The proceedings contain 277 papers. The topics discussed include: adaptive search for multi-class targets with heterogeneous importance;boosting crowdsourcing with expert labels: local vs. global effects;OptFuse: low-...
ISBN:
(纸本)9781450336543
The proceedings contain 277 papers. The topics discussed include: adaptive search for multi-class targets with heterogeneous importance;boosting crowdsourcing with expert labels: local vs. global effects;OptFuse: low-rank factor estimation by optimal data-driven linear fusion of multiple signal-plus-noise matrices;dissecting uncertainty-based fusion techniques for maritime anomaly detection;distributed sensing for quickest change detection of point radiation sources;a critical assessment of two methods for heterogeneous information fusion;efficient information planning in Gaussian MRFs;Langevin Monte Carlo filtering for target tracking;gradual vs. binary conflicts in Bayesian networks applied to sensor failure detection;improvements in the implementation of log-homotopy based particle flow filters;a new nonlinear state estimator using the fusion of multiple extended Kalman filters;and URREF for veracity assessment in query-based information fusion systems.
The Dependent object Types (DOT) family of calculi has been proposed as a new theoretic foundation for Scala and similar languages, unifying functional programming, objectorientedprogramming and ML-style module syst...
详细信息
ISBN:
(纸本)9783959770354
The Dependent object Types (DOT) family of calculi has been proposed as a new theoretic foundation for Scala and similar languages, unifying functional programming, objectorientedprogramming and ML-style module systems. Following the recent type soundness proof for DOT, the present paper aims to establish stronger metatheoretic properties. The main result is a fully mechanized proof of strong normalization for D
This paper addresses compositional and incremental type checking for object-orientedprogramming languages. Recent work achieved incremental type checking for structurally typed functional languages through co-context...
详细信息
ISBN:
(纸本)9783959770354
This paper addresses compositional and incremental type checking for object-orientedprogramming languages. Recent work achieved incremental type checking for structurally typed functional languages through co-contextual typing rules, a constraint-based formulation that removes any context dependency for expression typings. However, that work does not cover key features of object-oriented languages: Subtype polymorphism, nominal typing, and implementation inheritance. Type checkers encode these features in the form of class tables, an additional form of typing context inhibiting incrementalization. In the present work, we demonstrate that an appropriate co-contextual notion to class tables exists, paving the way to efficient incremental type checkers for object-oriented languages. This yields a novel formulation of Igarashi et al.'s Featherweight Java (FJ) type system, where we replace class tables by the dual concept of class table requirements and class table operations by dual operations on class table requirements. We prove the equivalence of FJ's type system and our co-contextual formulation. Based on our formulation, we implemented an incremental FJ type checker and compared its performance against javac on a number of realistic example programs.
Derived values are values calculated from base values. They can be expressed with views in relational databases, or with expressions in incremental or reactive programming. However, relational views do not provide mul...
详细信息
ISBN:
(纸本)9783959770354
Derived values are values calculated from base values. They can be expressed with views in relational databases, or with expressions in incremental or reactive programming. However, relational views do not provide multiplicity bounds, and incremental and reactive programming require significant boilerplate code in order to encode bidirectional derived values. Moreover, the composition of various strategies for calculating derived values is either disallowed, or not checked for producing derived values which will be consistent with the derived values they depend upon. In this paper we present IceDust2, an extension of the declarative data modeling language IceDust with derived bidirectional relations with multiplicity bounds and support for statically checked composition of calculation strategies. Derived bidirectional relations, multiplicity bounds, and calculation strategies all influence runtime behavior of changes to data, leading to hundreds of possible behavior definitions. IceDust2 uses a product-line based code generator to avoid explicitly defining all possible combinations, making it easier to reason about correctness. The type system allows only sound composition of strategies and guarantees multiplicity bounds. Finally, our case studies validate the usability of IceDust2 in applications.
In recent years, multiple vulnerabilities exploiting the serialisation APIs of various programming languages, including Java, have been discovered. These vulnerabilities can be used to devise injection attacks, exploi...
详细信息
ISBN:
(纸本)9783959770354
In recent years, multiple vulnerabilities exploiting the serialisation APIs of various programming languages, including Java, have been discovered. These vulnerabilities can be used to devise injection attacks, exploiting the presence of dynamic programming language features like reflection or dynamic proxies. In this paper, we investigate a new type of serialisation-related vulnerabilities for Java that exploit the topology of object graphs constructed from classes of the standard library in a way that deserialisation leads to resource exhaustion, facilitating denial of service attacks. We analyse three such vulnerabilities that can be exploited to exhaust stack memory, heap memory and CPU time. We discuss the language and library design features that enable these vulnerabilities, and investigate whether these vulnerabilities can be ported to C#, Java- Script and Ruby. We present two case studies that demonstrate how the vulnerabilities can be used in attacks on two widely used servers, Jenkins deployed on Tomcat and JBoss. Finally, we propose a mitigation strategy based on contract injection.
Which comes first: the object or the class? Language designers enjoy the conceptual simplicity of object-based languages (such as Emerald or Self) while many programmers prefer the pragmatic utility of classical inher...
详细信息
The proceedings contain 27 papers. The topics discussed include: state-sensitive points-to analysis for the dynamic behavior of JavaScript objects;self-inferencing reflection resolution for java;constructing call grap...
ISBN:
(纸本)9783662442012
The proceedings contain 27 papers. The topics discussed include: state-sensitive points-to analysis for the dynamic behavior of JavaScript objects;self-inferencing reflection resolution for java;constructing call graphs of scala programs;finding reference-counting errors in python/C programs with affine analysis;safely composable type-specific languages;graceful dialects;structuring documentation to support state search: a laboratory experiment about protocol programming;reusable concurrent data types;infrastructure-free logging and replay of concurrent execution on multiple cores;sound and complete subtyping between co-inductive types for object-oriented languages;spores: a type-based foundation for closures in the age of concurrency and distribution;rely-guarantee protocols;and stream processing with a spreadsheet.
Derived values are values calculated from base values. They can be expressed in object-oriented languages by means of getters calculating the derived value, and in relational or logic databases by means of (materializ...
详细信息
LJGS is a lightweight Java core calculus with a gradual security type system. The calculus guarantees secure information flow for sequential, class-based, typed object-orientedprogramming with mutable objects and vir...
详细信息
This paper describes QL, a language for querying complex, potentially recursive data structures. QL compiles to Datalog and runs on a standard relational database, yet it provides familiar-looking object-oriented feat...
详细信息
暂无评论