A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
NeoIDL: A Domain-Specific Language for Specifying REST Services
2015
Proceedings of the 27th International Conference on Software Engineering and Knowledge Engineering
A service is a unit of logic modularization that hides implementation details using well-defined contracts. ...
However, existing languages for contract specification in this domain present several limitations. ...
In the cases where it is necessary to persist a data type on a database, a database mapping is also necessary within a service. ...
doi:10.18293/seke2015-218
dblp:conf/seke/BonifacioCFPK15
fatcat:swri3gxzmjbjbah4fxpwupxb3q
Refinable Function : An Object-oriented Approach to Procedure Modularity
[article]
2021
arXiv
pre-print
In this paper, we present Refinable Function, an object-oriented approach to advanced language-based, symmetric modularity technique for the procedure. ...
We conceptually compare Refinable Function to existing technique to substantiate benefits of modularity can be implemented in on well-established object-oriented language without compiler support. ...
Communication in DCI is indirectly passed to context object which maps object and its role explicitly. ...
arXiv:1707.02590v2
fatcat:r2ksfcdyunayrl2nmhxvmdueuq
Comparative Studies of 10 Programming Languages within 10 Diverse Criteria - a Team 10 COMP6411-S10 Term Report
[article]
2010
arXiv
pre-print
This is a survey on the programming languages: C++, JavaScript, AspectJ, C#, Haskell, Java, PHP, Scala, Scheme, and BPEL. ...
We study these languages in the context of the above mentioned criteria and the level of support they provide for each one of them. ...
In addition, according to the same source, the ranking of the most popular languages to the least are as follows: Java, C++, PHP, C#, Scheme, Haskell, and Scala. ...
arXiv:1008.3561v1
fatcat:5k7an2up5bbchboz6f2mzuehza
Comparing Selected Criteria of Programming Languages Java, PHP, C++, Perl, Haskell, AspectJ, Ruby, COBOL, Bash Scripts and Scheme Revision 1.0 - a Team CPLgroup COMP6411-S10 Term Report
[article]
2010
arXiv
pre-print
In this paper we present a comparative study between ten programming languages: Haskell, Java, Perl, C++, AspectJ, COBOL, Ruby, PHP, Bash Scripts, and Scheme; with respect of the following criteria: Secure ...
Multiple programming languages are designed, specified, and implemented every year in order to keep up with the changing programming paradigms, hardware evolution, etc. ...
*do* in Haskell and similar languages has ability to provide support for modular security. ...
arXiv:1008.3434v1
fatcat:yc767tog7ze7xf2zboj4lfcaqy
Arrows for secure information flow
2010
Theoretical Computer Science
This paper presents an embedded security sublanguage for enforcing informationflow policies in the standard Haskell programming language. ...
is an expanded version of an earlier paper that appeared in IEEE CSFW (Li and Zdancewic, 2006) . ...
Funding for this research was provided in part by NSF grants CNS-0346939 and CCF-0524035, and grant N00014-04-1-0725 provided by the ONR. ...
doi:10.1016/j.tcs.2010.01.025
fatcat:fps3d3rxnvf4ll2upyrhyn4uoq
Dynamic applications from the ground up
2005
Proceedings of the 2005 ACM SIGPLAN workshop on Haskell - Haskell '05
In this paper, we explore fully dynamic applications in Haskell where the static core is minimal and code is hot swappable. ...
We illustrate both benefits in detail at the example of a novel embedded DSL for editor interfaces. ...
The development of Yi benefited from several discussions with Tuomo Valkonen, in particular the monadic lexer switching model. ...
doi:10.1145/1088348.1088352
dblp:conf/haskell/StewartC05
fatcat:wiyyqdf6mvahtgai5oudotcsau
Comparative Studies of 10 Programming Languages within 10 Diverse Criteria -- a Team 7 COMP6411-S10 Term Report
[article]
2010
arXiv
pre-print
In this paper, we will discuss ten programming languages: C++, C#, Java, Groovy, JavaScript, PHP, Schalar, Scheme, Haskell and AspectJ. ...
There are many programming languages in the world today.Each language has their advantage and disavantage. ...
Modularity
Isolate crosscutting
concerns in a modular way.
It is Difficult some times
impossible to isolate
crosscutting concerns from
the program's business
logic. ...
arXiv:1009.0305v1
fatcat:lcelqyy3ybb6jakrekezv22ajm
Cryptographic Stack Machine Notation One
Нотация криптографической стековой машины версии один
2018
Proceedings of the Institute for System Programming of RAS
Нотация криптографической стековой машины версии один
Currently, the author's proof-of-concept implementation of the language (embedded in Haskell) can translate a CMN.1-based specifications both to the interoperable implementations and to the programs for ...
