Filters








1,008,886 Hits in 6.2 sec

Using session types as an effect system

Dominic Orchard, Nobuko Yoshida
2016 Electronic Proceedings in Theoretical Computer Science  
We propose a foundation for reasoning about concurrent side effects using sessions. Primarily, we show that session types are expressive enough to encode an effect system for stateful processes.  ...  This is formalised via an effect-preserving encoding of a simple imperative language with an effect system into the pi-calculus with session primitives and session types (into which we encode effect specifications  ...  Sessions as effects The session types of processes interacting with Store provide the same information as the state effect system.  ... 
doi:10.4204/eptcs.203.1 fatcat:dv2mulxrmvgdplobzuwcufzsom

Using communicative approach in the learning process

N Jumamuratova
2022 Ренессанс в парадигме новаций образования и технологий в XXI веке  
The purpose of the communicative approach is to teach how to use the studied foreign language as a means of constructive communication, depending on the goals and objectives of communication, participants  ...  The article discusses the ways of constructing training sessions, the selection of linguistic and grammatical material in accordance with the requirements of the communicative approach.  ...  Tasks are an important stage in the work on grammar.  ... 
doi:10.47689/innovations-in-edu-vol-iss1-pp175-176 fatcat:go42ibtomvgcjbpw5qtvk6vq3i

Effects as sessions, sessions as effects

Dominic Orchard, Nobuko Yoshida
2016 Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages - POPL 2016  
Considering the intention behind the variable agent (simulating state), session types here act as an effect system.  ...  By [15] , we can encode our session calculus into an extension of [4] ; however to encode effect systems, we require a sequence of linear types (sessions) as well as recursive types (for typing effect  ... 
doi:10.1145/2837614.2837634 dblp:conf/popl/OrchardY16 fatcat:k2ahg56e4bgthcbsfxgybltj4q

Effects as sessions, sessions as effects

Dominic Orchard, Nobuko Yoshida
2016 SIGPLAN notices  
Considering the intention behind the variable agent (simulating state), session types here act as an effect system.  ...  By [15] , we can encode our session calculus into an extension of [4] ; however to encode effect systems, we require a sequence of linear types (sessions) as well as recursive types (for typing effect  ... 
doi:10.1145/2914770.2837634 fatcat:dpjmbboswrfmhdz4cs6y5bdliq

Benefits of session types for software development

A. Laura Voinea, Simon J. Gay
2016 Proceedings of the 7th International Workshop on Evaluation and Usability of Programming Languages and Tools - PLATEAU 2016  
Session types are a formalism used to specify and check the correctness of communication based systems.  ...  Within their scope, they can guarantee the absence of communication errors such as deadlock, sending an unexpected message or failing to handle an incoming message.  ...  Acknowledgments This research was supported by UK EPSRC grant "From Data Types to Session Types: A Basis for Concurrency and Distribution" (EP/K034413/1).  ... 
doi:10.1145/3001878.3001883 dblp:conf/oopsla/VoineaG16 fatcat:tffhzlj24naudhsupq7tz4pcse

How to teach vocabulary to adults

G Avezova
2022 Ренессанс в парадигме новаций образования и технологий в XXI веке  
One of the most effective methods of helping children learn new vocabulary words is to teach unfamiliar words used in a text prior to the reading experience.  ...  There are several effective explicit (intentional, planned instruction) and implicit (spontaneous instruction as a child comes to new words in a text) strategies that adults can employ with readers of  ...  This allows the child to develop an understanding of the word‗s connotations as well as its denotation.  ... 
doi:10.47689/innovations-in-edu-vol-iss1-pp185-186 fatcat:q325nsr4pzbf3fbpspucnbroi4

Theory and Applications of Behavioural Types (Dagstuhl Seminar 17051)

Simon Gay, Vasco T. Vasconcelos, Philip Wadler, Nobuko Yoshida, Marc Herbstritt
2017 Dagstuhl Reports  
Theoretical work has explored new relationships between established behavioural type systems and areas such as linear logic, automata theory, process calculus testing theory, dependent type theory, and  ...  Perhaps the most well-known form of behavioural types is session types, which are type-theoretic specifications of communication protocols.  ...  We propose GradualGV as an extension of the functional session type system GV with dynamic types and casts.  ... 
doi:10.4230/dagrep.7.1.158 dblp:journals/dagstuhl-reports/GayVWY17 fatcat:nl4mfyez5bchrdomocb6qsfpkq

Correspondence Assertions for Process Synchronization in Concurrent Communications

Eduardo Bonelli, Adriana Compagnoni, Elsa Gunter
2004 Electronical Notes in Theoretical Computer Science  
High-level specification of patterns of communications such as protocols can be modeled elegantly by means of session types [14] .  ...  Also, we illustrate how the resulting theory allows us to address the shortcomings present in the pure theory of session types.  ...  Acknowledgments: We are grateful to the Laboratory for Secure Systems group at Stevens for interesting discussions, and in particular to Tom Chothia for suggesting session types as a relevant concept.  ... 
doi:10.1016/j.entcs.2004.04.036 fatcat:ag6dncvwuvfmzjlft6khwlhwty

Linearity, Control Effects, and Behavioral Types [chapter]

