Delimited dynamic binding

O Kiselyov, C Shan, A Sabry - ACM SIGPLAN Notices, 2006 - dl.acm.org
Dynamic binding and delimited control are useful together in many settings, including Web
applications, database cursors, and mobile code. We examine this pair of language features …

A functional correspondence between monadic evaluators and abstract machines for languages with computational effects

MS Ager, O Danvy, J Midtgaard - Theoretical Computer Science, 2005 - Elsevier
We extend our correspondence between evaluators and abstract machines from the pure
setting of the λ-calculus to the impure setting of the computational λ-calculus. We show how …

Fine-grained interoperability through mirrors and contracts

KE Gray, RB Findler, M Flatt - ACM SIGPLAN Notices, 2005 - dl.acm.org
As a value flows across the boundary between interoperating languages, it must be checked
and converted to fit the types and representations of the target language. For simple forms of …

Semantics and scoping of aspects in higher-order languages

C Dutchyn, DB Tucker, S Krishnamurthi - Science of computer …, 2006 - Elsevier
Aspect-oriented software design will need to support languages with first-class and higher-
order procedures, such as Ruby, Perl, ML and Scheme. These language features present …

[PDF][PDF] On evaluation contexts, continuations, and the rest of the computation

O Danvy - Proceedings of the Fourth ACM SIGPLAN Workshop on …, 2004 - ropas.snu.ac.kr
Continuations are variously understood as representations of the current evaluation context
and as representations of the rest of the computation, but these understandings contradict …

A systematic approach to static access control

F Pottier, C Skalka, S Smith - … and Systems: 10th European Symposium on …, 2001 - Springer
Abstract The Java JDK 1.2 Security Architecture includes a dynamic mechanism for
enforcing access control checks, so-called stack inspection. This paper studies type systems …

A systematic approach to static access control

F Pottier, C Skalka, S Smith - ACM Transactions on Programming …, 2005 - dl.acm.org
The Java Security Architecture includes a dynamic mechanism for enforcing access control
checks, the so-called stack inspection process. While the architecture has several appealing …

Improving the lazy Krivine machine

DP Friedman, A Ghuloum, JG Siek… - Higher-Order and …, 2007 - Springer
Krivine presents the K machine, which produces weak head normal form results. Sestoft
introduces several call-by-need variants of the K machine that implement result sharing via …

From stack inspection to access control: A security analysis for libraries

F Besson, T Blanc, C Fournet… - Proceedings. 17th IEEE …, 2004 - ieeexplore.ieee.org
We present a new static analysis for reviewing the security of libraries for systems, such as
JVMs or the CLR, that rely on stack inspection for access control. We describe its …

[PDF][PDF] Portable and high-level access to the stack with Continuation Marks

J Clements - 2006 - Citeseer
My dissertation presents and defends the thesis that lightweight stack inspection improves
the implementation of intensional programming tools and programming language …