[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2491404acmotherconferencesBook PagePublication PagesisstaConference Proceedingsconference-collections
ICOOOLPS'13: Proceedings of the 8th Workshop on Implementation, Compilation, Optimization of Object-Oriented Languages, Programs and Systems
ACM2013 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ECOOP '13: European Conference on Object-Oriented Programming Montpellier France 2 July 2013
ISBN:
978-1-4503-2045-0
Published:
02 July 2013
Sponsors:
CNRS, UM2, AITO
In-Cooperation:
Next Conference
Reflects downloads up to 13 Dec 2024Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
research-article
Garbage collection: 50+ years later

It's been more than 50 years since John McCarthy invented garbage collection. The last 15 years or so have been the most exciting as garbage collection became mainstream and is now considered the norm for all/most modern programming languages. However, ...

research-article
Efficiency of subtype test in object oriented languages with generics

In a programming language, the choice of a generics typing policy impacts both typing test semantics and type safety. In this paper, we compare the cost of the generic policy chosen and analyze its impacts on the subtype test performance.

To make this ...

research-article
Programming highly mobile cloud applications of the future

Two major trends are affecting how we program applications for highly mobile devices. First trend is the proliferation of mobile devices, e.g., smartphones and Google Glass, that have megabyte/second connectivity and the ability to run applications that ...

research-article
TRACK: keeping track of highly mobile objects: a lanugage-level proposal position paper

This paper proposes a novel language mechanism to accommodate applications that depend on keeping track of the location of highly mobile objects. New applications are driven by several new trends: new, powerful devices such as smart-phones and Google ...

research-article
History-based security for JavaScript

Providing security guarantees for software systems built out of untrusted components requires the ability to enforce fine-grained access control policies. This is evident in Web 2.0 applications where JavaScript code from different origins is often ...

research-article
Practical information flow for legacy web applications

The popularity of web applications, coupled with the data they operate on, makes them prime targets for hackers that want to misuse them. To make matters worse, a lot of these applications, have not been implemented with security in mind, while ...

Contributors
  • University of Rennes
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations

Acceptance Rates

Overall Acceptance Rate 11 of 14 submissions, 79%
YearSubmittedAcceptedRate
ICOOOLPS '186583%
ICOOOLPS'178675%
Overall141179%