Semantics of programming languages

Results: 156



#Item
21Control-Flow Analysis of Higher-Order Languages or Taming Lambda Olin Shivers May 1991

Control-Flow Analysis of Higher-Order Languages or Taming Lambda Olin Shivers May 1991

Add to Reading List

Source URL: www.ccs.neu.edu

Language: English - Date: 2010-06-22 12:57:54
22C Program Specialization Master’s Thesis (revised version) Lars Ole Andersen DIKU, Department of Computer Science,

C Program Specialization Master’s Thesis (revised version) Lars Ole Andersen DIKU, Department of Computer Science,

Add to Reading List

Source URL: repository.readscheme.org

Language: English - Date: 2010-10-22 08:05:06
23Dependent Types in Practical Programming Hongwei Xi December 6th, 1998 Department of Mathematical Sciences Carnegie Mellon University

Dependent Types in Practical Programming Hongwei Xi December 6th, 1998 Department of Mathematical Sciences Carnegie Mellon University

Add to Reading List

Source URL: www.cs.bu.edu

Language: English - Date: 1999-11-28 18:07:44
24Parametricity and Proving Free Theorems for Functional-Logic Languages Stefan Mehner ∗ Daniel Seidel†

Parametricity and Proving Free Theorems for Functional-Logic Languages Stefan Mehner ∗ Daniel Seidel†

Add to Reading List

Source URL: www.lix.polytechnique.fr

Language: English - Date: 2014-12-08 09:42:38
25Lightweight Semantics for Automating the Invocation of Web APIs Maria Maleshkova, Carlos Pedrinaci, Ning Li, Jacek Kopecky, John Domingue Knowledge Media Institute (KMi), The Open University {m.maleshkova, c.pedrinaci, n

Lightweight Semantics for Automating the Invocation of Web APIs Maria Maleshkova, Carlos Pedrinaci, Ning Li, Jacek Kopecky, John Domingue Knowledge Media Institute (KMi), The Open University {m.maleshkova, c.pedrinaci, n

Add to Reading List

Source URL: sweet.kmi.open.ac.uk

Language: English - Date: 2011-12-17 10:47:10
26Design and Evaluation of Gradual Typing for Python Michael M. Vitousek Andrew M. Kent Jeremy G. Siek Jim Baker Indiana University Bloomington

Design and Evaluation of Gradual Typing for Python Michael M. Vitousek Andrew M. Kent Jeremy G. Siek Jim Baker Indiana University Bloomington

Add to Reading List

Source URL: homes.soic.indiana.edu

Language: English - Date: 2015-04-23 14:36:54
27A Study in Higher-Order Programming Languages MS Thesis Morten Rhiger  Abstract: This thesis describes some interplays between the specification and the implementation of higher-order programming languages. We first inve

A Study in Higher-Order Programming Languages MS Thesis Morten Rhiger Abstract: This thesis describes some interplays between the specification and the implementation of higher-order programming languages. We first inve

Add to Reading List

Source URL: repository.readscheme.org

Language: English - Date: 2010-10-22 08:04:39
28A Graph-Based Semantics Workbench for Concurrent Asynchronous Programs Claudio Corrodi1,2? , Alexander Heußner3 , and Christopher M. Poskitt1,4? Department of Computer Science, ETH Zürich, Switzerland Software Composit

A Graph-Based Semantics Workbench for Concurrent Asynchronous Programs Claudio Corrodi1,2? , Alexander Heußner3 , and Christopher M. Poskitt1,4? Department of Computer Science, ETH Zürich, Switzerland Software Composit

Add to Reading List

Source URL: se.inf.ethz.ch

Language: English - Date: 2016-03-01 11:02:40
29Reprinted from Proceedings of the 2010 ACM Symposium on Principles of Programming Languages (POPL’10)  Automatically Generating Instruction Selectors Using Declarative Machine Descriptions Jo˜ao Dias

Reprinted from Proceedings of the 2010 ACM Symposium on Principles of Programming Languages (POPL’10) Automatically Generating Instruction Selectors Using Declarative Machine Descriptions Jo˜ao Dias

Add to Reading List

Source URL: www.cs.tufts.edu

Language: English - Date: 2010-03-12 16:07:46
30Programming Cryptographic Protocols? Joshua D. Guttman, Jonathan C. Herzog, John D. Ramsdell, and Brian T. Sniffen The MITRE Corporation  Abstract. Cryptographic protocols are useful for trust engineering in

Programming Cryptographic Protocols? Joshua D. Guttman, Jonathan C. Herzog, John D. Ramsdell, and Brian T. Sniffen The MITRE Corporation Abstract. Cryptographic protocols are useful for trust engineering in

Add to Reading List

Source URL: evenmere.org

Language: English - Date: 2008-06-23 12:11:50