Filters








35 Hits in 4.5 sec

A Linear Decomposition of Multiparty Sessions for Safe Distributed Programming *

Alceste Scalas, Ornela Dardha, Raymond Hu, Nobuko Yoshida
unpublished
for safe multiparty programming in Scala.  ...  Crucially, it keeps the distributed choreographic nature of MPST, illuminating that the safety properties of multiparty sessions can be precisely represented with a decomposition into binary linear channels  ...  Type-safe, distributed multiparty delegation.  ... 
fatcat:23z3aik72vhy5jcyjhpejzs56a

A Linear Decomposi-tion of Multiparty Sessions for Safe Distributed Programming

Related Article Alceste, Ornela Scalas, Raymond Dardha, Nobuko Hu, Yoshida
2017 Proceedings of the 31st European Conference on Object-Oriented Programming   unpublished
This includes distributed multiparty session delegation: this artifact implements it for the first time.  ...  internals on top of the existing lchannels library for type-safe binary session programming.  ...  The authors wish to thank Sung-Shik Jongmans, Rumyana Neykova, Nicholas Ng, and Bernardo Toninho for testing the artifact, and the anonymous artifact reviewers for their comments and suggestions.  ... 
fatcat:4uk5hvozuzdpnlkffm6qpsaqfu

Runtime Verification for Decentralised and Distributed Systems [chapter]

Adrian Francalanza, Jorge A. Pérez, César Sánchez
2018 Lecture Notes in Computer Science  
We report solutions that study how to monitor system with some distributed characteristic, solutions that use a distributed platform for performing a monitoring task, and foundational works that present  ...  semantics for decomposing monitors or expressing specifications amenable for distributed systems.  ...  We are grateful to the anonymous reviewers for their useful remarks and suggestions, which led to significant improvements. Financial Acknowledgements.  ... 
doi:10.1007/978-3-319-75632-5_6 fatcat:4xyydx5wibgdfibxrdthgcwgiu

Discourje: Runtime Verification of Communication Protocols in Clojure [chapter]

Ruben Hamers, Sung-Shik Jongmans
2020 Lecture Notes in Computer Science  
Discourje guarantees safety of protocol implementations relative to specifications, based on an expressive new version of multiparty session types.  ...  Benchmarks show Discourje's overhead can be less than 5% for real/existing concurrent programs.  ...  Over the past years, a significant body of research in this area has been based on multiparty session types (MPST) [27] .  ... 
doi:10.1007/978-3-030-45190-5_15 fatcat:5v3ieaneabc7vcvl44nxyu7xcq

Compiling first-order functions to session-typed parallel code

David Castro-Perez, Nobuko Yoshida
2020 Proceedings of the 29th International Conference on Compiler Construction  
PAlg programs are coupled with an abstraction of their communication structure, a global type from the theory of multiparty session types (MPST).  ...  We achieve linear speedups on a shared-memory 12-core machine, and a speedup of 16 on a 2-node, 24-core NUMA.  ...  Acknowledgements We thank Francisco Ferreira for the helpful discussions in the early stages of this work.  ... 
doi:10.1145/3377555.3377889 dblp:conf/cc/Castro-PerezY20 fatcat:pw6xv3uc2jayzdeowrsg53hifa

On the Monitorability of Session Types, in Theory and Practice [article]

Christian Batrolo Burlò, Adrian Francalanza, Alceste Scalas
2021 arXiv   pre-print
On the practical side, we show that our monitoring theory is indeed realisable: building upon our formal model, we develop a Scala toolkit for the automatic generation of session monitors.  ...  Our executable monitors can be used to instrument black-box processes written in any programming language; we assess the viability of our approach with a series of benchmarks.  ...  A linear decomposition of multiparty sessions for safe distributed programming (artifact). Alceste Scalas and Nobuko Yoshida. Lightweight session programming in scala.  ... 
arXiv:2105.06291v1 fatcat:wpy4l4tf3rhqhhqgyzbohtrcbu

Model-View-Update-Communicate: Session Types meet the Elm Architecture [article]

Simon Fowler
2020 arXiv   pre-print
Safely implementing session types requires linearity, usually in the form of a linear type system.  ...  Session types are a type discipline for communication channel endpoints which allow conformance to protocols to be checked statically.  ...  The last few years have seen a flurry of activity in implementing session types in a multitude of programming languages, but linearity-a vital prerequisite for implementing session types safely-is difficult  ... 
arXiv:1910.11108v3 fatcat:4fnbw5icibatfatxbav26hou4i

Game Semantics: Easy as Pi [article]

Nobuko Yoshida, Simon Castellan, Léo Stefanesco
2020 arXiv   pre-print
Game semantics has proven to be a robust method to give compositional semantics for a variety of higher-order programming languages.  ...  The syntactic translation can be defined for a wide range of programming languages without knowledge of the particular game model used.  ...  , and distributed languages.  ... 
arXiv:2011.05248v1 fatcat:ambmnowganhfjd2azbf55x4w34

