Sciweavers

890 search results - page 30 / 178
» Programming language methods in computer security
Sort
View
112
Voted
PADL
2000
Springer
15 years 4 months ago
Programming Deep Concurrent Constraint Combinators
Constraint combination methods are essential for a flexible constraint programming system. This paper presents deep concurrent constraint combinators based on computation spaces as...
Christian Schulte
FLOPS
2006
Springer
15 years 4 months ago
Convergence in Language Design: A Case of Lightning Striking Four Times in the Same Place
What will a definitive programming language look like? By definitive language I mean a programming language that gives good soat its level of abstraction, allowing computer science...
Peter Van Roy
127
Voted
APLAS
2010
ACM
15 years 23 days ago
Typechecking Higher-Order Security Libraries
Abstract. We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate ch...
Karthikeyan Bhargavan, Cédric Fournet, Nata...
93
Voted
PADL
2010
Springer
15 years 9 months ago
First-Order Interactive Programming
Abstract. Interactive programming is a method for implementing programming languages that supports an interactive, exploratory style of program development and debugging. The basic...
Roly Perera
ENTCS
2007
104views more  ENTCS 2007»
15 years 15 days ago
Algorithmic Debugging of Java Programs
In this paper we propose applying the ideas of declarative debugging to the object-oriented language Java as an alternative to traditional trace debuggers used in imperative langu...
Rafael Caballero, Christian Hermanns, Herbert Kuch...