Sciweavers

80 search results - page 3 / 16
» Insecure Programming: How Culpable is a Language's Syntax
Sort
View
ACE
2003
89views Education» more  ACE 2003»
13 years 6 months ago
The Neglected Battle Fields of Syntax Errors
Syntax error correction is an essential part of the debugging process. Yet there has been little research investigating how programmers approach syntax error correction and how to...
Sarah K. Kummerfeld, Judy Kay
OOPSLA
2010
Springer
13 years 3 months ago
Ficticious: MicroLanguages for interactive fiction
In this paper we provide an experience report where language oriented programming approaches are applied to complex game design. Ficticious is a G-expression based pidgin of sever...
James Dean Palmer
SIGCSE
2005
ACM
123views Education» more  SIGCSE 2005»
13 years 10 months ago
Taming Java for the classroom
Java is the canonical language for teaching introductory programming, but its complex syntax and abundance of constructs are difficult for beginners to learn. This paper shows how...
James I. Hsia, Elspeth Simpson, Daniel Smith, Robe...
SPC
2005
Springer
13 years 10 months ago
A Theorem Proving Approach to Analysis of Secure Information Flow
Abstract. Most attempts at analysing secure information flow in programs are based on domain-specific logics. Though computationally feahese approaches suffer from the need for ...
Ádám Darvas, Reiner Hähnle, Dav...
COMPSAC
2009
IEEE
13 years 8 months ago
Cartesian Programming: The TransLucid Programming Language
Abstract. The TransLucid programming language is a low-level intensional language, designed to be sufficiently rich for it to be the target language for translating the common prog...
John Plaice, Blanca Mancilla