Linear Types for Aliased Resources (Extended Version)

نویسنده

  • Chris Hawblitzel
چکیده

Type systems that track aliasing can verify state-dependent program properties. For example, such systems can verify that a program does not access a resource after deallocating the resource. The simplest way to track aliasing is to use linear types, which on the surface appear to ban the aliasing of linear resources entirely. Since banning aliasing is considered too draconian for many practical programs, researchers have proposed type systems that allow limited forms of aliasing, without losing total control over state-dependent properties. This paper describes how to encode one such system, the capability calculus, using a type system based on plain linear types with no special support for aliasing. Given well-typed capability calculus source programs, the encodings produce well-typed target programs based on linear types. These encodings demonstrate that, contrary to common expectations, linear type systems can express aliasing of linear resources.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Extended shadow maps

The most popular methods for interactive hard shadows rendering are shadow volumes and shadow maps. Shadow volumes generate precise shadows but require high fill rate. Due to excessive fill rate requirements, shadow maps are probably the most widely used means for generation of shadows, despite their well known aliasing problems. In this paper, Extended Shadow Maps are introduced, as a means to...

متن کامل

Bayesian Inference of Log-linear Version of the Bradley-Terry Model for Paired Comparisons Using Uninformative Prior

Bayesian analysis of log-linear version of the Bradley-Terry[3] model is performed in this paper considering generalization of Dittrich et al.,[6]; Dittrich et al.,[7] and the Dittrich et al.,[8] to modify and re-estimate the model parameters to overcome a small deficiency in the estimation of a single log odd parameter being aliased. To ensure ranking is maintained, we computed the posterior p...

متن کامل

Simple and Flexible Stack Types

Typed intermediate languages and typed assembly languages for optimizing compilers require types to describe stack-allocated data. Previous type systems for stack data were either undecidable or did not treat arguments passed by reference. This paper presents a simple, sound, decidable type system expressive enough to support the Micro-CLI source language, including by-reference arguments. This...

متن کامل

Extending TALplanner with Concurrency and Resources

We present TALplanner, a forward-chaining planner based on the use of domain-dependent search control knowledge represented as temporal formulas in the Temporal Action Logic (TAL). TAL is a narrative based linear metric time logic used for reasoning about action and change in incompletely specified dynamic environments. TAL is used as the formal semantic basis for TALplanner, where a TAL goal n...

متن کامل

Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)

One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005