80 research outputs found

    Synchronous Digital Circuits as Functional Programs

    Get PDF
    Functional programming techniques have been used to describe synchronous digital circuits since the early 1980s and have proven successful at describing certain types of designs. Here we survey the systems and formal underpinnings that constitute this tradition. We situate these techniques with respect to other formal methods for hardware design and discuss the work yet to be done

    Introduction to the Literature on Programming Language Design

    Get PDF
    This is an introduction to the literature on programming language design and related topics. It is intended to cite the most important work, and to provide a place for students to start a literature search

    Introduction to the Literature On Programming Language Design

    Get PDF
    This is an introduction to the literature on programming language design and related topics. It is intended to cite the most important work, and to provide a place for students to start a literature search

    The Effects of Profit Sharing and Employee Share Ownership Schemes on Employee Motivation

    Get PDF
    SIGLEAvailable from British Library Document Supply Centre-DSC:DXN025456 / BLDSC - British Library Document Supply CentreGBUnited Kingdo

    Mergers and acquisitions: Comparative study on management buy-outs in UK and China

    Get PDF
    Master'sMASTER OF LAW

    Dimensional Consistency Analysis in Complex Algebraic Models

    Get PDF
    Relations in complex algebraic models include numerous variables and parameter that capture the physical dimensions of the objects represented in models (such as "mass", or "volume" of an object). A model developer must ensure the semantic correctness of the model, which includes consistency across physical dimensions and their units of measure in the model relations. Such dimensional consistency analysis is the subject of the research described in this paper. We propose a new methodological framework for this type of analysis which comprises: - a two-level structure for representing knowledge about physical dimensions and units of measure; and - the dimensional analysis algorithm that uses this structured knowledge for the verification of consistency. The proposed methodology allows us to resolve issues related to handling complex non-decomposable units of measure and the situation when instances of the same physical dimension are associated with different physical quantities. We illustrate the proposed methodological framework using mathematical relations from a comprehensive environmental model developed at IIASA

    Neurofly 2008 abstracts : the 12th European Drosophila neurobiology conference 6-10 September 2008 Wuerzburg, Germany

    Get PDF
    This volume consists of a collection of conference abstracts

    On privacy and anonymity in electronic and non electronic voting: the ballot-as-signature attack.

    Get PDF
    A wealth of protocols for electronic voting have been proposed in the literature over the past years. What makes these protocols difficult to conceive and verify is one fundamental property, anonymity, which is of paramount importance in the real world, in particular when performing actual political elections. Historically, certain techniques have been used in actual elections to nullify anonymity and effectively coerce voters, by exploiting an evident weakness in many voting protocols; these techniques were used in traditional elections well before the notion of electronic voting was even proposed, yet, they still seem to be little known: as a consequence, we find recent proposals of voting protocols that can easily be attacked this way, like Rivest's ThreeBallot scheme, or clever attempts at formal definitions of privacy and anonymity properties that would not rule out such flawed protocols. In this paper, we describe one old technique, effectively used in Italy over twenty years ago, and show how the flaws or incompleteness in current protocols and formalization can be clearly exposed just through that simple idea. We also show how this very same simple attack can be effectively used today on US-style elections, regardless of the presence of a VVPB or VVPT. We hope that a wide circulation of this simple ideas will help design better protocols and formalization in the near future
    corecore