Programming and proving with distributed protocols

Ilya Sergey, James R. Wilcox, Zachary Tatlock
2017 Proceedings of the ACM on Programming Languages  
Disel's Hoare-style program logic, which extends state-of-the-art techniques for concurrency verification to the distributed setting.  ...  Recent work has developed several approaches for addressing (a) by means of mechanically verifying implementations of core distributed components, but no methodology exists to address (b) by composing  ...  While the multiparty [19] and multirole [7] Session Types enable a form of system composition and role-play, and dependent session types allow one to quantify over messages [54] , session types do  ... 
doi:10.1145/3158116 dblp:journals/pacmpl/SergeyWT18 fatcat:ovmthxsmjvc3fbmcjnlxmj6y2u

Defense Advanced Research Projects Agency (Darpa) Fiscal Year 2015 Budget Estimates

Department Of Defense Comptroller's Office
2014 Zenodo  
The budget request details the proposed investments $80 million to develop new sets of tools for imaging and analytics of neural and synaptic brain activities that will improve diagnosis and care of wounded  ...  Neurotechnology for Emerging Therapies (SUBNETS)) and better data management.  ...  of cyber security research and development programs through a safe, instrumented experimentation F.  ... 
doi:10.5281/zenodo.1215345 fatcat:fjzhmynqjbaafk67q2ckcblj2m

Making sense of sensing systems

Victoria Bellotti, Maribeth Back, W. Keith Edwards, Rebecca E. Grinter, Austin Henderson, Cristina Lopes
2002 Proceedings of the SIGCHI conference on Human factors in computing systems Changing our world, changing ourselves - CHI '02  
This workshop will bring together researchers in a range of emerging new areas of HCI to look for common ground and a common understanding of a next generation of user interfaces.  ...  We could explore how to measure realitybased vs. non-reality-based knowledge on a more continuous scale. This requires a way to rate the degree of reality or innate-ness for a piece of knowledge.  ...  Acknowledgements The author would like to thank to many of the former and current TMG students and colleagues in the MIT Media Lab for their contributions to the TUI research in the past 10 years at the  ... 
doi:10.1145/503376.503450 dblp:conf/chi/BellottiBEGHL02 fatcat:qraobvd44jadjfq4faprxdwue4

Making sense of sensing systems

Victoria Bellotti, Maribeth Back, W. Keith Edwards, Rebecca E. Grinter, Austin Henderson, Cristina Lopes
2002 Proceedings of the SIGCHI conference on Human factors in computing systems Changing our world, changing ourselves - CHI '02  
This workshop will bring together researchers in a range of emerging new areas of HCI to look for common ground and a common understanding of a next generation of user interfaces.  ...  We could explore how to measure realitybased vs. non-reality-based knowledge on a more continuous scale. This requires a way to rate the degree of reality or innate-ness for a piece of knowledge.  ...  Acknowledgements The author would like to thank to many of the former and current TMG students and colleagues in the MIT Media Lab for their contributions to the TUI research in the past 10 years at the  ... 
doi:10.1145/503447.503450 fatcat:oox2ir4w3bf7nemgqtj5dacqfa

Discrimination of short speech‐like formant transitions

Astrid van Wieringen, Louis C. W. Pols
1992 Journal of the Acoustical Society of America  
., Univ. of Mississippi, University, MS 38677) The Gaussian distribution of an ultrasonic field has attracted attention and interest because of its unique features: analytic mathematical solution for a  ...  The resulting sensor image is phase reversed resulting in a transducer that is a linear quadrupole.  ...  A noniterative overlapping domain decomposition technique for a linear acoustic wave equation is presented, based on the concept of region of dependence of a point P.  ... 
doi:10.1121/1.405128 fatcat:dbtewzqvijhkta6op7ul3ribti

Execution Models [chapter]

2006 Service-Oriented Computing  
Using Services Services provide a programming metaphor that supports the right kinds of programming models for open, distributed systems.  ...  Lastly, a total order or a linear order is a partial order that also satisfies the linearity (also known as totality) property: • Linearity. x ≺ y or y ≺ x or x = y.  ...  It is not safe to assume that the last "word" in a URI would be interpreted as a label. • Use rdfs:isDefinedBy, which points to an authoritative description of the resource.  ... 
doi:10.1002/0470091509.ch10 fatcat:2jdemglma5gtre5xkxtzck45am

The Synergy Between Programming Languages and Cryptography (Dagstuhl Seminar 14492) Programming Languages for Big Data (PlanBig) (Dagstuhl Seminar 14511) Collective Adaptive Systems: Qualitative and Quantitative Modelling and Analysis (Dagstuhl Seminar 14512)

Dieter Gollmann, Cormac Herley, Vincent Koenig, Wolter Pieters, Martina Angela, Gilles Barthe, Michael Hicks, Florian Kerschbaum, Dominique Unruh, James Cheney, Torsten Grust, Dimitrios (+4 others)
2014 unpublished
We would like to thank Jonathan Katz for his initial involvement in organizing the seminar and Matthew Hammer for his help in preparing this report. References  ...  Finally, we are interested in the question of whether the design cycle is an effective methodology to use in the development of these metrics, rather than just the evaluation.  ...  In this talk we present a concurrent programming language with a linear type system to statically verify the correct use of promises in concurrent programs.  ... 
fatcat:7wtqx2fytzaafjgvthawub66h4
« Previous Showing results 1 — 15 out of 35 results