Sciweavers

3771 search results - page 257 / 755
» Subobject Transformation Systems
Sort
View
CCS
2010
ACM
15 years 4 months ago
On the soundness of authenticate-then-encrypt: formalizing the malleability of symmetric encryption
A communication channel from an honest sender A to an honest receiver B can be described as a system with three interfaces labeled A, B, and E (the adversary), respectively, where...
Ueli Maurer, Björn Tackmann
TCAD
1998
114views more  TCAD 1998»
15 years 3 months ago
Behavioral optimization using the manipulation of timing constraints
— We introduce a transformation, named rephasing, that manipulates the timing parameters in control-data-flow graphs (CDFG’s) during the high-level synthesis of data-pathinten...
Miodrag Potkonjak, Mani B. Srivastava
VDA
2010
200views Visualization» more  VDA 2010»
15 years 6 months ago
Operator-centric design patterns for information visualization software
Design patterns have proven to be a useful means to make the process of designing, developing, and reusing software systems more efficient. In the area of information visualizatio...
Zaixian Xie, Zhenyu Guo, Matthew O. Ward, Elke A. ...
CASCON
1992
163views Education» more  CASCON 1992»
15 years 5 months ago
Practical metaprogramming
Metaprogramming is the process of specifying generic software source templates from which classes of software components, or parts thereof, can be automatically instantiated to pr...
James R. Cordy, Medha Shukla
DNA
2007
Springer
127views Bioinformatics» more  DNA 2007»
15 years 10 months ago
Discrete Simulations of Biochemical Dynamics
Abstract. Metabolic P systems, shortly MP systems, are a special class of P systems, introduced for expressing biological metabolism. Their dynamics are computed by metabolic algor...
Vincenzo Manca