Filters








279 Hits in 3.1 sec

NeoIDL: A Domain-Specific Language for Specifying REST Services

Rodrigo Bonifacio, Thiago M. Castro, Ricardo Fernandes, Alisson Palmeira, Uirá Kulesza
2015 Proceedings of the 27th International Conference on Software Engineering and Knowledge Engineering  
A service is a unit of logic modularization that hides implementation details using well-defined contracts.  ...  However, existing languages for contract specification in this domain present several limitations.  ...  In the cases where it is necessary to persist a data type on a database, a database mapping is also necessary within a service.  ... 
doi:10.18293/seke2015-218 dblp:conf/seke/BonifacioCFPK15 fatcat:swri3gxzmjbjbah4fxpwupxb3q

Refinable Function : An Object-oriented Approach to Procedure Modularity [article]

Hiun Kim
2021 arXiv   pre-print
In this paper, we present Refinable Function, an object-oriented approach to advanced language-based, symmetric modularity technique for the procedure.  ...  We conceptually compare Refinable Function to existing technique to substantiate benefits of modularity can be implemented in on well-established object-oriented language without compiler support.  ...  Communication in DCI is indirectly passed to context object which maps object and its role explicitly.  ... 
arXiv:1707.02590v2 fatcat:r2ksfcdyunayrl2nmhxvmdueuq

Comparative Studies of 10 Programming Languages within 10 Diverse Criteria - a Team 10 COMP6411-S10 Term Report [article]

Rana Naim, Mohammad Fahim Nizam, Sheetal Hanamasagar, Jalal Noureddine, Marinela Miladinova
2010 arXiv   pre-print
This is a survey on the programming languages: C++, JavaScript, AspectJ, C#, Haskell, Java, PHP, Scala, Scheme, and BPEL.  ...  We study these languages in the context of the above mentioned criteria and the level of support they provide for each one of them.  ...  In addition, according to the same source, the ranking of the most popular languages to the least are as follows: Java, C++, PHP, C#, Scheme, Haskell, and Scala.  ... 
arXiv:1008.3561v1 fatcat:5k7an2up5bbchboz6f2mzuehza

Comparing Selected Criteria of Programming Languages Java, PHP, C++, Perl, Haskell, AspectJ, Ruby, COBOL, Bash Scripts and Scheme Revision 1.0 - a Team CPLgroup COMP6411-S10 Term Report [article]

Sultan S. Al-Qahtani, Pawel Pietrzynski, Luis F. Guzman, Rafik Arif, Adrien Tevoedjre
2010 arXiv   pre-print
In this paper we present a comparative study between ten programming languages: Haskell, Java, Perl, C++, AspectJ, COBOL, Ruby, PHP, Bash Scripts, and Scheme; with respect of the following criteria: Secure  ...  Multiple programming languages are designed, specified, and implemented every year in order to keep up with the changing programming paradigms, hardware evolution, etc.  ...  *do* in Haskell and similar languages has ability to provide support for modular security.  ... 
arXiv:1008.3434v1 fatcat:yc767tog7ze7xf2zboj4lfcaqy

Arrows for secure information flow

Peng Li, Steve Zdancewic
2010 Theoretical Computer Science  
This paper presents an embedded security sublanguage for enforcing informationflow policies in the standard Haskell programming language.  ...  is an expanded version of an earlier paper that appeared in IEEE CSFW (Li and Zdancewic, 2006) .  ...  Funding for this research was provided in part by NSF grants CNS-0346939 and CCF-0524035, and grant N00014-04-1-0725 provided by the ONR.  ... 
doi:10.1016/j.tcs.2010.01.025 fatcat:fps3d3rxnvf4ll2upyrhyn4uoq

Dynamic applications from the ground up

Don Stewart, Manuel M. T. Chakravarty
2005 Proceedings of the 2005 ACM SIGPLAN workshop on Haskell - Haskell '05  
In this paper, we explore fully dynamic applications in Haskell where the static core is minimal and code is hot swappable.  ...  We illustrate both benefits in detail at the example of a novel embedded DSL for editor interfaces.  ...  The development of Yi benefited from several discussions with Tuomo Valkonen, in particular the monadic lexer switching model.  ... 
doi:10.1145/1088348.1088352 dblp:conf/haskell/StewartC05 fatcat:wiyyqdf6mvahtgai5oudotcsau

Comparative Studies of 10 Programming Languages within 10 Diverse Criteria -- a Team 7 COMP6411-S10 Term Report [article]

Sleiman Rabah, Jiang Li, Mingzhi Liu, Yuanwei Lai
2010 arXiv   pre-print
In this paper, we will discuss ten programming languages: C++, C#, Java, Groovy, JavaScript, PHP, Schalar, Scheme, Haskell and AspectJ.  ...  There are many programming languages in the world today.Each language has their advantage and disavantage.  ...  Modularity Isolate crosscutting concerns in a modular way. It is Difficult some times impossible to isolate crosscutting concerns from the program's business logic.  ... 
arXiv:1009.0305v1 fatcat:lcelqyy3ybb6jakrekezv22ajm

Cryptographic Stack Machine Notation One
Нотация криптографической стековой машины версии один

