HOME > 상세정보

상세정보

Programming languages and systems [electronic resource] : 15th Asian Symposium, APLAS 2017, Suzhou, China, November 27-29, 2017, proceedings

Programming languages and systems [electronic resource] : 15th Asian Symposium, APLAS 2017, Suzhou, China, November 27-29, 2017, proceedings

자료유형
E-Book(소장)
개인저자
Chang, Bor-Yuh Evan.
서명 / 저자사항
Programming languages and systems [electronic resource] : 15th Asian Symposium, APLAS 2017, Suzhou, China, November 27-29, 2017, proceedings / Bor-Yuh Evan Chang, editor.
발행사항
Cham :   Springer,   2017.  
형태사항
1 online resource (xix, 555 p.) : ill.
총서사항
Programming and Software Engineering ;10695
ISBN
9783319712369 9783319712376 (e-book)
요약
This book constitutes the proceedings of the 15th Asian Symposium on Programming Languages and Systems, APLAS 2017, held in Suzhou, China, in November 2017. The 24 papers presented in this volume were carefully reviewed and selected from 56 submissions. They were organized in topical sections named: security; heap and equivalence reasoning; concurrency and verification; domain-specific languages; semantics; and numerical reasoning. The volume also contains two invited talks in full-paper length. .
일반주기
Title from e-Book title page.  
내용주기
Invited Contributions -- Programming by Examples: PL meets ML -- Synthesizing SystemC Code from Delay Hybrid CSP -- Security -- Taming Message-passing Communication in Compositional Reasoning about Confidentiality -- Capabilities for Java: Secure Access to Resources -- Enforcing Programming Guidelines with Region-Types and Effects -- Automatically generating secure wrappers for SGX enclaves from separation logic specifications -- Heap and Equivalence Reasoning -- Black-box equivalence checking across compiler optimizations -- Weakly Sensitive Analysis for Unbounded Iteration over JavaScript Objects -- Decision Procedure for Entailment of Symbolic Heaps with Arrays -- Bringing order to the separation logic jungle -- Concurrency and Verification -- Programming and proving with classical types -- Static Analysis of Multithreaded Recursive Programs Communicating via Rendez-vous -- Verified Root-Balanced Trees -- Safety and Liveness of MCS Lock - Layer by Layer -- Domain-Specific Languages -- Palgol: A High-Level DSL for Vertex-Centric Graph Processing with Remote Data Access -- Efficient Functional Reactive Programming through Incremental Behaviors -- Implementing Algebraic Effects in C - Monads for Free in C -- Sound and Efficient Language-Integrated Query: Maintaining the ORDER -- Semantics -- A Computational Interpretation of Context-Free Expressions -- Partiality and container monads -- The Negligible and Yet Subtle Cost of Pattern Matching -- A lambda calculus for density matrices wth classical and probabilistic controls -- Numerical Reasoning -- Compact Difference Bound Matrices -- Sharper and Simpler Nonlinear Interpolants for Program Verification -- A Nonstandard Functional Programming Language -- Counterexample-Guided Bit-Precision Selection.
서지주기
Includes bibliographical references and index.
이용가능한 다른형태자료
Issued also as a book.  
일반주제명
Programming languages (Electronic computers) --Congresses. Computer programming --Congresses.
바로가기
URL
000 00000cam u2200205 a 4500
001 000045989377
005 20190710165910
006 m d
007 cr
008 190708s2017 sz a ob 101 0 eng d
020 ▼a 9783319712369
020 ▼a 9783319712376 (e-book)
040 ▼a 211009 ▼c 211009 ▼d 211009
050 4 ▼a QA76.7-76.73
082 0 4 ▼a 005.13 ▼2 23
084 ▼a 005.13 ▼2 DDCK
090 ▼a 005.13
245 0 0 ▼a Programming languages and systems ▼h [electronic resource] : ▼b 15th Asian Symposium, APLAS 2017, Suzhou, China, November 27-29, 2017, proceedings / ▼c Bor-Yuh Evan Chang, editor.
260 ▼a Cham : ▼b Springer, ▼c 2017.
300 ▼a 1 online resource (xix, 555 p.) : ▼b ill.
490 1 ▼a Programming and Software Engineering ; ▼v 10695
500 ▼a Title from e-Book title page.
504 ▼a Includes bibliographical references and index.
505 0 ▼a Invited Contributions -- Programming by Examples: PL meets ML -- Synthesizing SystemC Code from Delay Hybrid CSP -- Security -- Taming Message-passing Communication in Compositional Reasoning about Confidentiality -- Capabilities for Java: Secure Access to Resources -- Enforcing Programming Guidelines with Region-Types and Effects -- Automatically generating secure wrappers for SGX enclaves from separation logic specifications -- Heap and Equivalence Reasoning -- Black-box equivalence checking across compiler optimizations -- Weakly Sensitive Analysis for Unbounded Iteration over JavaScript Objects -- Decision Procedure for Entailment of Symbolic Heaps with Arrays -- Bringing order to the separation logic jungle -- Concurrency and Verification -- Programming and proving with classical types -- Static Analysis of Multithreaded Recursive Programs Communicating via Rendez-vous -- Verified Root-Balanced Trees -- Safety and Liveness of MCS Lock - Layer by Layer -- Domain-Specific Languages -- Palgol: A High-Level DSL for Vertex-Centric Graph Processing with Remote Data Access -- Efficient Functional Reactive Programming through Incremental Behaviors -- Implementing Algebraic Effects in C - Monads for Free in C -- Sound and Efficient Language-Integrated Query: Maintaining the ORDER -- Semantics -- A Computational Interpretation of Context-Free Expressions -- Partiality and container monads -- The Negligible and Yet Subtle Cost of Pattern Matching -- A lambda calculus for density matrices wth classical and probabilistic controls -- Numerical Reasoning -- Compact Difference Bound Matrices -- Sharper and Simpler Nonlinear Interpolants for Program Verification -- A Nonstandard Functional Programming Language -- Counterexample-Guided Bit-Precision Selection.
520 ▼a This book constitutes the proceedings of the 15th Asian Symposium on Programming Languages and Systems, APLAS 2017, held in Suzhou, China, in November 2017. The 24 papers presented in this volume were carefully reviewed and selected from 56 submissions. They were organized in topical sections named: security; heap and equivalence reasoning; concurrency and verification; domain-specific languages; semantics; and numerical reasoning. The volume also contains two invited talks in full-paper length. .
530 ▼a Issued also as a book.
538 ▼a Mode of access: World Wide Web.
650 0 ▼a Programming languages (Electronic computers) ▼v Congresses.
650 0 ▼a Computer programming ▼v Congresses.
700 1 ▼a Chang, Bor-Yuh Evan.
711 2 ▼a APLAS (Symposium) ▼n (15th : ▼d 2017 : ▼c Suzhou, China).
830 0 ▼a Programming and Software Engineering ; ▼v 10695.
856 4 0 ▼u https://oca.korea.ac.kr/link.n2s?url=https://doi.org/10.1007/978-3-319-71237-6
945 ▼a KLPA
991 ▼a E-Book(소장)

