Abstract. The three problems of the title — the first two widely discussed in the literature, the third less well known but just as important for further de-velopment of object technology — are: • Eradicating the risk of void calls: x.f with, at run time, the target x not denoting any object, leading to an exception and usually a crash. • Eradicating the risk of “catcalls”: erroneous run-time situations, almost inevitably leading to crashes, resulting from the use of covariant argument typing. • Providing a simple way, in concurrent object-oriented programming, to lock an object handled by a remote processor or thread of control, or to access it without locking it, as needed by the context and in a safe way. A language mechanism provides a ...
Generic object-oriented programming languages combine parametric polymorphism and nominal subtype po...
Although mainstream object-oriented languages, like Java, are currently able to detect and prevent m...
Confinement is used to prohibit safety-critical objects from unintended access. Approaches for speci...
. This paper investigates an approach for statically preventing race conditions in an object-oriente...
Starting with a pragmatical (but formal) definition of type in object-oriented languages, this paper...
Tese de mestrado, Engenharia Informática (Engenharia de Software), Universidade de Lisboa, Faculdade...
Concurrent objects can offer services non-uniformly, according to synchronisation constraints, that ...
There is often a sort of a protocol associated to each class, stating when and how certain methods s...
International audienceGuaranteeing that the parties of a network application respect a given protoco...
The present paper introduces an implicitly typed object calculus intended to capture intrinsic aspec...
Being a successful technique in software practice, Object Orientation (OO) is a hot topic in academi...
Sharing and transfer of references is difficult to control in object-oriented languages. As informat...
Abstract. Type systems for programming languages help reasoning about program behavior and early fin...
AbstractThere are many mechanisms for concurrency control in high-level programming languages. In Ja...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
Generic object-oriented programming languages combine parametric polymorphism and nominal subtype po...
Although mainstream object-oriented languages, like Java, are currently able to detect and prevent m...
Confinement is used to prohibit safety-critical objects from unintended access. Approaches for speci...
. This paper investigates an approach for statically preventing race conditions in an object-oriente...
Starting with a pragmatical (but formal) definition of type in object-oriented languages, this paper...
Tese de mestrado, Engenharia Informática (Engenharia de Software), Universidade de Lisboa, Faculdade...
Concurrent objects can offer services non-uniformly, according to synchronisation constraints, that ...
There is often a sort of a protocol associated to each class, stating when and how certain methods s...
International audienceGuaranteeing that the parties of a network application respect a given protoco...
The present paper introduces an implicitly typed object calculus intended to capture intrinsic aspec...
Being a successful technique in software practice, Object Orientation (OO) is a hot topic in academi...
Sharing and transfer of references is difficult to control in object-oriented languages. As informat...
Abstract. Type systems for programming languages help reasoning about program behavior and early fin...
AbstractThere are many mechanisms for concurrency control in high-level programming languages. In Ja...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
Generic object-oriented programming languages combine parametric polymorphism and nominal subtype po...
Although mainstream object-oriented languages, like Java, are currently able to detect and prevent m...
Confinement is used to prohibit safety-critical objects from unintended access. Approaches for speci...