咨询与建议

限定检索结果

文献类型

  • 250 篇 会议
  • 5 篇 期刊文献

馆藏范围

  • 255 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 210 篇 工学
    • 202 篇 软件工程
    • 92 篇 计算机科学与技术...
    • 7 篇 电气工程
    • 3 篇 控制科学与工程
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
    • 1 篇 生物工程
  • 7 篇 理学
    • 6 篇 数学
    • 1 篇 生物学
  • 5 篇 管理学
    • 4 篇 管理科学与工程(可...
    • 2 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 教育学
    • 2 篇 教育学

主题

  • 49 篇 design
  • 40 篇 languages
  • 22 篇 performance
  • 15 篇 algorithms
  • 14 篇 probabilistic pr...
  • 12 篇 verification
  • 12 篇 functional progr...
  • 11 篇 program synthesi...
  • 10 篇 object oriented ...
  • 10 篇 reliability
  • 10 篇 concurrency
  • 9 篇 experimentation
  • 9 篇 programming lang...
  • 8 篇 type systems
  • 8 篇 domain-specific ...
  • 7 篇 java
  • 6 篇 optimization
  • 6 篇 theory
  • 5 篇 compilers
  • 5 篇 metaprogramming

机构

  • 8 篇 purdue univ w la...
  • 7 篇 carnegie mellon ...
  • 6 篇 harvard univ cam...
  • 5 篇 univ penn philad...
  • 4 篇 univ wisconsin m...
  • 4 篇 princeton univ p...
  • 4 篇 univ calif davis...
  • 4 篇 northeastern uni...
  • 4 篇 cornell univ ith...
  • 4 篇 stanford univ st...
  • 4 篇 univ washington ...
  • 3 篇 microsoft res re...
  • 3 篇 swiss fed inst t...
  • 3 篇 mit cambridge ma...
  • 3 篇 yale univ new ha...
  • 3 篇 rice univ housto...
  • 3 篇 univ calif berke...
  • 3 篇 univ texas austi...
  • 2 篇 microsoft corp r...
  • 2 篇 oracle labs pots...

作者

  • 5 篇 foster nate
  • 5 篇 gulwani sumit
  • 5 篇 walker david
  • 4 篇 dillig isil
  • 3 篇 ahmed amal
  • 3 篇 huang jeff
  • 3 篇 vechev martin
  • 3 篇 shao zhong
  • 3 篇 tobin-hochstadt ...
  • 3 篇 su zhendong
  • 3 篇 chaudhuri swarat
  • 3 篇 felleisen matthi...
  • 3 篇 myers andrew c.
  • 3 篇 zhang xiangyu
  • 3 篇 acar umut a.
  • 3 篇 mansinghka vikas...
  • 2 篇 hirschfeld rober...
  • 2 篇 flatt matthew
  • 2 篇 gupta gagan
  • 2 篇 shull thomas