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 중앙도서관/e-Book 컬렉션/ 청구기호 CR 005.13 등록번호 E14014919 도서상태 대출불가(열람가능) 반납예정일 예약 서비스 M

컨텐츠정보

책소개

Invited Contributions.- Programming by Examples: PL meets ML.- Synthesizing SystemC Code from Delay Hybrid CSP.- Security.- Taming Message-passing Communication in Compositional Reasoning about Confidentiality.- Capabilities for Java: Secure Access to Resources.- Enforcing Programming Guidelines with Region-Types and Effects.- Automatically generating secure wrappers for SGX enclaves from separation logic specifications.- Heap and Equivalence Reasoning.- Black-box equivalence checking across compiler optimizations.- Weakly Sensitive Analysis for Unbounded Iteration over JavaScript Objects.- Decision Procedure for Entailment of Symbolic Heaps with Arrays.- Bringing order to the separation logic jungle.- Concurrency and Verification.- Programming and proving with classical types.- Static Analysis of Multithreaded Recursive Programs Communicating via Rendez-vous.- Verified Root-Balanced Trees.- Safety and Liveness of MCS Lock - Layer by Layer.- Domain-Specific Languages.- Palgol: A High-Level DSL for Vertex-Centric Graph Processing with Remote Data Access.- Efficient Functional Reactive Programming through Incremental Behaviors.- Implementing Algebraic Effects in C - Monads for Free in C.- Sound and Efficient Language-Integrated Query: Maintaining the ORDER.- Semantics.- A Computational Interpretation of Context-Free Expressions.- Partiality and container monads.- The Negligible and Yet Subtle Cost of Pattern Matching.- A lambda calculus for density matrices wth classical and probabilistic controls.- Numerical Reasoning.- Compact Difference Bound Matrices.- Sharper and Simpler Nonlinear Interpolants for Program Verification.- A Nonstandard Functional Programming Language.- Counterexample-Guided Bit-Precision Selection.


