Sciweavers

39 search results - page 6 / 8
» Introducing safe unknown types in Java-like languages
Sort
View
131
Voted
PPDP
2004
Springer
15 years 8 months ago
Semi-naive evaluation in linear tabling
Semi-naive evaluation is an effective technique employed in bottom-up evaluation of logic programs to avoid redundant joins of answers. The impact of this technique on top-down e...
Neng-Fa Zhou, Yi-Dong Shen, Taisuke Sato
ECOOP
2010
Springer
15 years 7 months ago
Capabilities for Uniqueness and Borrowing
Abstract. An important application of unique object references is safe and efficient message passing in concurrent object-oriented programming. However, to prevent the ill effects...
Philipp Haller, Martin Odersky
125
Voted
ESOP
2009
Springer
15 years 6 months ago
Existential Quantification for Variant Ownership
Ownership types characterize the topology of objects in the heap, through a characterization of the context to which an object belongs. They have been used to support reasoning, me...
Nicholas R. Cameron, Sophia Drossopoulou
96
Voted
FMCO
2007
Springer
103views Formal Methods» more  FMCO 2007»
15 years 8 months ago
Safety Guarantees from Explicit Resource Management
We present a language and a program analysis that certifies the safe use of flexible resource management idioms, in particular advance reservation or “block booking” of costl...
David Aspinall, Patrick Maier, Ian Stark
137
Voted
CSFW
2011
IEEE
14 years 2 months ago
Modular Protections against Non-control Data Attacks
—This paper introduces YARRA, a conservative extension to C to protect applications from non-control data attacks. YARRA programmers specify their data integrity requirements by ...
Cole Schlesinger, Karthik Pattabiraman, Nikhil Swa...