Alias types

F Smith, D Walker, G Morrisett - European Symposium on Programming, 2000 - Springer
Linear type systems allow destructive operations such as object deallocation and imperative
updates of functional data structures. These operations and others, such as the ability to …

Ownership, encapsulation and the disjointness of type and effect

D Clarke, S Drossopoulou - Proceedings of the 17th ACM SIGPLAN …, 2002 - dl.acm.org
Ownership types provide a statically enforceable notion of object-level encapsulation. We
extend ownership types with computational effects to support reasoning about object …

Resource bound certification

K Crary, S Weirich - Proceedings of the 27th ACM SIGPLAN-SIGACT …, 2000 - dl.acm.org
Various code certification systems allow the certification and static verification of important
safety properties such as memory and control-flow safety. These systems are valuable tools …

Alias annotations for program understanding

J Aldrich, V Kostadinov, C Chambers - ACM SIGPLAN Notices, 2002 - dl.acm.org
One of the primary challenges in building and evolving large object-oriented systems is
understanding aliasing between objects. Unexpected aliasing can lead to broken invariants …

[图书][B] Semantics of types for mutable state

AJ Ahmed - 2004 - search.proquest.com
Proof-carrying code (PCC) is a framework for mechanically verifying the safety of machine
language programs. A program that is successfully verified by a PCC system is guaranteed …

Attack-resistant trust metrics

R Levien - Computing with Social Trust, 2009 - Springer
The Internet is an amazingly powerful tool for connecting people together, unmatched in
human history. Yet, with that power comes great potential for spam and abuse. Trust metrics …

Capabilities for sharing: A generalisation of uniqueness and read-only

J Boyland, J Noble, W Retert - European Conference on Object-Oriented …, 2001 - Springer
Many languages and language extensions include annotations on pointer variables suchas
“read-only,”“unique,” and “borrowed”; many more annotations have been proposed but not …

[PDF][PDF] TALx86: A realistic typed assembly language

K Crary, N Glew, D Grossman… - … Support for System …, 1999 - research.cs.cornell.edu
The goal of typed assembly language (TAL) is to provide a low-level, statically typed target
language that is better suited than Java bytecodes for supporting a wide variety of source …

Purity and side effect analysis for Java programs

A Sălcianu, M Rinard - … , Model Checking, and Abstract Interpretation: 6th …, 2005 - Springer
We present a new purity and side effect analysis for Java programs. A method is pure if it
does not mutate any location that exists in the program state right before the invocation of …

A practical flow-sensitive and context-sensitive C and C++ memory leak detector

DL Heine, MS Lam - Proceedings of the ACM SIGPLAN 2003 …, 2003 - dl.acm.org
This paper presents a static analysis tool that can automatically find memory leaks and
deletions of dangling pointers in large C and C++ applications. We have developed a type …