Abstract. We propose a type system to analyze the time consumed by multi-threaded imperative programs with a shared global memory, which delineates a class of safe multi-threaded programs. We demon-strate that a safe multi-threaded program runs in polynomial time if (i) it is strongly terminating wrt a non-deterministic scheduling policy or (ii) it terminates wrt a deterministic and quiet scheduling policy. As a consequence, we also characterize the set of polynomial time functions. The type system presented is based on the fundamental notion of data tiering, which is central in implicit computational complexity. It regu-lates the information flow in a computation. This aspect is interesting in that the type system bears a resemblance to ty...
This paper examines the role of dependence analysis in defining bindingtime analyses (BTAs) for impe...
AbstractA key problem in implicit computational complexity is to analyse the impact on program run t...
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using...
We propose a type system to analyze the time consumed by multi-threaded imperative programs with a s...
International audienceWe propose a type system for an imperative programming language, which certifi...
International audienceWe introduce a type system for concurrent programs described as a parallel imp...
This paper studies the security of multi-threaded programs. We combine two methods, i.e., qualitativ...
International audienceType systems as a technique to analyse or control programshave been extensivel...
Controlling the resource consumption of programs is crucial: besides performance reasons, it has man...
AbstractTwo restricted imperative programming languages are considered: One is a slight modification...
none4siWe study the problem of automatically computing the time complexity of concurrent object-orie...
International audienceA type system is introduced for a generic Object Oriented programming language...
There has been much recent interest in supporting deterministic parallelism in imperative programs. ...
Das et al. develop a method for analyzing the time complexity of concurrent, message-passing algorit...
International audienceWe address the problem of analysing the complexity of concurrent programs writ...
This paper examines the role of dependence analysis in defining bindingtime analyses (BTAs) for impe...
AbstractA key problem in implicit computational complexity is to analyse the impact on program run t...
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using...
We propose a type system to analyze the time consumed by multi-threaded imperative programs with a s...
International audienceWe propose a type system for an imperative programming language, which certifi...
International audienceWe introduce a type system for concurrent programs described as a parallel imp...
This paper studies the security of multi-threaded programs. We combine two methods, i.e., qualitativ...
International audienceType systems as a technique to analyse or control programshave been extensivel...
Controlling the resource consumption of programs is crucial: besides performance reasons, it has man...
AbstractTwo restricted imperative programming languages are considered: One is a slight modification...
none4siWe study the problem of automatically computing the time complexity of concurrent object-orie...
International audienceA type system is introduced for a generic Object Oriented programming language...
There has been much recent interest in supporting deterministic parallelism in imperative programs. ...
Das et al. develop a method for analyzing the time complexity of concurrent, message-passing algorit...
International audienceWe address the problem of analysing the complexity of concurrent programs writ...
This paper examines the role of dependence analysis in defining bindingtime analyses (BTAs) for impe...
AbstractA key problem in implicit computational complexity is to analyse the impact on program run t...
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using...