views Database» more  ICDE 2007»
16 years 1 months ago
XPlainer: Visual Explanations of XPath Queries
The popularity of XML has motivated the development of novel XML processing tools many of which embed the XPath language for XML querying, transformation, constraint specification...
Mariano P. Consens, John W. S. Liu, Flavio Rizzolo
ICFP
2006
ACM
15 years 11 months ago
Recursive modules for programming
d abstract) Keiko Nakata1 Jacques Garrigue2 1 Kyoto University Research Institute for Mathematical Sciences 2 Graduate School of Mathematics, Nagoya University The ML module syste...
Keiko Nakata, Jacques Garrigue