Sciweavers

35419 search results - page 134 / 7084
» How are we doing
Sort
View
ENTCS
2002
82views more  ENTCS 2002»
15 years 3 months ago
A Hybrid Encoding of Howe's Method for Establishing Congruence of Bisimilarity
We give a short description of Hybrid, a new tool for interactive theorem proving, s introduced in [4]. It provides a form of Higher Order Abstract Syntax (HOAS) combined consiste...
Alberto Momigliano, Simon Ambler, Roy L. Crole
LCPC
2005
Springer
15 years 9 months ago
Code Transformations for One-Pass Analysis
With the growing popularity of streaming data model, processing queries over streaming data has become an important topic. Streaming data has received attention in a number of comm...
Xiaogang Li, Gagan Agrawal
127
Voted
FUN
2007
Springer
91views Algorithms» more  FUN 2007»
15 years 10 months ago
High Spies (or How to Win a Programming Contest)
We analyse transports between leaves in an edge-weighted tree. We prove under which conditions there exists a transport matching the weights of a given tree. We use this to compute...
André H. Deutz, Rudy van Vliet, Hendrik Jan...
IWPC
2006
IEEE
15 years 10 months ago
How Developers Copy
Copy-paste programming is dangerous as it may lead to hidden dependencies between different parts of the system. Modifying clones is not always straight forward, because we might ...
Mihai Balint, Radu Marinescu, Tudor Gîrba
HIP
2005
Springer
124views Cryptology» more  HIP 2005»
15 years 9 months ago
How Much Assurance Does a PIN Provide?
Abstract. We would like to quantify the assurance contained in an authentication secret. For instance, how much assurance does a customer convey to a bank by revealing that his Per...
Jon Louis Bentley, Colin Mallows