Sciweavers

564 search results - page 87 / 113
» Dependent types and program equivalence
Sort
View
TCS
2008
13 years 9 months ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld
ICRA
2007
IEEE
162views Robotics» more  ICRA 2007»
14 years 3 months ago
Learning and Evaluation of the Approach Vector for Automatic Grasp Generation and Planning
— In this paper, we address the problem of automatic grasp generation for robotic hands where experience and shape primitives are used in synergy so to provide a basis not only f...
Staffan Ekvall, Danica Kragic
ECOOP
2005
Springer
14 years 2 months ago
Prototypes with Multiple Dispatch: An Expressive and Dynamic Object Model
Two object-oriented programming language paradigms— dynamic, prototype-based languages and multi-method languages— provide orthogonal benefits to software engineers. These two...
Lee Salzman, Jonathan Aldrich
SIGSOFT
2003
ACM
14 years 9 months ago
Towards scalable compositional analysis by refactoring design models
Automated finite-state verification techniques have matured considerably in the past several years, but state-space explosion remains an obstacle to their use. Theoretical lower b...
Yung-Pin Cheng, Michal Young, Che-Ling Huang, Chia...
CP
2007
Springer
14 years 3 months ago
Groupoids and Conditional Symmetry
We introduce groupoids – generalisations of groups in which not all pairs of elements may be multiplied, or, equivalently, categories in which all morphisms are invertible – as...
Ian P. Gent, Tom Kelsey, S. A. Linton, J. Pearson,...