We present the type theory LTT, intended to form a basis for typed target languages, providing an internal notion of logical proposition and proof. The inclusion of explicit proofs allows the type system to guarantee properties that would otherwise be incompatible with decidable type checking. LTT also provides linear facilities for tracking ephemeral properties that hold only for certain program states. Our type theory allows for re-use of typechecking software by casting a variety of type systems within a single language. We illustrate our methodology of representation by means of two examples, one functional and one stateful, and describe the associated operational semantics and proofs of type safety
Dependent type theories have a long history of being used for theorem proving. One aspect of type th...
International audienceDependent Type Theory as implemented into proof assistants and programming lan...
We present the design and implementation of a typechecker for verifying security properties of the s...
We present the type theory LTT, intended to form a basis for typed target languages, providing an in...
AbstractRecent developments in the area of expressive types have the prospect to supply the ordinary...
The significance of type theory to the theory of programming languages has long been recognized. Ad...
AbstractWe show that a large class of data-flow analyses for imperative languages are describable as...
Certifying compilers generate proofs for low-level code that guarantee safety properties of the code...
AbstractA theory for a type system for logic programs is developed which addressesthe question of we...
Software systems are ubiquitous. Failure in safety- and security-critical systems, e.g., the control...
There exists an identifiable programming style based on the widespread use of type information handl...
A certified binary is a value together with a proof that the value satisfies a given specification. ...
The programming logic PL/CV3 is based on the notion of a mathematical type. We present the core of ...
Formal verification of real-world software systems remains challenging for a number of reasons, incl...
Programs are interpreted as types in a constructive type theory. Rules for a logic of programs can ...
Dependent type theories have a long history of being used for theorem proving. One aspect of type th...
International audienceDependent Type Theory as implemented into proof assistants and programming lan...
We present the design and implementation of a typechecker for verifying security properties of the s...
We present the type theory LTT, intended to form a basis for typed target languages, providing an in...
AbstractRecent developments in the area of expressive types have the prospect to supply the ordinary...
The significance of type theory to the theory of programming languages has long been recognized. Ad...
AbstractWe show that a large class of data-flow analyses for imperative languages are describable as...
Certifying compilers generate proofs for low-level code that guarantee safety properties of the code...
AbstractA theory for a type system for logic programs is developed which addressesthe question of we...
Software systems are ubiquitous. Failure in safety- and security-critical systems, e.g., the control...
There exists an identifiable programming style based on the widespread use of type information handl...
A certified binary is a value together with a proof that the value satisfies a given specification. ...
The programming logic PL/CV3 is based on the notion of a mathematical type. We present the core of ...
Formal verification of real-world software systems remains challenging for a number of reasons, incl...
Programs are interpreted as types in a constructive type theory. Rules for a logic of programs can ...
Dependent type theories have a long history of being used for theorem proving. One aspect of type th...
International audienceDependent Type Theory as implemented into proof assistants and programming lan...
We present the design and implementation of a typechecker for verifying security properties of the s...