Luís Caires, Jorge A. Pérez
2017 Lecture Notes in Computer Science  
Designing type systems for handling and disciplining such idioms is challenging, due to long known conflicts between internal non-determinism, linearity, and control effects such as exceptions.  ...  The expressivity of our system is illustrated by several examples, including a typed encoding of a higher-order functional language with threads, session channels, non-determinism, and exceptions.  ...  The paper [35] relates effect and session type systems, but effects such as exceptions are not addressed. A work exploring affinity in session calculi is [34] .  ... 
doi:10.1007/978-3-662-54434-1_9 fatcat:hk5yagycr5f55f2gigbs5hwl7a

CoSAC: Coordinated Session-Based Admission Control for Multi-Tier Internet Applications

Sireesha Muppala, Xiaobo Zhou
2009 2009 Proceedings of 18th International Conference on Computer Communications and Networks  
Experimental results demonstrate the superior performance of CoSAC with respect to the effective session throughput.  ...  The session-based admission control approach (SBAC) designed for a single Web server is not effective for a multi-tier architecture.  ...  The type of the incoming session is applied as an evidence to the node SessionType, which gives the node the state of Shopping.  ... 
doi:10.1109/icccn.2009.5235319 dblp:conf/icccn/MuppalaZ09 fatcat:chsl7zmlyfbizjlhvd5ufedkku

Case Study: Visualization and Information Retrieval Techniques for Network Intrusion Detection [chapter]

Travis Atkison, Kathleen Pensy, Charles Nicholas, David Ebert, Rebekah Atkison, Chris Morris
2001 Eurographics  
By regarding Telnet sessions as documents, which may or may not include attacks, a session that contains a certain type of attack can be used as a query, allowing us to search the data for other instances  ...  The use of information visualization techniques allows us to quickly and clearly find the attacks and also find similar, potentially new types of attacks.  ...  We will also explore the addition of more session details as metadata within the visualization display, and explore the effectiveness of different glyph attributes for conveying important intrusion detection  ... 
doi:10.1007/978-3-7091-6215-6_30 fatcat:rqbfsgjfcfgzbmjbs6g6le6zsi

Case Study: Visualization and Information Retrieval Techniques for Network Intrusion Detection [article]

Travis Atkison, Kathleen Pensy, Charles Nicholas, David Ebert, Rebekah Atkison, Chris Morris
2001 EUROVIS 2005: Eurographics / IEEE VGTC Symposium on Visualization  
By regarding Telnet sessions as documents, which may or may not include attacks, a session that contains a certain type of attack can be used as a query, allowing us to search the data for other instances  ...  The use of information visualization techniques allows us to quickly and clearly find the attacks and also find similar, potentially new types of attacks.  ...  We will also explore the addition of more session details as metadata within the visualization display, and explore the effectiveness of different glyph attributes for conveying important intrusion detection  ... 
doi:10.2312/vissym/vissym01/283-290 fatcat:wleu2654sjc25aqsi5ynfv5die

Type-Based Analysis for Session Inference (Extended Abstract) [chapter]

Carlo Spaccasassi, Vasileios Koutavas
2016 Lecture Notes in Computer Science  
We propose a type-based analysis to infer the session protocols of channels in an ML-like concurrent functional language.  ...  Combining and extending well-known techniques, we develop a type-checking system that separates the underlying ML type system from the typing of sessions.  ...  The rules of our type-and-effect system are shown in Fig. 3 which, as in [1, Sec. 2.8], is a conservative extension of ML.  ... 
doi:10.1007/978-3-319-39570-8_17 fatcat:kfgxip265zdlnbbua5dzcssnhm

Correspondence assertions for process synchronization in concurrent communications

EDUARDO BONELLI, ADRIANA COMPAGNONI, ELSA GUNTER
2005 Journal of functional programming  
This new type system can be used to check: • source of information, • whether data is propagated as specified across multiple parties, • if there are unspecified communications between parties, and • if  ...  Also, we illustrate how the resulting theory allows us to address shortcomings present in the pure theory of session types. * An extended abstract of this work was presented at the FOCLASA 2003 workshop  ...  Acknowledgments: We are grateful to the Laboratory for Secure Systems group at Stevens for interesting discussions, and in particular to Tom Chothia for suggesting session types as a relevant concept.  ... 
doi:10.1017/s095679680400543x fatcat:mfkz2xviijedzhlziqoiiprgxu

Error behaviours in an unreliable in-air gesture recognizer

Ahmed Sabbir Arif, Wolfgang Stuerzlinger, Euclides Jose de Mendonca Filho, Alec Gordynski
2014 Proceedings of the extended abstracts of the 32nd annual ACM conference on Human factors in computing systems - CHI EA '14  
This article presents results of two pilot studies that investigated error behaviours with an unreliable in-air gesture recognizer.  ...  As at least 97% accuracy rate is necessary for the users to find a gesture-based system useful [7] , our setup served well as an unreliable system.  ...  An ANOVA found no significant effect of gesture type on ERH (F3,6 = 0.26, ns). There was also no significant effect of session (F2,6 = 0.18, ns) or gesture type × session (F6,36 = 1.25, p >.05).  ... 
doi:10.1145/2559206.2581188 dblp:conf/chi/ArifSFG14 fatcat:anozr2ut6zeildtbhnsa2aeyde
« Previous Showing results 1 — 15 out of 1,008,886 results