Sciweavers

1628 search results - page 6 / 326
» Compiler Construction Using Scheme
Sort
View
ICMCS
2007
IEEE
164views Multimedia» more  ICMCS 2007»
14 years 1 months ago
Constructing Secure Content-Dependent Watermarking Scheme using Homomorphic Encryption
Content-dependent watermarking (CDWM) has been proposed as a solution to overcome the potential estimation attack aiming to recover and remove the watermark from the host signal. ...
Zhi Li, Xinglei Zhu, Yong Lian, Qibin Sun
IEICET
2006
96views more  IEICET 2006»
13 years 7 months ago
New Digital Fingerprint Code Construction Scheme Using Group-Divisible Design
In Koo Kang, Kishore Sinha, Heung-Kyu Lee
SIGCSE
2006
ACM
362views Education» more  SIGCSE 2006»
14 years 1 months ago
Chirp on crickets: teaching compilers using an embedded robot controller
Traditionally, the topics of compiler construction and language processing have been taught as an elective course in Computer Science curricula. As such, students may graduate wit...
Li Xu, Fred G. Martin
TCC
2009
Springer
160views Cryptology» more  TCC 2009»
14 years 8 months ago
Simple, Black-Box Constructions of Adaptively Secure Protocols
We present a compiler for transforming an oblivious transfer (OT) protocol secure against an adaptive semi-honest adversary into one that is secure against an adaptive malicious ad...
Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, H...

Book
1815views
15 years 3 months ago
A Compact Guide to Lex & Yacc
"This document explains how to construct a compiler using lex and yacc. Lex and yacc are tools used to generate lexical analyzers and parsers. I assume you can program in C, a...
Tom Niemann