Authenticated data structures, generically

A Miller, M Hicks, J Katz, E Shi - ACM SIGPLAN Notices, 2014 - dl.acm.org
An authenticated data structure (ADS) is a data structure whose operations can be carried
out by an untrusted prover, the results of which a verifier can efficiently check as authentic …

Computability in constructive type theory

Y Forster - 2021 - publikationen.sulb.uni-saarland.de
We give a formalised and machine-checked account of computability theory in the Calculus
of Inductive Constructions (CIC), the constructive type theory underlying the Coq proof …

Strong call-by-value is reasonable, implosively

B Accattoli, A Condoluci… - 2021 36th Annual ACM …, 2021 - ieeexplore.ieee.org
Whether the number of β-steps in the λ-calculus can be taken as a reasonable time cost
model (that is, polynomially related to the one of Turing machines) is a delicate problem …

Open call-by-value

B Accattoli, G Guerrieri - … Languages and Systems: 14th Asian Symposium …, 2016 - Springer
The elegant theory of the call-by-value lambda-calculus relies on weak evaluation and
closed terms, that are natural hypotheses in the study of programming languages. To model …

Weak call-by-value lambda calculus as a model of computation in Coq

Y Forster, G Smolka - International Conference on Interactive Theorem …, 2017 - Springer
We formalise a weak call-by-value λ-calculus we call L in the constructive type theory of Coq
and study it as a minimal functional programming language and as a model of computation …

A certifying extraction with time bounds from Coq to call-by-value -calculus

Y Forster, F Kunze - arXiv preprint arXiv:1904.11818, 2019 - arxiv.org
We provide a plugin extracting Coq functions of simple polymorphic types to the (untyped)
call-by-value $\lambda $-calculus L. The plugin is implemented in the MetaCoq framework …

A semantic measure of the execution time in linear logic

D De Carvalho, M Pagani, LT de Falco - Theoretical Computer Science, 2011 - Elsevier
We give a semantic account of the execution time (ie the number of cut elimination steps
leading to the normal form) of an untyped MELL net. We first prove that:(1) a net is head …

On the relative usefulness of fireballs

B Accattoli, CS Coen - … 30th Annual ACM/IEEE Symposium on …, 2015 - ieeexplore.ieee.org
In CSL-LICS 2014, Accattoli and Dal Lago [1] showed that there is an implementation of the
ordinary (ie strong, pure, call-by-name) λ-calculus into models like RAM machines which is …

On the invariance of the unitary cost model for head reduction

B Accattoli, U Dal Lago - 23rd International Conference on …, 2012 - drops.dagstuhl.de
The lambda-calculus is a widely accepted computational model of higher-order functional
programs, yet there is not any direct and universally accepted cost model for it. As a …

Space cost analysis using sized types

PB Vasconcelos - 2008 - research-repository.st-andrews.ac …
Programming resource-sensitive systems, such as real-time embedded systems, requires
guaranteeing both the functional correctness of computations and also that time and space …