S.E. Prokopev
2018 Proceedings of the Institute for System Programming of RAS  
Currently, the author's proof-of-concept implementation of the language (embedded in Haskell) can translate a CMN.1-based specifications both to the interoperable implementations and to the programs for  ...  The verification is complete: the engine decrypts the ciphertexts, checks the message authentication codes and signatures, etc.  ...  Bearing in mind the elegant and concise syntax of the Haskell language and advantages of embedded domain-specific languages, we integrate our CMN.1-based specification language in Haskell.  ... 
doi:10.15514/ispras-2018-30(3)-12 fatcat:gjxyldevszgzxllwyqakwrz5hi

Soutei, a Logic-Based Trust-Management System [chapter]

Andrew Pimlott, Oleg Kiselyov
2006 Lecture Notes in Computer Science  
Soutei policies and credentials are written in a declarative logic-based security language and thus constitute distributed logic programs. Soutei policies are modular, concise, and readable.  ...  We describe the design and implementation of a trust-management system Soutei, a dialect of Binder, for access control in distributed systems.  ...  A substitution is a finite map from logic variables to terms, mapping no variable to itself. An application of a substitution is written in postfix notation.  ... 
doi:10.1007/11737414_10 fatcat:ihzupp4uuzbpvhh426o36gb5vq

Modular Remote Communication Protocol Interpreters [article]

Julien Richard-Foy, Wojciech Pituła
2017 arXiv   pre-print
The library provides type safe remote invocations, and is modular and extensible.  ...  Conclusion We presented endpoints, a modular and extensible library to perform remote communication in Scala.  ...  Modularity In the above example, the getItem definition uses methods (endpoint, path, jsonResponse, etc.) that are provided by traits.  ... 
arXiv:1711.09288v1 fatcat:cvkwjkdyvnezzji22n6tesb36q

Information-Flow Control for Programming on Encrypted Data

John C. Mitchell, Rahul Sharma, Deian Stefan, Joe Zimmerman
2012 2012 IEEE 25th Computer Security Foundations Symposium  
We present a Haskell-based implementation and prove that cloud implementations based on secret sharing, homomorphic encryption, or other alternatives satisfying our general definition meet precise security  ...  a store that maps a to an element of type Y ).  ...  We use monad transformers [36] to stack additional functionalities, in a modular fashion, on top of Haskell's IO.  ... 
doi:10.1109/csf.2012.30 dblp:conf/csfw/Mitchell0SZ12 fatcat:7pen3b4jcbafni64m7z25kokjy

Dealing with crosscutting concerns in a model based software production method

José Iborra, Oscar Pastor, Vicente Pelechano
2006 Proceedings of the 2006 international workshop on Early aspects at ICSE - EA '06  
With this objective in mind, the paper analyzes the OO-Method approach in the light of Aspect-Oriented Software Development (AOSD), with the concrete intention of finding out whether OO-Method deals with  ...  We want to do that for two main reasons: i) to fix which conceptual primitives should be required to accomplish aspect-oriented conceptual modeling ii) to define a precise subsequent map between aspect-oriented  ...  And it does not fully modularize this concern, since we still have to deal with the authentication process in the GUI tier and the interface to retrieve the current agent.  ... 
doi:10.1145/1137639.1137645 fatcat:d3f3gyfwpjbdjl4tcdgwpnejzq

Live Music-Making: A Rich Open Task Requires a Rich Open Interface [chapter]

Dan Stowell, Alex McLean
2013 Music and Human-Computer Interaction  
In this position paper we present some themes of our research, strands of which reflect our title's assertion in various ways.  ...  Our focus here is on live musicmaking, in particular improvised or part-improvised performances which incorporate digital technologies. Is music-making rich and open?  ...  In the case of Nodal and Al-Jazari, city block distance maps to time, in terms of the movements of agents across a grid.  ... 
doi:10.1007/978-1-4471-2990-5_8 fatcat:ilmeifpj55e3tlcwztmzi4hmui

Position paper: the science of deep specification

Andrew W. Appel, Lennart Beringer, Adam Chlipala, Benjamin C. Pierce, Zhong Shao, Stephanie Weirich, Steve Zdancewic
2017 Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences  
formal specifications in various logics.  ...  These specifications come in a multitude of different forms: comments in code and natural-language documentation, unit tests, assertions, contracts, static types, property-based random test suites and  ...  The comments we received from the editor and the anonymous referees were particularly helpful in shaping our presentation.  ... 
doi:10.1098/rsta.2016.0331 pmid:28871056 fatcat:ztgho4isajbchi4bghlegxns7m

Addressing covert termination and timing channels in concurrent information flow systems

Deian Stefan, Alejandro Russo, Pablo Buiras, Amit Levy, John C. Mitchell, David Maziéres
2012 Proceedings of the 17th ACM SIGPLAN international conference on Functional programming - ICFP '12  
We implement this approach in a Haskell library and demonstrate its applicability by building a web server that uses information-flow control to restrict untrusted web applications.  ...  Intuitively, we leverage concurrency by placing such potentially sensitive actions in separate threads.  ...  In this work, we show a modular approach of mitigating the external timing covert channel for Haskell libraries, such as LIO.  ... 
doi:10.1145/2364527.2364557 dblp:conf/icfp/StefanRBLMM12 fatcat:otvnjixvrbb2pcy2hh7uogyz5i
« Previous Showing results 1 — 15 out of 279 results