Login
|
New Account
AAAAAA
ITA
ENG
Results:
1-7
|
Results: 7
Attacking malicious code: A report to the Infoses Research Council
Authors:
McGraw, G Morrisett, G
Citation:
G. Mcgraw et G. Morrisett, Attacking malicious code: A report to the Infoses Research Council, IEEE SOFTW, 17(5), 2000, pp. 33
Syntactic type abstraction
Authors:
Grossman, D Morrisett, G Zdancewic, S
Citation:
D. Grossman et al., Syntactic type abstraction, ACM T PROGR, 22(6), 2000, pp. 1037-1080
Typed memory management via static capabilities
Authors:
Walker, D Crary, K Morrisett, G
Citation:
D. Walker et al., Typed memory management via static capabilities, ACM T PROGR, 22(4), 2000, pp. 701-771
Principals in programming languages: A syntactic proof technique
Authors:
Zdancewic, S Grossman, D Morrisett, G
Citation:
S. Zdancewic et al., Principals in programming languages: A syntactic proof technique, ACM SIGPL N, 34(9), 1999, pp. 197-207
Comparing mostly-copying and mark-sweep conservative collection
Authors:
Smith, F Morrisett, G
Citation:
F. Smith et G. Morrisett, Comparing mostly-copying and mark-sweep conservative collection, ACM SIGPL N, 34(3), 1999, pp. 68-78
Intensional polymorphism in type-erasure semantics
Authors:
Crary, K Weirich, S Morrisett, G
Citation:
K. Crary et al., Intensional polymorphism in type-erasure semantics, ACM SIGPL N, 34(1), 1999, pp. 301-312
From system F to typed assembly language
Authors:
Morrisett, G Walker, D Crary, K Glew, N
Citation:
G. Morrisett et al., From system F to typed assembly language, ACM T PROGR, 21(3), 1999, pp. 527-568
Risultati:
1-7
|