Zobrazeno 1 - 4
of 4
pro vyhledávání: '"Hannes Saffrich"'
Autor:
Hannes Saffrich, Peter Thiemann
Publikováno v:
Logical Methods in Computer Science, Vol Volume 18, Issue 3 (2022)
Imperative session types provide an imperative interface to session-typed communication. In such an interface, channel references are first-class objects with operations that change the typestate of the channel. Compared to functional session type AP
Externí odkaz:
https://doaj.org/article/5922d027f1484764b265df41ee52634c
Autor:
Peter Thiemann, Hannes Saffrich
Publikováno v:
Lecture Notes in Computer Science
23th International Conference on Coordination Languages and Models (COORDINATION)
23th International Conference on Coordination Languages and Models (COORDINATION), Jun 2021, Valletta, Malta. pp.61-79, ⟨10.1007/978-3-030-78142-2_4⟩
Lecture Notes in Computer Science ISBN: 9783030781415
COORDINATION
23th International Conference on Coordination Languages and Models (COORDINATION)
23th International Conference on Coordination Languages and Models (COORDINATION), Jun 2021, Valletta, Malta. pp.61-79, ⟨10.1007/978-3-030-78142-2_4⟩
Lecture Notes in Computer Science ISBN: 9783030781415
COORDINATION
Imperative session types provide an imperative interface to session-typed communication. In such an interface, channel references are first-class objects with operations that change the typestate of the channel. Compared to functional session type AP
Publikováno v:
Proceedings of the ACM on Programming Languages
Proceedings of the ACM on Programming Languages, ACM, 2020, 4 (ICFP), pp.1-29. ⟨10.1145/3408985⟩
Proceedings of the ACM on Programming Languages, 2020, 4 (ICFP), pp.1-29. ⟨10.1145/3408985⟩
Proceedings of the ACM on Programming Languages, ACM, 2020, 4 (ICFP), pp.1-29. ⟨10.1145/3408985⟩
Proceedings of the ACM on Programming Languages, 2020, 4 (ICFP), pp.1-29. ⟨10.1145/3408985⟩
Systems programming often requires the manipulation of resources like file handles, network connections, or dynamically allocated memory. Programmers need to follow certain protocols to handle these resources correctly. Violating these protocols caus
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::501cbff07a3dd60a05a72c3a4e6aca88
https://hal.archives-ouvertes.fr/hal-02938020/document
https://hal.archives-ouvertes.fr/hal-02938020/document
Publikováno v:
Theoretical Aspects of Computing – ICTAC 2014 ISBN: 9783319108810
ICTAC
ICTAC
A side-effect analysis computes for each program phrase a set of memory locations that may be read or written to when executing this phrase. Our analysis expresses abstract objects, points-to and aliasing information, escape information, and side eff
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::402654b8b499c0b0f74baf8f30d837ac
https://doi.org/10.1007/978-3-319-10882-7_12
https://doi.org/10.1007/978-3-319-10882-7_12