메뉴 건너뛰기




Volumn 26, Issue 6, 2004, Pages 1029-1052

A tail-recursive machine with stack inspection

Author keywords

Stack inspection; Tail call optimization; Tail recursion

Indexed keywords

OPTIMIZATION POLICY; STACK COMPENSATION; TAIL CALL OPTIMIZATION; TAIL RECURSIVE;

EID: 24644501711     PISSN: 01640925     EISSN: None     Source Type: Journal    
DOI: 10.1145/1034774.1034778     Document Type: Article
Times cited : (31)

References (21)
  • 7
    • 0002193891 scopus 로고
    • Control operators, the SECD-machine, and the X-calculus
    • M. Wirsing, Ed. Elsevier Science Publishers B.V., Amsterdam, The Netherlands
    • FELLEISEN, M. AND FRIEDMAN, D. P. 1986. Control operators, the SECD-machine, and the X-calculus. In Formal Description of Programming Concepts III, M. Wirsing, Ed. Elsevier Science Publishers B.V., Amsterdam, The Netherlands, 193-217.
    • (1986) Formal Description of Programming Concepts III , pp. 193-217
    • Felleisen, M.1    Friedman, D.P.2
  • 14
    • 24644483597 scopus 로고    scopus 로고
    • Part of .NET SDK documentation
    • MICROSOFT. 2002. Common language runtime SDK documentation. Available online at http:// www.microsoft.com. Part of .NET SDK documentation.
    • (2002) Common Language Runtime SDK Documentation
  • 15
    • 18944377121 scopus 로고
    • Call-by-name, call-by-value and the λ-calculus
    • PLOTKIN, G. D. 1975. Call-by-name, call-by-value and the λ-calculus. Theoret. Comput. Sci. 125-159.
    • (1975) Theoret. Comput. Sci. , pp. 125-159
    • Plotkin, G.D.1
  • 18
    • 0034545686 scopus 로고    scopus 로고
    • Static enforcement of security with types
    • SKALKA, C. AND SMITH, S. 2000. Static enforcement of security with types. ACM SIGPLAN Not. 35, 9, 34-15.
    • (2000) ACM SIGPLAN Not , vol.35 , Issue.9 , pp. 34-115
    • Skalka, C.1    Smith, S.2
  • 21
    • 0039334688 scopus 로고    scopus 로고
    • The security architecture formerly known as stack inspection: A security mechanism for language-based systems
    • WALLACH, D., FELTEN, E., AND APPEL, A. 2000. The security architecture formerly known as stack inspection: A security mechanism for language-based systems. ACM Trans. Softw. Eng. Methodol. 9, 4 (Oct.), 341-378.
    • (2000) ACM Trans. Softw. Eng. Methodol. , vol.9 , Issue.4 OCT. , pp. 341-378
    • Wallach, D.1    Felten, E.2    Appel, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.