Author:
Ricciotti Wilmer,Cheney James
Publisher
Springer International Publishing
Reference28 articles.
1. Abadi, M., Cardelli, L., Curien, P.L., Lévy, J.J.: Explicit substitutions. J. Funct. Program. 1(4), 375–416 (1991).
https://doi.org/10.1017/s0956796800000186
2. Abadi, M., Fournet, C.: Access control based on execution history. In: Proceedings of Network and Distributed System Security Symposium, NDSS 2003, San Diego, CA. The Internet Society (2003)
http://www.isoc.org/isoc/conferences/ndss/03/proceedings/papers/7.pdf
3. Accattoli, B., Barenbaum, P., Mazza, D.: Distilling abstract machines. In: Proceedings of 19th ACM SIGPLAN Conference on Functional Programming, ICFP 2014, Gothenburg, September 2014, pp. 363–376. ACM Press, New York (2014).
https://doi.org/10.1145/2628136.2628154
4. Accattoli, B., Bonelli, E., Kesner, D., Lombardi, C.: A nonstandard standardization theorem. In: Proceedings of 41st Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2014, San Diego, CA, January 2014, pp. 659–670. ACM Press, New York (2014).
https://doi.org/10.1145/2535838.2535886
5. Lecture Notes in Computer Science;B Accattoli,2010