Sciweavers

1018 search results - page 81 / 204
» Generative unbinding of names
Sort
View
IV
2009
IEEE
191views Visualization» more  IV 2009»
14 years 3 months ago
An Heuristic for the Construction of Intersection Graphs
Most methods for generating Euler diagrams describe the detection of the general structure of the final draw as the first and most important step. This information is often depi...
Paolo Simonetto, David Auber
IWPC
2009
IEEE
14 years 3 months ago
Intensions are a key to program comprehension
The classical comprehension theories study relations between extensions, intensions, and names. Originally developed in linguistics and mathematics, these theories are applicable ...
Václav Rajlich
BRAIN
2009
Springer
14 years 3 months ago
Data Explosion, Data Nature and Dataology
The essence of computer applications is to store things in the real world into computer systems in the form of data, i.e., it is a process of producing data. Some data are the reco...
Yangyong Zhu, Ning Zhong, Yun Xiong
ICICS
2009
Springer
14 years 3 months ago
Biometric-Based Non-transferable Anonymous Credentials
This work explores the problem of using biometric data to achieve non-transferability of anonymous credentials; that is, sharing of anonymous credentials, which allow one to anonym...
Marina Blanton, William M. P. Hudelson
APLAS
2009
ACM
14 years 3 months ago
The Higher-Order, Call-by-Value Applied Pi-Calculus
We define a higher-order process calculus with algebraic operations such as encryption and decryption, and develop a bisimulation proof method for behavioral equivalence in this c...
Nobuyuki Sato, Eijiro Sumii