Sciweavers

360 search results - page 42 / 72
» Dependently Typed Programming in Agda
Sort
View
DAGSTUHL
2001
13 years 9 months ago
A Language-Based Approach to Security
Abstract. Language-based security leverages program analysis and program rewriting to enforce security policies. The approach promises efficient enforcement of fine-grained access ...
Fred B. Schneider, J. Gregory Morrisett, Robert Ha...
BMCBI
2005
101views more  BMCBI 2005»
13 years 7 months ago
PALSSE: A program to delineate linear secondary structural elements from protein structures
Background: The majority of residues in protein structures are involved in the formation of helices and -strands. These distinctive secondary structure patterns can be used to rep...
Indraneel Majumdar, S. Sri Krishna, Nick V. Grishi...
ECOOP
2007
Springer
13 years 11 months ago
Validity Invariants and Effects
Object invariants describe the consistency of object states, and are crucial for reasoning about the correctness of object-oriented programs. However, reasoning about object invari...
Yi Lu 0003, John Potter, Jingling Xue
PLDI
2009
ACM
14 years 2 months ago
Catch me if you can: permissive yet secure error handling
Program errors are a source of information leaks. Tracking these leaks is hard because error propagation breaks out of program structure. Programming languages often feature excep...
Aslan Askarov, Andrei Sabelfeld
POPL
2010
ACM
14 years 5 months ago
Contracts Made Manifest
Since Findler and Felleisen [2002] introduced higher-order contracts, many variants have been proposed. Broadly, these fall into two groups: some follow Findler and Felleisen in u...
Benjamin C. Pierce, Michael Greenberg, Stephanie W...