Cited By
View all- Gissurarson MMista AStoughton AVassena M(2020)Short Paper: Weak Runtime-Irrelevant Typing for SecurityProceedings of the 15th Workshop on Programming Languages and Analysis for Security10.1145/3411506.3417595(13-17)Online publication date: 13-Nov-2020
- Aronsson MSheeran M(2017)Hardware software co-design in HaskellACM SIGPLAN Notices10.1145/3156695.312297052:10(162-173)Online publication date: 7-Sep-2017
- Ekblad A(2017)A meta-EDSL for distributed web applicationsACM SIGPLAN Notices10.1145/3156695.312296952:10(75-85)Online publication date: 7-Sep-2017
- Show More Cited By