[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Volume 33, Issue 2January 2011
Reflects downloads up to 01 Jan 2025Bibliometrics
Skip Table Of Content Section
research-article
Open Access
Morphing: Structurally shaping a class by reflecting on others
Article No.: 6, Pages 1–44https://doi.org/10.1145/1890028.1890029

We present MorphJ: a language for specifying general classes whose members are produced by iterating over members of other classes. We call this technique “class morphing” or just “morphing.” Morphing extends the notion of genericity so that not only ...

research-article
Open Access
Automated termination proofs for haskell by term rewriting
Article No.: 7, Pages 1–39https://doi.org/10.1145/1890028.1890030

There are many powerful techniques for automated termination analysis of term rewriting. However, up to now they have hardly been used for real programming languages. We present a new approach which permits the application of existing techniques from ...

research-article
Open Access
Refinement types for secure implementations
Article No.: 8, Pages 1–45https://doi.org/10.1145/1890028.1890031

We present the design and implementation of a typechecker for verifying security properties of the source code of cryptographic protocols and access control mechanisms. The underlying type theory is a λ-calculus equipped with refinement types for ...

Subjects

Comments

Please enable JavaScript to view thecomments powered by Disqus.