Sciweavers

1821 search results - page 235 / 365
» Security-Aware Program Transformations
Sort
View
DAGSTUHL
2003
13 years 11 months ago
Embedding a Hardware Description Language in Template Haskell
Abstract. Hydra is a domain-specific language for designing digital circuits, which is implemented by embedding within Haskell. Many features required for hardware specification ...
John T. O'Donnell
MSCS
2006
89views more  MSCS 2006»
13 years 9 months ago
Quantum weakest preconditions
We develop a notion of predicate transformer and, in particular, the weakest precondition, appropriate for quantum computation. We show that there is a Stone-type duality between ...
Ellie D'Hondt, Prakash Panangaden
FGCS
2000
96views more  FGCS 2000»
13 years 9 months ago
Logicflow execution model for parallel databases
The LOGFLOW parallel Prolog system is similar to the recent parallel database systems concerning its dataflow execution model and its capability of running on othing architectures...
Péter Kacsuk, Norbert Podhorszki
LISP
2000
77views more  LISP 2000»
13 years 9 months ago
Glossary for Partial Evaluation and Related Topics
Most areas of research or work use their own set of words and phrases and gives specific technical meaning to terms that in everyday speech may mean something less specific or some...
Torben Æ. Mogensen
AUTOMATICA
2010
123views more  AUTOMATICA 2010»
13 years 8 months ago
On the computation of linear model predictive control laws
Finite-time optimal control problems with quadratic performance index for linear systems with linear constraints can be transformed into Quadratic Programs (QPs). Model Predictive ...
Francesco Borrelli, Mato Baotic, Jaroslav Pekar, G...