Obsidian: Typestate and assets for safer blockchain programming
Blockchain platforms are coming into use for processing critical transactions among
participants who have not established mutual trust. Many blockchains are programmable …
participants who have not established mutual trust. Many blockchains are programmable …
The design and formalization of Mezzo, a permission-based programming language
T Balabonski, F Pottier, J Protzenko - ACM Transactions on …, 2016 - dl.acm.org
The programming language Mezzo is equipped with a rich type system that controls aliasing
and access to mutable memory. We give a comprehensive tutorial overview of the language …
and access to mutable memory. We give a comprehensive tutorial overview of the language …
User-Centered Design of Principled Programming Languages
MJ Coblenz - 2020 - search.proquest.com
Programming languages exist to enable people to create and maintain software as
effectively as possible. They are subject to two very different sets of requirements: first, the …
effectively as possible. They are subject to two very different sets of requirements: first, the …
Rely-Guarantee Protocols for Safe Interference over Shared Memory
FDO Militão - 2015 - search.proquest.com
Mutable state can be useful in certain algorithms, to structure programs, or for efficiency
purposes. However, when shared mutable state is used in non-local or nonobvious ways …
purposes. However, when shared mutable state is used in non-local or nonobvious ways …
[PDF][PDF] Obsidian: A Safer Blockchain Programming
M Coblenz - src.acm.org
Blockchain platforms, such as Ethereum, promise to facilitate transactions on a
decentralized computing platform among parties that have not established trust. Recognition …
decentralized computing platform among parties that have not established trust. Recognition …
[PDF][PDF] Managing the Object Soup in Ambient-Oriented Applications
N De Cooman - 2012 - nickdecooman.com
The developmentof distributedmobile applicationshas significantly differentrequirements
than traditional distributed applications. The fast changing network topology of a mobile …
than traditional distributed applications. The fast changing network topology of a mobile …
[PDF][PDF] Vérification de programmes avec pointeurs à l'aide de régions et de permissions Verification of Pointer Programs Using Regions and Permissions
MMP Müller - 2011 - Citeseer
Software is invading your everyday life. Your cellphone for instance, or smartphone, grants
you access to many applications which are not so phone-related. Those applications are …
you access to many applications which are not so phone-related. Those applications are …