A functional correspondence between monadic evaluators and abstract machines for languages with computational effects
We extend our correspondence between evaluators and abstract machines from the pure
setting of the λ-calculus to the impure setting of the computational λ-calculus. We show how …
setting of the λ-calculus to the impure setting of the computational λ-calculus. We show how …
Fine-grained interoperability through mirrors and contracts
As a value flows across the boundary between interoperating languages, it must be checked
and converted to fit the types and representations of the target language. For simple forms of …
and converted to fit the types and representations of the target language. For simple forms of …
Semantics and scoping of aspects in higher-order languages
C Dutchyn, DB Tucker, S Krishnamurthi - Science of computer …, 2006 - Elsevier
Aspect-oriented software design will need to support languages with first-class and higher-
order procedures, such as Ruby, Perl, ML and Scheme. These language features present …
order procedures, such as Ruby, Perl, ML and Scheme. These language features present …
[PDF][PDF] On evaluation contexts, continuations, and the rest of the computation
O Danvy - Proceedings of the Fourth ACM SIGPLAN Workshop on …, 2004 - ropas.snu.ac.kr
Continuations are variously understood as representations of the current evaluation context
and as representations of the rest of the computation, but these understandings contradict …
and as representations of the rest of the computation, but these understandings contradict …
A systematic approach to static access control
Abstract The Java JDK 1.2 Security Architecture includes a dynamic mechanism for
enforcing access control checks, so-called stack inspection. This paper studies type systems …
enforcing access control checks, so-called stack inspection. This paper studies type systems …
A systematic approach to static access control
The Java Security Architecture includes a dynamic mechanism for enforcing access control
checks, the so-called stack inspection process. While the architecture has several appealing …
checks, the so-called stack inspection process. While the architecture has several appealing …
Improving the lazy Krivine machine
Krivine presents the K machine, which produces weak head normal form results. Sestoft
introduces several call-by-need variants of the K machine that implement result sharing via …
introduces several call-by-need variants of the K machine that implement result sharing via …
From stack inspection to access control: A security analysis for libraries
We present a new static analysis for reviewing the security of libraries for systems, such as
JVMs or the CLR, that rely on stack inspection for access control. We describe its …
JVMs or the CLR, that rely on stack inspection for access control. We describe its …
[PDF][PDF] Portable and high-level access to the stack with Continuation Marks
J Clements - 2006 - Citeseer
My dissertation presents and defends the thesis that lightweight stack inspection improves
the implementation of intensional programming tools and programming language …
the implementation of intensional programming tools and programming language …