Sciweavers

1000 search results - page 146 / 200
» Nominal rewriting systems
Sort
View
GMP
2006
IEEE
117views Solid Modeling» more  GMP 2006»
14 years 2 months ago
Two-Dimensional Selections for Feature-Based Data Exchange
Proper treatment of selections is essential in parametric feature-based design. Data exchange is one of the most important operators in any design paradigm. In this paper we addre...
Ari Rappoport, Steven N. Spitz, Michal Etzion
SYNASC
2005
IEEE
117views Algorithms» more  SYNASC 2005»
14 years 2 months ago
Functional-Based Synthesis of Systolic Online Multipliers
— Systolic online algorithms for the multiplication of univariate polynomials and of multiple precision integers are synthesised using a novel method based on the following funct...
Tudor Jebelean, Laura Szakacs
POPL
2005
ACM
14 years 2 months ago
Specifying Kerberos 5 cross-realm authentication
Cross-realm authentication is a useful and interesting component of Kerberos aimed at enabling secure access to services astride organizational boundaries. We present a formalizat...
Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov,...
GPCE
2005
Springer
14 years 2 months ago
Source-Level Optimization of Run-Time Program Generators
Abstract. We describe our efforts to use source-level rewriting to optimize run-time program generators written in Jumbo, a run-time program generation system for Java. Jumbo is a...
Samuel N. Kamin, Baris Aktemur, Philip Morton
ESORICS
2004
Springer
14 years 2 months ago
Security Property Based Administrative Controls
Abstract. Access control languages which support administrative controls, and thus allow the ordinary permissions of a system to change, have traditionally been constructed with ï¬...
Jon A. Solworth, Robert H. Sloan