정보제공 : Aladin

목차

Intro -- Preface -- Organization -- Abstracts of Invited Talks -- Relational Verification of Higher-Order Probabilistic Programs -- Programming by Examples: PL Meets ML -- Gradual Enforcement of Program Invariants -- Synthesizing SystemC Code from Delay Hybrid CSP -- Contents -- Invited Contributions -- Programming by Examples: PL Meets ML -- 1 Introduction -- 2 Applications -- 2.1 Data Wrangling -- 2.2 Code Transformations -- 3 PL Meets ML -- 3.1 A Perspective on PL Meets ML -- 3.2 Using ML to Improve PBE -- 4 Search Algorithm -- 4.1 Domain-Specific Language -- 4.2 Deductive Search Methodology -- 4.3 ML-Based Search Algorithm -- 5 Ranking -- 5.1 Ranking Based on Program Structure -- 5.2 Ranking Based on Test Inputs -- 5.3 ML-based Ranking Function -- 6 Interactivity -- 6.1 Clustering of Strings -- 7 Future Directions -- 8 Conclusion -- References -- Synthesizing SystemC Code from Delay Hybrid CSP -- 1 Introduction -- 1.1 Related Work -- 2 Preliminaries -- 2.1 Delay Dynamical Systems -- 2.2 SystemC -- 3 Delay Hybrid CSP (dHCSP) -- 3.1 Syntax of dHCSP -- 3.2 Semantics of dHCSP -- 3.3 Approximate Bisimulation on dHCSP -- 4 Discretization of dHCSP -- 4.1 Discretization of DDE (DDEs) in Bounded Time -- 4.2 Discretization of dHCSP in Bounded Time -- 4.3 Correctness of the Discretization -- 5 From Discretized dHCSP to SystemC -- 6 Case Study -- 7 Conclusion -- References -- Security -- Taming Message-Passing Communication in Compositional Reasoning About Confidentiality -- 1 Introduction -- 2 Motivation and Approach at a Glance -- 3 Model of Computation -- 4 Attacker Model and Baseline Security -- 5 Compositional Reasoning About Noninterference -- 5.1 Annotated Programs -- 5.2 Process-Local Security Condition -- 5.3 Compositional Reasoning About Information-Flow Security -- 5.4 Instrumented Semantics and Sound Use of Assumptions -- 5.5 Soundness of Compositional Reasoning -- 6 Security Type System and Evaluation -- 6.1 Judgment and Typing Rules -- 6.2 Soundness -- 6.3 Examples of Typable Programs -- 7 Related Work -- 8 Conclusion -- References -- Capabilities for Java: Secure Access to Resources -- 1 Introduction -- 1.1 Java Security -- 1.2 Java Security Issues -- 1.3 Contributions -- 2 Classes and Interfaces as Capabilities -- 3 Capabilities for Java -- 3.1 Securing Capabilities -- 3.2 Generating Capabilities -- 3.3 Heterogeneous Data Structures -- 3.4 Methods of Class Object -- 4 Semantics of Capabilities -- 5 Implementation of Capabilities -- 6 Related Work -- 7 Conclusions and Future Work -- References -- Enforcing Programming Guidelines with Region Types and Effects -- 1 Introduction -- 2 Formalizing Programming Guidelines -- 3 Featherweight Java with Updates, Casts, and Strings -- 3.1 Syntax -- 3.2 Semantics -- 4 Region-Based Type and Effect Systems -- 4.1 Refined Types, Effects, and Type System Parameters -- 4.2 Declarative Type System -- 4.3 Semi-declarative Type System -- 4.4 Algorithmic Type System -- 5 Experimental Evaluation -- 5.1 Implemen.

관련분야 신착자료

Harvard Business Review (2025)