语言

  • 251 篇 英文
  • 3 篇 其他
  • 1 篇 中文
检索条件"任意字段=Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation"
255 条 记 录,以下是201-210 订阅
排序:
Pluggable AOP - designing aspect mechanisms for third-party composition
Pluggable AOP - Designing aspect mechanisms for third-party ...
收藏 引用
OOPSLA'05 - 20th Annual acm conference on Object-Oriented programming, Systems, languages, and Applications
作者: Kojarski, Sergei Lorenz, David H. Department of Computer Science University of Virginia Charlottesville VA 22904-4740 United States Northeastern University University of Virginia
Studies of Aspect-Oriented programming (AOP) usually focus on a language in which a specific aspect extension is integrated with a base language. languages specified in this manner have a fixed, non-extensible AOP fun... 详细信息
来源: 评论
Session details: Probabilistic programming  14
Session details: Probabilistic programming
收藏 引用
proceedings of the 35th acm sigplan conference on programming language design and implementation
作者: Ben Zorn Microsoft Research
No abstract available.
来源: 评论
Effective Interactive Proofs for Higher-Order Imperative Programs
Effective Interactive Proofs for Higher-Order Imperative Pro...
收藏 引用
14th acm sigplan International conference on Functional programming
作者: Chlipala, Adam Malecha, Gregory Morrisett, Greg Shinnar, Avraham Wisnesky, Ryan Harvard Univ Cambridge MA 02138 USA
We present a new approach for constructing and verifying higher-order, imperative programs using the Coq proof assistant. We build on the past work on the Ynot system, which is based on Hoare Type theory. that origina... 详细信息
来源: 评论
ContextErlang: Introducing context-oriented programming in the actor model  12
ContextErlang: Introducing context-oriented programming in t...
收藏 引用
11th Annual International conference on Aspect Oriented Software Development, AOSD'12
作者: Salvaneschi, Guido Ghezzi, Carlo Pradella, Matteo DEEPSE Group DEI Politecnico di Milano Piazza L. Da Vinci 32 Milano Italy
Self-adapting systems are becoming widespread in emerging fields such as autonomic, mobile and ubiquitous computing. Context-oriented programming (COP) is a promising language-level solution for the implementation of ... 详细信息
来源: 评论
Secure Distributed programming with Value-Dependent Types  11
Secure Distributed Programming with Value-Dependent Types
收藏 引用
16th acm sigplan International conference on Functional programming (ICFP 11)
作者: Swamy, Nikhil Chen, Juan Fournet, Cedric Strub, Pierre-Yves Bhargavan, Karthikeyan Yang, Jean Microsoft Res Redmond WA 98052 USA
Distributed applications are difficult to program reliably and securely. Dependently typed functional languages promise to prevent broad classes of errors and vulnerabilities, and to enable program verification to pro... 详细信息
来源: 评论
the design and implementation of typed scheme
收藏 引用
acm sigplan NOTICES 2008年 第1期43卷 395-406页
作者: Tobin-Hochstadt, Sam Felleisen, Matthias Northeastern Univ PLT Boston MA 02115 USA
When scripts in untyped languages grow into large programs, maintaining them becomes difficult. A lack of types in typical scripting languages means that programmers must (re) discover critical pieces of design inform... 详细信息
来源: 评论
HACCLE: Metaprogramming for Secure Multi-Party Computation  2021
HACCLE: Metaprogramming for Secure Multi-Party Computation
收藏 引用
20th acm sigplan International conference on Generative programming: Concepts and Experiences (GPCE)
作者: Bao, Yuyan Sundararajah, Kirshanthan Malik, Raghav Ye, Qianchuan Wagner, Christopher Jaber, Nouraldin Wang, Fei Ameri, Mohammad Hassan Lu, Donghang Seto, Alexander Delaware, Benjamin Samanta, Roopsha Kate, Aniket Garman, Christina Blocki, Jeremiah Letourneau, Pierre-David Meister, Benoit Springer, Jonathan Rompf, Tiark Kulkarni, Milind Univ Waterloo Waterloo ON Canada Purdue Univ W Lafayette IN 47907 USA Reservoir Labs New York NY USA
Cryptographic techniques have the potential to enable distrusting parties to collaborate in fundamentally new ways, but their practical implementation poses numerous challenges. An important class of such cryptographi... 详细信息
来源: 评论
Compiler-Assisted threshold implementation Against Power Analysis Attacks  35
Compiler-Assisted Threshold Implementation Against Power Ana...
收藏 引用
35th IEEE International conference on Computer design (ICCD)
作者: Luo, Pei Athanasiou, Konstantinos Zhang, Liwei Jiang, Zhen Hang Fei, Yunsi Ding, A. Adam Wahl, thomas Northeastern Univ Dept Elect & Comp Engn Boston MA 02115 USA Northeastern Univ Coll Comp & Informat Sci Boston MA 02115 USA Northeastern Univ Dept Math Boston MA 02115 USA
Side-channel attack utilizes side-channel leakages to extract the secret in crypto systems. Various countermeasures for different algorithms and platforms have been proposed to protect crypto systems against such atta... 详细信息
来源: 评论
ProSE: the Architecture and design of a Protein Discovery Engine  27
ProSE: The Architecture and Design of a Protein Discovery En...
收藏 引用
27th acm International conference on Architectural Support for programming languages and Operating Systems (ASPLOS)
作者: Robson, Eyes Xu, Ceyu Wills, Lisa Wu Univ Calif Berkeley Berkeley CA 94720 USA Duke Univ Durham NC USA
Protein language models have enabled breakthrough approaches to protein structure prediction, function annotation, and drug discovery. A primary limitation to the widespread adoption of these powerful models is the hi... 详细信息
来源: 评论
Idiomatic design
Idiomatic design
收藏 引用
10th Annual conference on Object-Oriented programming Systems, languages, and Applications, OOPSLA 1995
作者: Koenig, Andrew AT and T Bell Laboratories Murray HillNJ07974 United States
Every problem has a context, which can include l community and culture implementation constraints language and system and probably other things too. A good design will take its context into account. If the culture dem... 详细信息
来源: 评论