Sciweavers

2290 search results - page 92 / 458
» Extensible Protected Types
Sort
View
JFP
2006
89views more  JFP 2006»
15 years 2 months ago
Featherweight generic confinement
Existing approaches to object encapsulation and confinement either rely on restrictions to programs or require the use of specialised ownership type systems. Syntactic restriction...
Alex Potanin, James Noble, Dave Clarke, Robert Bid...
125
Voted
CTCS
1987
Springer
15 years 6 months ago
Good Functors... are Those Preserving Philosophy
of this paper is to prevent the abstract data type researcher from an improper, naive use of category theory. We mainly emphasize some unpleasant properties of the synthesis funct...
Gilles Bernot
CHES
2001
Springer
98views Cryptology» more  CHES 2001»
15 years 7 months ago
Attacks on Cryptoprocessor Transaction Sets
Attacks are presented on the IBM 4758 CCA and the Visa Security Module. Two new attack principles are demonstrated. Related key attacks use known or chosen differences between two...
Mike Bond
109
Voted
ECOOP
2004
Springer
15 years 8 months ago
The Expression Problem Revisited
The expression problem (aka the extensibility problem) refers to a fundamental dilemma of programming: Can your application be structured in such a way that both the data model and...
Mads Torgersen
AOSD
2008
ACM
15 years 4 months ago
StrongAspectJ: flexible and safe pointcut/advice bindings
AspectJ was designed as a seamless aspect-oriented extension of the Java programming language. However, unlike Java, AspectJ does not have a safe type system: an accepted binding ...
Bruno De Fraine, Mario Südholt, Viviane Jonck...