Sciweavers

1665 search results - page 210 / 333
» Design Patterns as Language Constructs
Sort
View
CSFW
2006
IEEE
15 years 8 months ago
Encoding Information Flow in Haskell
This paper presents an embedded security sublanguage for enforcing information-flow policies in the standard Haskell programming language. The sublanguage provides useful informa...
Peng Li, Steve Zdancewic
CEFP
2005
Springer
15 years 8 months ago
Exploiting Purely Functional Programming to Obtain Bounded Resource Behaviour: The Hume Approach
This chapter describes Hume: a functionally-based language for programming with bounded resource usage, including time and space properties. The purpose of the Hume language design...
Kevin Hammond
SAC
2004
ACM
15 years 8 months ago
The inheritance anomaly: ten years after
The term inheritance anomaly was coined in 1993 by Matsuoka and Yonezawa [15] to refer to the problems arising by the coexistence of inheritance and concurrency in concurrent obje...
Giuseppe Milicia, Vladimiro Sassone
ML
2008
ACM
109views Machine Learning» more  ML 2008»
15 years 2 months ago
O'browser: objective caml on browsers
We present a way to run Objective Caml programs on a standard, unmodified web browser, with a compatible data representation and execution model, including concurrency. To achieve...
Benjamin Canou, Vincent Balat, Emmanuel Chailloux
TCS
2010
15 years 25 days ago
Arrows for secure information flow
This paper presents an embedded security sublanguage for enforcing informationflow policies in the standard Haskell programming language. The sublanguage provides useful informat...
Peng Li, Steve Zdancewic