Sciweavers

526 search results - page 10 / 106
» Type Abstractions of Name-Passing Processes
Sort
View
129
Voted
ICFP
2008
ACM
16 years 3 months ago
Typed closure conversion preserves observational equivalence
Language-based security relies on the assumption that all potential attacks are bound by the rules of the language in question. When programs are compiled into a different languag...
Amal Ahmed, Matthias Blume
111
Voted
FASE
2009
Springer
15 years 10 months ago
Transformation of Type Graphs with Inheritance for Ensuring Security in E-Government Networks
Abstract. E-government services usually process large amounts of confidential data. Therefore, security requirements for the communication between components have to be adhered in...
Frank Hermann, Hartmut Ehrig, Claudia Ermel
BIRTHDAY
2008
Springer
15 years 5 months ago
Session and Union Types for Object Oriented Programming
In network applications it is crucial to have a mechanism to guarantee that communications evolve correctly according to the agreed protocol. Session types offer a method for abstr...
Lorenzo Bettini, Sara Capecchi, Mariangiola Dezani...
153
Voted
DAGSTUHL
2007
15 years 5 months ago
Graph matching with type constraints on nodes and edges
Abstract. In this paper, we consider two particular problems of directed graph matching. The first problem concerns graphs with nodes that have been subdivided into classes of di...
Catherine Fraikin, Paul Van Dooren
126
Voted
ECOOP
2000
Springer
15 years 7 months ago
Ionic Types
Abstract. We are interested in the class of systems for which the satisfaction of code dependencies is a dynamic process rather than one which is determined purely at load-time. Ex...
Simon A. Dobson, Brian Matthews