The three problems of the title — the first two widely discussed in the literature, the third less well known but just as important for further development of object technology ...
Security folklore holds that a security mechanism based on stack inspection is incompatible with a global tail call optimization policy. An implementation of such a language may ha...
We present a type theory for higher-order modules that accounts for many central issues in module system design, including translucency, applicativity, generativity, and modules a...
Current asynchronous tools are focussed mainly on the design of a single interface module. In many applications, one must design interacting interface modules that potentially comm...
Abstract— This paper reviews a template for dynamical climbing originating in biology, explores its stability properties in a numerical model, and presents empirical data from a ...
Jonathan Clark, Daniel Goldman, Pei-Chun Lin, Gora...