The verification is complete: the engine decrypts the ciphertexts, checks the message authentication codes and signatures, etc. ...
Bearing in mind the elegant and concise syntax of the Haskell language and advantages of embedded domain-specific languages, we integrate our CMN.1-based specification language in Haskell. ...
doi:10.15514/ispras-2018-30(3)-12
fatcat:gjxyldevszgzxllwyqakwrz5hi
Soutei, a Logic-Based Trust-Management System
[chapter]
2006
Lecture Notes in Computer Science
Soutei policies and credentials are written in a declarative logic-based security language and thus constitute distributed logic programs. Soutei policies are modular, concise, and readable. ...
We describe the design and implementation of a trust-management system Soutei, a dialect of Binder, for access control in distributed systems. ...
A substitution is a finite map from logic variables to terms, mapping no variable to itself. An application of a substitution is written in postfix notation. ...
doi:10.1007/11737414_10
fatcat:ihzupp4uuzbpvhh426o36gb5vq
Modular Remote Communication Protocol Interpreters
[article]
2017
arXiv
pre-print
The library provides type safe remote invocations, and is modular and extensible. ...
Conclusion We presented endpoints, a modular and extensible library to perform remote communication in Scala. ...
Modularity In the above example, the getItem definition uses methods (endpoint, path, jsonResponse, etc.) that are provided by traits. ...
arXiv:1711.09288v1
fatcat:cvkwjkdyvnezzji22n6tesb36q
Information-Flow Control for Programming on Encrypted Data
2012
2012 IEEE 25th Computer Security Foundations Symposium
We present a Haskell-based implementation and prove that cloud implementations based on secret sharing, homomorphic encryption, or other alternatives satisfying our general definition meet precise security ...
a store that maps a to an element of type Y ). ...
We use monad transformers [36] to stack additional functionalities, in a modular fashion, on top of Haskell's IO. ...
doi:10.1109/csf.2012.30
dblp:conf/csfw/Mitchell0SZ12
fatcat:7pen3b4jcbafni64m7z25kokjy
Dealing with crosscutting concerns in a model based software production method
2006
Proceedings of the 2006 international workshop on Early aspects at ICSE - EA '06
With this objective in mind, the paper analyzes the OO-Method approach in the light of Aspect-Oriented Software Development (AOSD), with the concrete intention of finding out whether OO-Method deals with ...
We want to do that for two main reasons: i) to fix which conceptual primitives should be required to accomplish aspect-oriented conceptual modeling ii) to define a precise subsequent map between aspect-oriented ...
And it does not fully modularize this concern, since we still have to deal with the authentication process in the GUI tier and the interface to retrieve the current agent. ...
doi:10.1145/1137639.1137645
fatcat:d3f3gyfwpjbdjl4tcdgwpnejzq
Live Music-Making: A Rich Open Task Requires a Rich Open Interface
[chapter]
2013
Music and Human-Computer Interaction
In this position paper we present some themes of our research, strands of which reflect our title's assertion in various ways. ...
Our focus here is on live musicmaking, in particular improvised or part-improvised performances which incorporate digital technologies. Is music-making rich and open? ...
In the case of Nodal and Al-Jazari, city block distance maps to time, in terms of the movements of agents across a grid. ...
doi:10.1007/978-1-4471-2990-5_8
fatcat:ilmeifpj55e3tlcwztmzi4hmui
Position paper: the science of deep specification
2017
Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences
formal specifications in various logics. ...
These specifications come in a multitude of different forms: comments in code and natural-language documentation, unit tests, assertions, contracts, static types, property-based random test suites and ...
The comments we received from the editor and the anonymous referees were particularly helpful in shaping our presentation. ...
doi:10.1098/rsta.2016.0331
pmid:28871056
fatcat:ztgho4isajbchi4bghlegxns7m
Addressing covert termination and timing channels in concurrent information flow systems
2012
Proceedings of the 17th ACM SIGPLAN international conference on Functional programming - ICFP '12
We implement this approach in a Haskell library and demonstrate its applicability by building a web server that uses information-flow control to restrict untrusted web applications. ...
Intuitively, we leverage concurrency by placing such potentially sensitive actions in separate threads. ...
In this work, we show a modular approach of mitigating the external timing covert channel for Haskell libraries, such as LIO. ...
doi:10.1145/2364527.2364557
dblp:conf/icfp/StefanRBLMM12
fatcat:otvnjixvrbb2pcy2hh7uogyz5i
« Previous
Showing results 1 — 15 out of 279 results