Sciweavers

5499 search results - page 1024 / 1100
» Generalized Rewrite Theories
Sort
View
SOFTVIS
2003
ACM
14 years 4 months ago
Nice Class Diagrams Admit Good Design?
Analysis and design of programs by using tools has emerged to a standard technique in object-oriented software engineering. Many of these tools claim to implement methods accordin...
Holger Eichelberger
SPAA
2003
ACM
14 years 4 months ago
The effect of communication costs in solid-state quantum computing architectures
Quantum computation has become an intriguing technology with which to attack difficult problems and to enhance system security. Quantum algorithms, however, have been analyzed un...
Dean Copsey, Mark Oskin, Tzvetan S. Metodi, Freder...
TLDI
2003
ACM
135views Formal Methods» more  TLDI 2003»
14 years 4 months ago
Typed compilation of recursive datatypes
Standard ML employs an opaque (or generative) semantics of datatypes, in which every datatype declaration produces a new type that is different from any other type, including othe...
Joseph Vanderwaart, Derek Dreyer, Leaf Petersen, K...
WIDM
2003
ACM
14 years 4 months ago
Conceptual modeling of semantic navigation structures: the MoSeNa-approach
At the present time, several shortcomings prevent the more effective use and more intense application of web information systems. Recent developments that are subsumed by the term...
Jörg Becker, Christian Brelage, Karsten Klose...
WPES
2003
ACM
14 years 4 months ago
Anonymous credentials with biometrically-enforced non-transferability
We present a model and protocol for anonymous credentials. Rather than using deterrents to ensure non-transferability, our model uses secure hardware with biometric authentication...
Russell Impagliazzo, Sara Miner More
« Prev « First page 1024 / 1100 Last » Next »