• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 88
Next 10 →

Analyses that Distinguish Different Evaluation Orders or Unsoundness Results in Control-Flow Analysis

by Mitchell Wand , 2002
"... The standard control-flow analysis for higher-order languages, 0CFA, as defined by Sestoft, Shivers, Palsberg, et al., has been shown correct for a variety of semantics. One view of this family of results is that it shows that 0CFA is insensitive to evaluation order. We present simple modificatio ..."
Abstract - Add to MetaCart
The standard control-flow analysis for higher-order languages, 0CFA, as defined by Sestoft, Shivers, Palsberg, et al., has been shown correct for a variety of semantics. One view of this family of results is that it shows that 0CFA is insensitive to evaluation order. We present simple

Semantic Derivation Verification

by Geoff Sutcliffe , Diego Belfiore - International Journal on Artificial Intelligence Tools
"... Abstract Automated Theorem Proving (ATP) systems are complex pieces of software, and thus may have bugs that make them unsound. In order to guard against such unsoundness, the derivations output by an ATP system may be semantically verified by a trusted system that checks the required semantic prop ..."
Abstract - Cited by 15 (10 self) - Add to MetaCart
Abstract Automated Theorem Proving (ATP) systems are complex pieces of software, and thus may have bugs that make them unsound. In order to guard against such unsoundness, the derivations output by an ATP system may be semantically verified by a trusted system that checks the required semantic

Dynamic vs. static flow-sensitive security analysis

by Alejandro Russo, Andrei Sabelfeld , 2010
"... This paper seeks to answer fundamental questions about trade-offs between static and dynamic security analysis. It has been previously shown that flow-sensitive static information-flow analysis is a natural generalization of flowinsensitive static analysis, which allows accepting more secure program ..."
Abstract - Cited by 63 (14 self) - Add to MetaCart
impossibility of a sound purely dynamic information-flow monitor that accepts programs certified by a classical flow-sensitive static analysis. A side implication is impossibility of permissive dynamic instrumented security semantics for information flow, which guides us to uncover an unsound semantics from

Typing First-Class Continuations in ML

by Robert Harper, Bruce F. Duba, David Macqueen , 1992
"... An extension of ML with continuation primitives similar to those found in Scheme is considered. A number of alternative type systems are discussed, and several programming examples are given. A continuation-based operational semantics is defined for a small, purely functional, language, and the soun ..."
Abstract - Cited by 101 (14 self) - Add to MetaCart
, and the soundness of the Damas-Milner polymorphic type assignment system with respect to this semantics is proved. The full Damas-Milner type system is shown to be unsound in the presence of first-class continuations. Restrictions on polymorphism similar to those introduced in connection with reference types

Semantics, types and effects for XML updates

by Michael Benedikt, James Cheney - In DBPL , 2009
"... Abstract. The W3C recently released the XQuery Update Facility 1.0, a Candidate Recommendation for an XML update language. It appears likely that this proposal will become standard. XQuery has been equipped with a formal semantics and sound type system, but there has been little work on static analy ..."
Abstract - Cited by 17 (4 self) - Add to MetaCart
Abstract. The W3C recently released the XQuery Update Facility 1.0, a Candidate Recommendation for an XML update language. It appears likely that this proposal will become standard. XQuery has been equipped with a formal semantics and sound type system, but there has been little work on static

An Operational Semantics for Network Datalog

by Vivek Nigam, Limin Jia, Anduo Wang, Boon Thau Loo, Andre Scedrov , 2010
"... Network Datalog (NDlog) is a recursive query language that extends Datalog by allowing programs to be distributed in a network. In our initial efforts to formally specify NDlog’s operational semantics, we have found several problems with the current evaluation algorithm used, including unsound resul ..."
Abstract - Cited by 2 (2 self) - Add to MetaCart
Network Datalog (NDlog) is a recursive query language that extends Datalog by allowing programs to be distributed in a network. In our initial efforts to formally specify NDlog’s operational semantics, we have found several problems with the current evaluation algorithm used, including unsound

Modular and Certified Semantic Labeling and Unlabeling

by Christian Sternagel, René Thiemann
"... Semantic labeling is a powerful transformation technique to prove termination of term rewrite systems. The dual technique is unlabeling. For unlabeling it is essential to drop the so called decreasing rules which sometimes have to be added when applying semantic labeling. We indicate two problems co ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Semantic labeling is a powerful transformation technique to prove termination of term rewrite systems. The dual technique is unlabeling. For unlabeling it is essential to drop the so called decreasing rules which sometimes have to be added when applying semantic labeling. We indicate two problems

Polymorphic subtyping for effect analysis: The static semantics

by Hanne Riis Nielson, Flemming Nielson, Torben Amtoft - Proceedings of the Fifth LOMAPS Workshop, number 1192 in Lecture Notes in Computer Science , 1997
"... Abstract. The integration of polymorphism (in the style of the ML let-construct), subtyping, and effects (modelling assignment or communication) into one common type system has proved remarkably difficult. One line of research has succeeded in integrating polymorphism and subtyping; adding effects i ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
in a straightforward way results in a semantically unsound system. Another line of research has succeeded in integrating polymorphism, effects, and subeffecting; adding subtyping in a straightforward way invalidates the construction of the inference algorithm. This paper integrates all of polymorphism

A Bottom-up Semantics for Constructive Negation

by Annalisa Bossi, Massimo Fabris, Meo, Maria Chiara Meo , 1994
"... The constructive negation rule has been introduced by Chan [5, 6] to overcome the main drawbacks of the negation-as-failure rule: the unsoundness of floundering programs and, consequently, the inability of providing answers for non-ground negative queries. In this paper we define a bottom-up semanti ..."
Abstract - Cited by 6 (0 self) - Add to MetaCart
The constructive negation rule has been introduced by Chan [5, 6] to overcome the main drawbacks of the negation-as-failure rule: the unsoundness of floundering programs and, consequently, the inability of providing answers for non-ground negative queries. In this paper we define a bottom

Equational Reasoning about Programs with General Recursion and Call-by-value Semantics

by Garrin Kimmell, Aaron Stump, Harley D. Eades Iii, Peng Fu, Tim Sheard, Stephanie Weirich, Chris Casinghino, Vilhelm Sjöberg, Nathan Collins, Ki Yung Ahn
"... Dependently typed programming languages provide a mechanism for integrating verification and programming by encoding invariants as types. Traditionally, dependently typed languages have been based on constructive type theories, where the connection between proofs and programs is based on the Curry-H ..."
Abstract - Cited by 6 (3 self) - Add to MetaCart
-Howard correspondence. This connection comes at a price, however, as it is necessary for the languages to be normalizing to preserve logical soundness. Trellys is a call-by-value dependently typed programming language currently in development that is designed to integrate a type theory with unsound programming features
Next 10 →
Results 1 - 10 of 88
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University