Linear Types for Aliased Resources (Extended Version)
نویسنده
چکیده
Type systems that track aliasing can verify state-dependent program properties. For example, such systems can verify that a program does not access a resource after deallocating the resource. The simplest way to track aliasing is to use linear types, which on the surface appear to ban the aliasing of linear resources entirely. Since banning aliasing is considered too draconian for many practical programs, researchers have proposed type systems that allow limited forms of aliasing, without losing total control over state-dependent properties. This paper describes how to encode one such system, the capability calculus, using a type system based on plain linear types with no special support for aliasing. Given well-typed capability calculus source programs, the encodings produce well-typed target programs based on linear types. These encodings demonstrate that, contrary to common expectations, linear type systems can express aliasing of linear resources.
منابع مشابه
Extended shadow maps
The most popular methods for interactive hard shadows rendering are shadow volumes and shadow maps. Shadow volumes generate precise shadows but require high fill rate. Due to excessive fill rate requirements, shadow maps are probably the most widely used means for generation of shadows, despite their well known aliasing problems. In this paper, Extended Shadow Maps are introduced, as a means to...
متن کاملBayesian Inference of Log-linear Version of the Bradley-Terry Model for Paired Comparisons Using Uninformative Prior
Bayesian analysis of log-linear version of the Bradley-Terry[3] model is performed in this paper considering generalization of Dittrich et al.,[6]; Dittrich et al.,[7] and the Dittrich et al.,[8] to modify and re-estimate the model parameters to overcome a small deficiency in the estimation of a single log odd parameter being aliased. To ensure ranking is maintained, we computed the posterior p...
متن کاملSimple and Flexible Stack Types
Typed intermediate languages and typed assembly languages for optimizing compilers require types to describe stack-allocated data. Previous type systems for stack data were either undecidable or did not treat arguments passed by reference. This paper presents a simple, sound, decidable type system expressive enough to support the Micro-CLI source language, including by-reference arguments. This...
متن کاملExtending TALplanner with Concurrency and Resources
We present TALplanner, a forward-chaining planner based on the use of domain-dependent search control knowledge represented as temporal formulas in the Temporal Action Logic (TAL). TAL is a narrative based linear metric time logic used for reasoning about action and change in incompletely specified dynamic environments. TAL is used as the formal semantic basis for TALplanner, where a TAL goal n...
متن کاملEnforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)
One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005