• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 8,194
Next 10 →

Featherweight Java: A Minimal Core Calculus for Java and GJ

by Atsushi Igarashi, Benjamin C. Pierce, Philip Wadler - ACM Transactions on Programming Languages and Systems , 1999
"... Several recent studies have introduced lightweight versions of Java: reduced languages in which complex features like threads and reflection are dropped to enable rigorous arguments about key properties such as type safety. We carry this process a step further, omitting almost all features of the fu ..."
Abstract - Cited by 659 (23 self) - Add to MetaCart
Several recent studies have introduced lightweight versions of Java: reduced languages in which complex features like threads and reflection are dropped to enable rigorous arguments about key properties such as type safety. We carry this process a step further, omitting almost all features

CIL: Intermediate language and tools for analysis and transformation of C programs

by George C. Necula, Scott Mcpeak, Shree P. Rahul, Westley Weimer - In International Conference on Compiler Construction , 2002
"... Abstract. This paper describes the CIntermediate Language: a highlevel representation along with a set of tools that permit easy analysis and source-to-source transformation of C programs. Compared to C, CIL has fewer constructs. It breaks down certain complicated constructs of C into simpler ones, ..."
Abstract - Cited by 533 (11 self) - Add to MetaCart
are currently using CIL as part of a system that analyzes and instruments C programs with run-time checks to ensure type safety. CIL has served us very well in this project, and we believe it can usefully be applied in other situations as well. 1

Extensibility, safety and performance in the SPIN operating system

by Brian N. Bershad, Stefan Savage, Przemys Pardyak, Emin Gun Sirer, Marc E. Fiuczynski, David Becker, Craig Chambers, Susan Eggers , 1995
"... This paper describes the motivation, architecture and performance of SPIN, an extensible operating system. SPIN provides an extension infrastructure, together with a core set of extensible services, that allow applications to safely change the operating system's interface and implementation. Ex ..."
Abstract - Cited by 458 (16 self) - Add to MetaCart
. Extensions allow an application to specialize the underlying operating system in order to achieve a particular level of performance and functionality. SPIN uses language and link-time mechanisms to inexpensively export ne-grained interfaces to operating system services. Extensions are written in a type safe

Basic concepts and taxonomy of dependable and secure computing

by Algirdas Avizienis, Jean-claude Laprie, Brian Randell, Carl Landwehr - IEEE TDSC , 2004
"... This paper gives the main definitions relating to dependability, a generic concept including as special case such attributes as reliability, availability, safety, integrity, maintainability, etc. Security brings in concerns for confidentiality, in addition to availability and integrity. Basic defin ..."
Abstract - Cited by 779 (6 self) - Add to MetaCart
This paper gives the main definitions relating to dependability, a generic concept including as special case such attributes as reliability, availability, safety, integrity, maintainability, etc. Security brings in concerns for confidentiality, in addition to availability and integrity. Basic

Beyond pleasure and pain

by E. Tory Higgins - American Psychologist , 1997
"... People approach pleasure and avoid pain. To discover the true nature of approach-avoidance motivation, psychologists need to move beyond this hedonic principle to the principles that underlie the different ways that it operates. One such principle is regulatory focus, which distinguishes self-regula ..."
Abstract - Cited by 527 (21 self) - Add to MetaCart
-regulation with a promotion focus (accomplishments and aspirations)from self-regulation with a prevention focus (safety and responsibilities). This principle is used to reconsider the fundamental nature of approach-avoidance, expectancy-value relations, and emotional and evaluative sensitivities. Both types

Improving Type-Safety in CORBA

by Crawley And Duddy, S. C. Crawley, K. R. Duddy
"... CORBA presents a model of distributed computing in which distributed objects communicate using a high-level "information bus" called an Object Request Broker (ORB). In this paper we describe a problem with the current CORBA specification that makes ORB communication non-type-safe in certai ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
-safe in certain situations. We describe a solution to the problem based on the use of unique identifiers, and show how it can be implemented efficiently in both stand-alone and federated CORBA-based systems. Keywords CORBA, IDL, interface type, repository id, type safety, type checking, federation 1

Type-Safety and Overloading in Sather

by In Sather, B. Gomes, D. Stoutamire, B. Weissman , 1997
"... Method overloading is a form of statically resolved multi-methods which may be used to express specialization in a type hierarchy[GSWF97]. The design of the overloading rule in Sather is constrained by the presence of multiple-subtyping, and the ability to add supertyping edges to the type graph aft ..."
Abstract - Add to MetaCart
after-the-fact [SO96]. We describe the design of overloading rules which permit method specialization while allowing separate type-checking i.e. existing code cannot be broken by after-thefact addition of supertyping edges. Type-Safety and Overloading in Sather April 24, 1998 2 1.0 Introduction

Monadic State: Axiomatization and Type Safety

by John Launchbury, Amr Sabry, When Launchbury, Peyton Jones Introduced Encapsulated - In Proceedings of the 2nd ACM SIGPLAN International Conference on Functional Programming (ICFP’97 , 1997
"... Type safety of imperative programs is an area fraught with difficulty and requiring great care. The SML solution to the problem, originally involving imperative type variables, has been recently simplified to the syntactic-value restriction. In Haskell, the problem is addressed in a rather different ..."
Abstract - Cited by 25 (5 self) - Add to MetaCart
Type safety of imperative programs is an area fraught with difficulty and requiring great care. The SML solution to the problem, originally involving imperative type variables, has been recently simplified to the syntactic-value restriction. In Haskell, the problem is addressed in a rather

Type-Safety and Overloading in Sather

by B. Gomes, D. Stoutamire, B. Weissman , 1997
"... Method overloading is a form of statically resolved multi-methods which may be used to express specialization in a type hierarchy[GSWF97]. The design of the overloading rule in Sather is constrained by the presence of multiple-subtyping, and the ability to add supertyping edges to the type graph aft ..."
Abstract - Add to MetaCart
Method overloading is a form of statically resolved multi-methods which may be used to express specialization in a type hierarchy[GSWF97]. The design of the overloading rule in Sather is constrained by the presence of multiple-subtyping, and the ability to add supertyping edges to the type graph

Proof Approaches To Type Safety

by Also Called
"... this mean? ..."
Abstract - Add to MetaCart
this mean?
Next 10 →
Results 1 - 10 of 8,194
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University