-
1
-
-
0032681509
-
A core calculus of dependency
-
ACM Press, January
-
M. Abadi, A. Banerjee, N. Heintze, and J. G. Riecke. A core calculus of dependency. In Conference Record of the 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), pages 147-160. ACM Press, January 1999.
-
(1999)
Conference Record of the 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL)
, pp. 147-160
-
-
Abadi, M.1
Banerjee, A.2
Heintze, N.3
Riecke, J.G.4
-
5
-
-
84958625049
-
Minimal thunkification
-
P. Cousot, M. Falaschi, G. Filè, and A. Rauzy, editors. Springer-Verlag, September
-
T. Amtoft. Minimal thunkification. In P. Cousot, M. Falaschi, G. Filè, and A. Rauzy, editors, Proceedings of the 3rd International Workshop on Static Analysis, Padova, Italy, volume 724 of Lecture Notes in Computer Science, pages 218-229. Springer-Verlag, September 1993.
-
(1993)
Proceedings of the 3rd International Workshop on Static Analysis, Padova, Italy, Volume 724 of Lecture Notes in Computer Science
, vol.724
, pp. 218-229
-
-
Amtoft, T.1
-
6
-
-
84955577131
-
Subtyping with singleton types
-
L. Pacholski and J. Tiuryn, editors, number 933 in Lecture Notes in Computer Science. Springer-Verlag
-
D. Aspinall. Subtyping with singleton types. In L. Pacholski and J. Tiuryn, editors, Computer Science Logic, 8th International Workshop (CSL'94), number 933 in Lecture Notes in Computer Science. Springer-Verlag, 1995.
-
(1995)
Computer Science Logic, 8th International Workshop (CSL'94)
-
-
Aspinall, D.1
-
8
-
-
18944394723
-
Monads, effects and transformations
-
Elsevier, September
-
N. Benton and A. Kennedy. Monads, effects and transformations. In Third International Workshop on Higher Order Operational Techniques in Semantics (HOOTS), Paris, volume 26 of Electronic Notes in Theoretical Computer Science. Elsevier, September 1999.
-
(1999)
Third International Workshop on Higher Order Operational Techniques in Semantics (HOOTS), Paris, Volume 26 of Electronic Notes in Theoretical Computer Science
, vol.26
-
-
Benton, N.1
Kennedy, A.2
-
11
-
-
0347934588
-
Automatic useless-code detection and elimination for hot functional programs
-
F. Damiani and P. Giannini. Automatic useless-code detection and elimination for hot functional programs. Journal of Functional Programming, pages 509-559, 2000.
-
(2000)
Journal of Functional Programming
, pp. 509-559
-
-
Damiani, F.1
Giannini, P.2
-
13
-
-
84945708698
-
An axiomatic basis for computer programming
-
October
-
C. A. R. Hoare. An axiomatic basis for computer programming. Communications of the ACM, 12(10):576-585, October 1969.
-
(1969)
Communications of the ACM
, vol.12
, Issue.10
, pp. 576-585
-
-
Hoare, C.A.R.1
-
19
-
-
0036038554
-
Proving correctness of compiler optimizations by temporal logic
-
January
-
D. Lacey, N. D. Jones, E. Van Wyk, and C. C. Frederiksen. Proving correctness of compiler optimizations by temporal logic. In Proceedings of the 29th Annual ACM SIGPLAN - SIGACT Symposium on Principles of Programming Languages, Portland, January 2002.
-
(2002)
Proceedings of the 29th Annual ACM SIGPLAN - SIGACT Symposium on Principles of Programming Languages, Portland
-
-
Lacey, D.1
Jones, N.D.2
Van Wyk, E.3
Frederiksen, C.C.4
-
24
-
-
0038220668
-
Credible compilation
-
Massachusets Institute of Technology, March
-
M. Rinard. Credible compilation. Technical Report MIT-LCS-TR-776, Massachusets Institute of Technology, March 1999.
-
(1999)
Technical Report
, vol.MIT-LCS-TR-776
-
-
Rinard, M.1
-
26
-
-
0035276729
-
A PER model of secure information flow in sequential programs
-
March
-
A. Sabelfeld and D. Sands. A PER model of secure information flow in sequential programs. Higher-Order and Symbolic Computation, 14(1):59-91, March 2001.
-
(2001)
Higher-order and Symbolic Computation
, vol.14
, Issue.1
, pp. 59-91
-
-
Sabelfeld, A.1
Sands, D.2
-
32
-
-
0035612136
-
Set constraints for destructive array update optimization
-
May
-
M. Wand and W. D. Clinger. Set constraints for destructive array update optimization. Journal of Functional Programming, 11 (3):319-346, May 2001. Preliminary version appeared in International Conference on Computer Languages, 1998.
-
(2001)
Journal of Functional Programming
, vol.11
, Issue.3
, pp. 319-346
-
-
Wand, M.1
Clinger, W.D.2
-
33
-
-
0035612136
-
-
M. Wand and W. D. Clinger. Set constraints for destructive array update optimization. Journal of Functional Programming, 11 (3):319-346, May 2001. Preliminary version appeared in International Conference on Computer Languages, 1998.
-
(1998)
International Conference on Computer Languages
-
-
-
37
-
-
2442613346
-
Verification of the Schorr-Waite graph marking algorithm by refinement
-
Slides from talk at, March
-
H. Yang. Verification of the Schorr-Waite graph marking algorithm by refinement. Slides from talk at Dagstuhl Seminar 03101, March 2003.
-
(2003)
Dagstuhl Seminar 03101
-
-
Yang, H.1
-
38
-
-
1442284666
-
VOC: A methodology for the translation validation for optimizing compilers
-
L. Zuck, A. Pnueli, Y. Fang, and B. Goldberg. VOC: A methodology for the translation validation for optimizing compilers. Journal of Universal Computer Science, 9(3):223-247, 2003.
-
(2003)
Journal of Universal Computer Science
, vol.9
, Issue.3
, pp. 223-247
-
-
Zuck, L.1
Pnueli, A.2
Fang, Y.3
Goldberg, B.4
|