Results 31 to 40 of about 101,493 (254)

Sound Computational Interpretation of Formal Encryption with Composed Keys [PDF]

open access: yes, 2003
The formal and computational views of cryptography have been related by the seminal work of Abadi and Rogaway. In their work, a formal treatment of encryption that uses atomic keys is justified in the computational world.
Corin, R.J., Corin, R.J., Laud, P.
core   +11 more sources

Equivalence of eval-readback and eval-apply big-step evaluators by structuring the lambda-calculus's strategy space [PDF]

open access: yesLogical Methods in Computer Science
We study the equivalence between eval-readback and eval-apply big-step evaluators in the general setting of the pure lambda calculus. We study `one-step' equivalence (same strategy) and also discuss `big-step' equivalence (same final result).
Pablo Nogueira, Álvaro García-Pérez
doaj   +1 more source

Efficient reduction of nondeterministic automata with application to language inclusion testing [PDF]

open access: yesLogical Methods in Computer Science, 2019
We present efficient algorithms to reduce the size of nondeterministic B\"uchi word automata (NBA) and nondeterministic finite word automata (NFA), while retaining their languages.
Lorenzo Clemente, Richard Mayr
doaj   +1 more source

A Computational Approach to Reflective Meta-Reasoning about Languages with Bindings [PDF]

open access: yes, 2005
We present a foundation for a computational meta-theory of languages with bindings implemented in a computer-aided formal reasoning environment. Our theory provides the ability to reason abstractly about operators, languages, open-ended languages ...
Hickey, Jason   +3 more
core   +4 more sources

Towards a Uniform Theory of Effectful State Machines

open access: yes, 2020
Using recent developments in coalgebraic and monad-based semantics, we present a uniform study of various notions of machines, e.g. finite state machines, multi-stack machines, Turing machines, valence automata, and weighted automata.
Goncharov, Sergey   +2 more
core   +2 more sources

Problem Solving of Non-equivalence Problems in English Into Indonesian Text [PDF]

open access: yes, 2016
In the process of transferring one message of Source Language (SL) to Target Language (TL) in a translation must be careful by a translator, because one word may have more than one meaning.
Ninsiana, W. (Widhiya)
core   +2 more sources

Deutsche und albanische Phraseologismen mit Tierbezeichnungen im Kontrast

open access: yesLinguistik Online, 2011
The object of this article are animal idioms in contemporary German and Albanian: the article treats those units that denote animal names in their formal structure with phraseological, figurative meaning.
Milote Sadiku
doaj   +1 more source

CapablePtrs: Securely Compiling Partial Programs using the Pointers-as-Capabilities Principle [PDF]

open access: yes, 2020
Capability machines such as CHERI provide memory capabilities that can be used by compilers to provide security benefits for compiled code (e.g., memory safety). The C to CHERI compiler, for example, achieves memory safety by following a principle called
Devriese, Dominique   +5 more
core   +3 more sources

Ethnical Peculiarities of Comparative Phraseological Units in the English, German And Russian Languages

open access: yesVestnik Volgogradskogo Gosudarstvennogo Universiteta. Seriâ 2. Âzykoznanie, 2015
The article presents the results of comparative studies of phraseological units in the English, Russian and German languages, that are in terms of semantics oriented to interpretation and description of a person's character, appearance, and mental ...
Elena Evgenyevna Vedmanova   +1 more
doaj   +1 more source

Translation Strategies and Equivalence in Formal Document Translation: A Study of UNESCO Agreements

open access: yesJournal of Languages and Language Teaching
This research investigates translation strategies and equivalence in translating Indonesian cultural terms in UNESCO agreements into English. The study aims to explore how translation strategies are adapted to address challenges in formal document ...
Ahmad Syafran   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy