Sciweavers

2086 search results - page 163 / 418
» Mathematical Theory Exploration
Sort
View
ICFP
2008
ACM
16 years 3 months ago
AURA: a programming language for authorization and audit
This paper presents AURA, a programming language for access control that treats ordinary programming constructs (e.g., integers and recursive functions) and authorization logic co...
Limin Jia, Jeffrey A. Vaughan, Karl Mazurak, Jianz...
131
Voted
SAC
2009
ACM
15 years 10 months ago
Origami fold as algebraic graph rewriting
We formalize paper fold (origami) by graph rewriting. Origami construction is abstractly described by a rewriting sys), where O is the set of abstract origami’s and ary relation...
Tetsuo Ida, Hidekazu Takahashi
151
Voted
SAC
2009
ACM
15 years 10 months ago
Runtime monitoring of web service choreographies using streaming XML
A wide range of web service choreography constraints on the content and sequentiality of messages can be translated into Linear Temporal Logic (LTL). Although they can be statical...
Sylvain Hallé, Roger Villemaire
LATA
2009
Springer
15 years 10 months ago
Termination of Priority Rewriting
Introducing priorities on rules in rewriting increases their expressive power and helps to limit computations. Priority rewriting is used in rule-based programming as well as in f...
Isabelle Gnaedig
122
Voted
ISSAC
2009
Springer
123views Mathematics» more  ISSAC 2009»
15 years 10 months ago
Schemes for deterministic polynomial factoring
In this work we relate the deterministic complexity of factoring polynomials (over finite fields) to certain combinatorial objects, we call m-schemes, that are generalizations o...
Gábor Ivanyos, Marek Karpinski, Nitin Saxen...