Another look at parameterization for order-sorted algebraic specifications
نویسندگان
چکیده
منابع مشابه
Colimits of order-sorted specifications
We prove cocompleteness of the category of CASL signatures , of monotone signatures, of strongly regular signatures and of strongly locally ltered signatures. This shows that using these signature categories is compatible with a pushout or colimit based module system.
متن کاملParametrization for Order-Sorted Algebraic Specification
We investigate parametrization for order-sorted algebraic specifications. As a prerequisite we study free constructions for order-sorted algebras and relate the various approaches to order-sorting. Then we analyse parameter passing, the result being that the notion of ordersorted specification has to be restricted in order to establish our main result, namely, that parameter passing satisfies t...
متن کاملAnother Look at the Hypocrisy of Chaucer’s Pardoner
For us, readers of Chaucer living in an age when appeal to religious passions and sentiments as a means for the realization of worldly objectives by some charlatans has grown significantly, reviewing the theme of religious hypocrisy treated in The Canterbury Tales can be useful in a way that it proves a helpful means for recognizing and dealing with the hypocrites. The Pardoner of the Tales is ...
متن کاملFormal specifications with higher-order parameterization
Avariant of the language ASL for algebraic specification is presented. This language is equipped with the three specification-building operators of sum, renaming and restriction. The definition of sum is based on the so-called amalgamated union, instead of the set-theoretic union of the original proposal. Afurther dissimilitude lies on the ultra-loose semantics chosen unlike the loose approach....
متن کاملAnother look at HMQV
The HMQV protocols are ‘hashed variants’ of the MQV key agreement protocols. They were introduced at CRYPTO 2005 by Krawczyk, who claimed that the HMQV protocols have very significant advantages over their MQV counterparts: (i) security proofs under reasonable assumptions in the (extended) Canetti-Krawczyk model for key exchange; and (ii) superior performance in some situations. In this paper w...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Computer and System Sciences
سال: 1994
ISSN: 0022-0000
DOI: 10.1016/s0022-0000(05)80074-1