Sciweavers

856 search results - page 70 / 172
» Dependent Types in Practical Programming
Sort
View
GECCO
2003
Springer
128views Optimization» more  GECCO 2003»
14 years 2 months ago
Cellular Programming and Symmetric Key Cryptography Systems
Abstract. The problem of designing symmetric key cryptography algorithms based upon cellular automata (CAs) is considered. The reliability of the Vernam cipher used in the process ...
Franciszek Seredynski, Pascal Bouvry, Albert Y. Zo...
AFP
2008
Springer
236views Formal Methods» more  AFP 2008»
14 years 3 months ago
A Tutorial on Parallel and Concurrent Programming in Haskell
This practical tutorial introduces the features available in Haskell for writing parallel and concurrent programs. We first describe how to write semi-explicit parallel programs b...
Simon L. Peyton Jones, Satnam Singh
APLAS
2009
ACM
14 years 3 months ago
Witnessing Purity, Constancy and Mutability
Restricting destructive update to values of a distinguished reference type prevents functions from being polymorphic in the mutability of their arguments. This restriction makes it...
Ben Lippmeier
TYPES
2004
Springer
14 years 2 months ago
Extracting a Normalization Algorithm in Isabelle/HOL
We present a formalization of a constructive proof of weak normalization for the simply-typed λ-calculus in the theorem prover Isabelle/HOL, and show how a program can be extracte...
Stefan Berghofer
WMTE
2002
IEEE
14 years 1 months ago
Mobile Internet Usability: What Can 'Mobile Learning' Learn from the Past?
‘Mobile Learning’ is a type of application/service that generally presumes to use mobile Internet technology for learning purposes. This paper focuses on discussing basic usab...
Maria Uther