Sciweavers

890 search results - page 41 / 178
» Programming language methods in computer security
Sort
View
143
Voted
SAS
1994
Springer
159views Formal Methods» more  SAS 1994»
15 years 4 months ago
Iterative Fixed Point Computation for Type-Based Strictness Analysis
Amtoft has formulated an "on-line" constraint normalization method for solving a strictness inference problem inspired by Wright. From the syntactic form of the normaliz...
Fritz Henglein
108
Voted
ACMIDC
2009
15 years 3 months ago
Simple tangible language elements for young children
We propose simple tangible language elements for very young children to use when constructing programmes. The equivalent Turtle Talk instructions are given for comparison. Two exa...
Andrew Cyrus Smith
OOPSLA
2010
Springer
14 years 11 months ago
Task types for pervasive atomicity
Atomic regions are an important concept in correct concurrent programming: since atomic regions can be viewed as having executed in a single step, atomicity greatly reduces the nu...
Aditya Kulkarni, Yu David Liu, Scott F. Smith
94
Voted
PLDI
2012
ACM
13 years 2 months ago
Language-based control and mitigation of timing channels
We propose a new language-based approach to mitigating timing channels. In this language, well-typed programs provably leak only a bounded amount of information over time through ...
Danfeng Zhang, Aslan Askarov, Andrew C. Myers
111
Voted
LISP
2008
96views more  LISP 2008»
15 years 12 days ago
Dynamic slicing of lazy functional programs based on redex trails
Abstract. Tracing computations is a widely used methodology for program debugging. Lazy languages, however, pose new demands on tracing techniques because following the actual trac...
Claudio Ochoa, Josep Silva, Germán Vidal