Sciweavers

4498 search results - page 79 / 900
» How to Invent Functions
Sort
View
CSFW
2005
IEEE
14 years 3 months ago
Temporal Rank Functions for Forward Secrecy
A number of key establishment protocols claim the property of forward secrecy, where the compromise of a longterm key does not result in the compromise of previously computed sess...
Rob Delicata, Steve A. Schneider
ITCC
2005
IEEE
14 years 3 months ago
Conversion and Proxy Functions for Symmetric Key Ciphers
As a general design criterion, a symmetric key cipher should not be closed under functional composition due to the implications on the security of the cipher. However, there are s...
Debra L. Cook, Angelos D. Keromytis
IMR
2004
Springer
14 years 3 months ago
PDE-Based Gradient Limiting for Mesh Size Functions
We propose a new method for limiting the gradients in a mesh size function by solving a non-linear partial differential equation on the background mesh. Our gradient limiting Ham...
Per-Olof Persson
PLILP
1998
Springer
14 years 2 months ago
Mobile Haskell: Compiling Lazy Functional Programs for the Java Virtual Machine
This paper shows how lazy functional programs can be made mobile by compiling them for the Java Virtual Machine. The Haskell compiler it describes is based on the h ,Gi-machine, wh...
David Wakeling
DAC
1993
ACM
14 years 2 months ago
Spectral Transforms for Large Boolean Functions with Applications to Technology Mapping
The Walsh transform has numerous applications in computer-aided design, but the usefulness of these techniques in practice has been limited by the size of the boolean functions th...
Edmund M. Clarke, Kenneth L. McMillan, Xudong Zhao...