-
2
-
-
70350447538
-
Implicit coercions in type theories
-
G. Barthe. Implicit coercions in type theories. In Proc. of Types workshop, 1996.
-
(1996)
Proc. of Types Workshop
-
-
Barthe, G.1
-
3
-
-
0026190144
-
Inheritance as implicit coercion
-
V. Breazu-Tannen, T. Coquand, C. Gunter, and A. Scedrov. Inheritance as implicit coercion. Information and Computation, 93:172-221, 1991.
-
(1991)
Information and Computation
, vol.93
, pp. 172-221
-
-
Breazu-Tannen, V.1
Coquand, T.2
Gunter, C.3
Scedrov, A.4
-
7
-
-
0028448324
-
Dynamic typing: Syntax and proof theory
-
F. Henglein. Dynamic typing: syntax and proof theory. Science of Computer Programming, 22:197-230, 1994.
-
(1994)
Science of Computer Programming
, vol.22
, pp. 197-230
-
-
Henglein, F.1
-
8
-
-
70350438155
-
Idioms are oblivious, arrows are meticulous, monads are promiscuous
-
S. Lindley, P. Wadler, and J. Yallop. Idioms are oblivious, arrows are meticulous, monads are promiscuous. In Proc. of MSFP, 2008.
-
(2008)
Proc. of MSFP
-
-
Lindley, S.1
Wadler, P.2
Yallop, J.3
-
9
-
-
48349117169
-
Coercions in a polymorphic type system
-
Z. Luo. Coercions in a polymorphic type system. Mathematical Structures in Computer Science, 18(4):729-751, 2008.
-
(2008)
Mathematical Structures in Computer Science
, vol.18
, Issue.4
, pp. 729-751
-
-
Luo, Z.1
-
10
-
-
0013449949
-
Coercive subtyping in type theory
-
Z. Luo. Coercive subtyping in type theory. In Proc. of CSL, 1996.
-
(1996)
Proc. of CSL
-
-
Luo, Z.1
-
12
-
-
70350462290
-
Coercions in hindley-milner systems
-
Z. Luo and R. Kießling. Coercions in Hindley-Milner systems. In Proc. of Types, 2004.
-
(2004)
Proc. of Types
-
-
Luo, Z.1
Kießling, R.2
-
13
-
-
14744304363
-
Transitivity in coercive subtyping
-
Z. Luo and Y. Luo. Transitivity in coercive subtyping. Information and Computation, 197(1-2):122-144, 2005.
-
(2005)
Information and Computation
, vol.197
, Issue.1-2
, pp. 122-144
-
-
Luo, Z.1
Luo, Y.2
-
15
-
-
0037251378
-
Language-based information-flow security
-
A. Sabelfeld and A. C. Myers. Language-based information-flow security. JSAC, 21(1):5-19, 2003.
-
(2003)
JSAC
, vol.21
, Issue.1
, pp. 5-19
-
-
Sabelfeld, A.1
Myers, A.C.2
-
16
-
-
0002441620
-
Typing algorithm in type theory with inheritance
-
A. Saïbi. Typing algorithm in type theory with inheritance. In Proc. of POPL, 1997.
-
(1997)
Proc. of POPL
-
-
Saïbi, A.1
-
18
-
-
70350433842
-
Exploring the design space of higherorder casts
-
J. G. Siek, R. Garcia, and W. Taha. Exploring the design space of higherorder casts. In Proc. of ESOP, 2009.
-
(2009)
Proc. of ESOP
-
-
Siek, J.G.1
Garcia, R.2
Taha, W.3
-
19
-
-
34547938351
-
Mutatis mutandis: Safe and flexible dynamic software updating
-
G. Stoyle, M. Hicks, G. Bierman, P. Sewell, and I. Neamtiu. Mutatis Mutandis: Safe and flexible dynamic software updating. ACM TOPLAS, 29(4), 2007.
-
(2007)
ACM TOPLAS
, vol.29
, Issue.4
-
-
Stoyle, G.1
Hicks, M.2
Bierman, G.3
Sewell, P.4
Neamtiu, I.5
|