Zobrazeno 1 - 10
of 85
pro vyhledávání: '"Giunti, Marco"'
Autor:
Paulino, Hervé, Matos, Ana Almeida, Cederquist, Jan, Giunti, Marco, Matos, João, Ravara, António
Data-Centric Concurrency Control (DCCC) shifts the reasoning about concurrency restrictions from control structures to data declaration. It is a high-level declarative approach that abstracts away from the actual concurrency control mechanism(s) in u
Externí odkaz:
http://arxiv.org/abs/2309.05483
Autor:
Giunti, Marco1 (AUTHOR) giunti@unica.it, Garavaglia, Fabrizia Giulia1 (AUTHOR), Giuntini, Roberto1 (AUTHOR), Sergioli, Giuseppe1 (AUTHOR), Pinna, Simone1 (AUTHOR)
Publikováno v:
PLoS ONE. 10/23/2024, Vol. 19 Issue 10, p1-31. 31p.
Distributed applications often deal with data with different consistency requirements: while a post in a social network only requires weak consistency, the user balance in turn has strong correctness requirements, demanding mutations to be synchronis
Externí odkaz:
http://arxiv.org/abs/2212.14651
Typestates are a notion of behavioral types that describe protocols for stateful objects, specifying the available methods for each state, in terms of a state machine. Usually, objects with protocol are either forced to be used in a linear way, which
Externí odkaz:
http://arxiv.org/abs/2209.05136
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
EPTCS 188, 2015, pp. 23-32
We study the problem of disentangling locked processes via code refactoring. We identify and characterise a class of processes that is not lock-free; then we formalise an algorithm that statically detects potential locks and propose refactoring proce
Externí odkaz:
http://arxiv.org/abs/1508.03901
Autor:
Giunti, Marco1 (AUTHOR) giunti@unica.it
Publikováno v:
Foundations of Science. Mar2023, Vol. 28 Issue 1, p327-375. 49p.
Publikováno v:
EPTCS 89, 2012, pp. 65-79
In this paper, we enrich the pi-calculus with an operator for confidentiality (hide), whose main effect is to restrict the access to the object of the communication, thus representing confidentiality in a natural way. The hide operator is meant for l
Externí odkaz:
http://arxiv.org/abs/1208.2749
Autor:
Giunti, Marco
Publikováno v:
EPTCS 61, 2011, pp. 96-114
We present a type checking algorithm for establishing a session-based discipline in the pi calculus of Milner, Parrow and Walker. Our session types are qualified as linear or unrestricted. Linearly typed communication channels are guaranteed to occur
Externí odkaz:
http://arxiv.org/abs/1108.2360