Kimball Germane

10 posts

Kimball Germane

Kimball Germane

@krgermane

Katılım Mart 2013
260 Takip Edilen35 Takipçiler
Kimball Germane
Kimball Germane@krgermane·
@Ngnghm This essay sounds very interesting. Is any draft available publicly?
English
1
0
1
30
💻🐴Ngnghm
💻🐴Ngnghm@Ngnghm·
I'm wondering whether to butcher my "Lambda The Ultimate Object" essay to submit pieces at ECOOP or other conferences, or to keep it in once piece and try to submit to a Journal, or what.
English
1
0
6
441
Kimball Germane
Kimball Germane@krgermane·
@AndrewCMyers Is the careful thinking devising an abstraction that the memory actually implements and developing a threat model based on it? If so, one reason there may be another attack lurking: the devised abstraction will certainly be oblivious to some classes of behavior.
English
1
0
0
27
Andrew Myers
Andrew Myers@AndrewCMyers·
based on that abstraction. Again, we needed more careful thinking about the threat model and what hardware/software mechanisms justified it. 6/7
English
2
0
13
1.2K
Andrew Myers
Andrew Myers@AndrewCMyers·
Many people are skeptical of the formal approach to computer security because "there will always be more unexpected attacks". This criticism misunderstands how the formal approach represents real adversaries with abstract threat models. There are two parts to the answer. 1/7
English
8
17
73
20.8K
Edward Kmett
Edward Kmett@kmett·
@MarisaVeryMoe @codydroux @ezyang @mattmight Exactly. I keep exploring CEK-like machines rather than big step semantics because it opens the possibility of abstract GC to tighten analyses or any analysis at all.. but @andrasKovacs6-style NbE is just so damn fast I cry whenever I have to run anything in a small-step setting.
English
2
0
6
0
Edward Z. Yang
Edward Z. Yang@ezyang·
Apparently it's way easier to write a staged interpreter than it is to write a compiler pass; functional IRs get their revenge!!!
English
2
1
26
0
Ilya Sergey
Ilya Sergey@ilyasergey·
Looking for a paper that makes an explicit connection between Abstract Abstract Machines and constraint-based CFA (a la PopA textbook). The closest work I know of is Midtgaard's ICFP'09 paper, but that precedes AAM. Any pointers? @JanMidtgaard @lambda_calculus @krismicinski
English
1
3
6
0
Kimball Germane
Kimball Germane@krgermane·
@glaebhoerl @GuannanWei This is how CFA2 does it. I have a blog post draft that does what I describe that I’d be happy to share. Now I’m wondering if you can analyze CPS code using ADI by inserting a continuation monad in the monad stack.
English
1
0
1
0
Kimball Germane
Kimball Germane@krgermane·
@glaebhoerl If your CPS transformation distinguishes the continuation terms it introduced, you can use the @GuannanWei’s technique (related to ADI) to get precise call-return matching for the calls that existed pre-CPS. You can often recover the distinction directly from the IR too.
English
1
0
1
0
Kimball Germane
Kimball Germane@krgermane·
@jeapostrophe You can prevent that by planting your finger while it fetches the new tweets (i.e. immediately). But, yeah, lame change.
English
0
0
1
0
Kimball Germane
Kimball Germane@krgermane·
When one lacks understanding, he can struggle for it or create a blind spot itself to which he becomes blind.
English
0
0
0
0