Abstract. Affine type systems manage resources by preventing some values from being used more than once. This offers expressiveness and performance benefits, but difficulty arises in interacting with components written in a conventional language whose type system provides no way to maintain the affine type system’s aliasing invariants. We propose and implement a technique that uses behavioral contracts to mediate between code written in an affine language and code in a conventional typed language. We formalize our approach via a typed calculus with both affine-typed and conventionally-typed modules. We show how to preserve the guarantees of both type systems despite both languages being able to call into each other and exchange higher-order...
A definitional interpreter is an interpreter which uses the semantics of its own host language to de...
Dependent Interoperability In this paper we study the problem of interoperability – combining constr...
Refinement type systems have proved very effective for security policy verification in distributed a...
Affine type systems manage resources by preventing some values from being used more than once. This ...
We describe a type system for a synchronous π-calculus formalising the notion of affine usage in sig...
We adapt the aliasing constraints approach for designing a flexible typing of evolving objects. Type...
Abstract. A robust software component fulfills a contract: it expects data satisfying a certain prop...
Abstract. We use a denotational semantics to show that every term in SPCF (a typed functional langua...
Even in statically typed languages it is useful to have certain invariants checked dynamically. Find...
Recent research has shown that it is possible to leverage general-purpose theorem-proving techniques...
Recent research has shown that it is possible to leverage general-purpose theorem proving techniques...
This paper contains an examination of the typings associated with the construction of persistent sys...
Abstract. This paper addresses the problem of abstracting a set of affine transformers v' = v C + d,...
Chapter 5, on "A Module Language for Typing SIGNAL Programs by Contracts", brings up the polychronou...
International audienceWe investigate the computational power of affine automata (AfAs) introduced in...
A definitional interpreter is an interpreter which uses the semantics of its own host language to de...
Dependent Interoperability In this paper we study the problem of interoperability – combining constr...
Refinement type systems have proved very effective for security policy verification in distributed a...
Affine type systems manage resources by preventing some values from being used more than once. This ...
We describe a type system for a synchronous π-calculus formalising the notion of affine usage in sig...
We adapt the aliasing constraints approach for designing a flexible typing of evolving objects. Type...
Abstract. A robust software component fulfills a contract: it expects data satisfying a certain prop...
Abstract. We use a denotational semantics to show that every term in SPCF (a typed functional langua...
Even in statically typed languages it is useful to have certain invariants checked dynamically. Find...
Recent research has shown that it is possible to leverage general-purpose theorem-proving techniques...
Recent research has shown that it is possible to leverage general-purpose theorem proving techniques...
This paper contains an examination of the typings associated with the construction of persistent sys...
Abstract. This paper addresses the problem of abstracting a set of affine transformers v' = v C + d,...
Chapter 5, on "A Module Language for Typing SIGNAL Programs by Contracts", brings up the polychronou...
International audienceWe investigate the computational power of affine automata (AfAs) introduced in...
A definitional interpreter is an interpreter which uses the semantics of its own host language to de...
Dependent Interoperability In this paper we study the problem of interoperability – combining constr...
Refinement type systems have proved very effective for security policy verification in distributed a...