Sciweavers

730 search results - page 41 / 146
» Security-typed programming within dependently typed programm...
Sort
View
GECCO
2003
Springer
128views Optimization» more  GECCO 2003»
14 years 1 months ago
Cellular Programming and Symmetric Key Cryptography Systems
Abstract. The problem of designing symmetric key cryptography algorithms based upon cellular automata (CAs) is considered. The reliability of the Vernam cipher used in the process ...
Franciszek Seredynski, Pascal Bouvry, Albert Y. Zo...
POPL
2003
ACM
14 years 8 months ago
Selective memoization
We present a framework for applying memoization selectively. The framework provides programmer control over equality, space usage, and identification of precise dependences so tha...
Umut A. Acar, Guy E. Blelloch, Robert Harper
ECSQARU
1997
Springer
14 years 19 days ago
Cactus: A Branching-Time Logic Programming Language
Abstract. Temporal programming languages are recognized as natural and expressive formalisms for describing dynamic systems. However, most such languages are based on linear ow of ...
Panos Rondogiannis, Manolis Gergatsoulis, Themis P...
ICLP
1997
Springer
14 years 19 days ago
Hybrid Probabilistic Programs
Hybrid Probabilistic Programs (HPPs) are logic programs that allow the programmer to explicitly encode his knowledge of the dependencies between events being described in the prog...
Alex Dekhtyar, V. S. Subrahmanian
POPL
2006
ACM
14 years 8 months ago
The next 700 data description languages
In the spirit of Landin, we present a calculus of dependent types to serve as the semantic foundation for a family of languages called data description languages. Such languages, ...
Kathleen Fisher, Yitzhak Mandelbaum, David Walker