Results 51 to 60 of about 2,250,044 (344)
The myth of occurrence-based semantics [PDF]
The principle of compositionality requires that the meaning of a complex expression remains the same after substitution of synonymous expressions. Alleged counterexamples to compositionality seem to force a theoretical choice: either apparent synonyms ...
Pickel, Bryan, Rabern, Brian
core +4 more sources
Cryptography is commonly used to secure communication and data transmission over insecure networks through the use of cryptosystems. A cryptosystem is a set of cryptographic algorithms offering security facilities for maintaining more cover-ups.
N. Siddiqui +9 more
semanticscholar +1 more source
Designing energy-efficient and secure cryptographic circuits in low-frequency medical devices are challenging due to low-energy requirements. Also, the conventional CMOS logic-based cryptographic circuits solutions in medical devices can be vulnerable to
Amit Degada, Himanshu Thapliyal
doaj +1 more source
AUTOMATON MODEL, DEVICE SYNTHESIS AND ADAPTIVE SUBSTITUTION ALGORITHM FOR CACHE MEMORY
The probability indicators of the hits or misses events have conditioned the application of the certain substitution policies in the associative cache and the associative translation look-a-side buffer.
Вадим Олексійович Пуйденко
doaj +1 more source
Lattice Structure of Some Closed Classes for Three-Valued Logic and Its Applications
This paper provides a brief overview of modern applications of nonbinary logic models, where the design of heterogeneous computing systems with small computing units based on three-valued logic produces a mathematically better and more effective solution
Elmira Yu. Kalimulina
doaj +1 more source
Productive Corecursion in Logic Programming [PDF]
Logic Programming is a Turing complete language. As a consequence, designing algorithms that decide termination and non-termination of programs or decide inductive/coinductive soundness of formulae is a challenging task.
Komendantskaya, Ekaterina, Li, Yue
core +2 more sources
This work reports a novel chaos-based affine transformation generation method, which is based on rotational matrices to design strong key-based S-boxes.
Muhammad Sarmad Mahmood Malik +6 more
semanticscholar +1 more source
The current study is aimed to compare the effect of fat and/or wheat-flour substitution with apple pomace on the physicochemical and shelf-life of oily cakes. The sensory quality of samples was evaluated using the Delphi-Fuzzy logic method.
Maryam Sabet Ghadam +4 more
doaj +1 more source
Comparison of Pre and Post-Action of a Finite Abelian Group Over Certain Nonlinear Schemes
This paper proposes to present a novel group theoretic approach of improvising the cryptographic features of substitution-boxes. The approach employs a proposed finite Abelian group of order 3720 with three generators and six relations.
Muhammad Awais Yousaf +4 more
doaj +1 more source
Many logic programming based approaches can be used to describe and solve combinatorial search problems. On the one hand there is constraint logic programming which computes a solution as an answer substitution to a query containing the variables of the ...
De Mot, Emmanuel +2 more
core +3 more sources

