Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,398,554 papers from all fields of science
Search
Sign In
Create Free Account
Strong and weak typing
Known as:
Strictly typed
, Strong typing
, Strongly-typed (programming language)
Expand
In computer programming, programming languages are often colloquially classified as strongly typed or weakly typed (loosely typed). These terms do…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
48 relations
ABAP/4
Ada
Adobe Animate
Aliasing (computing)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2007
Review
2007
A Review of Software Upgrade Techniques for Distributed Systems
Sameer Ajmani
2007
Corpus ID: 6241187
This document reviews work on software upgrades in distributed systems. The main text describes the work in various sub-areas…
Expand
2007
2007
Recovering Data Models via Guarded Dependences
Raghavan Komondoor
,
Ganesan Ramalingam
Working Conference on Reverse Engineering
2007
Corpus ID: 863860
This paper presents an algorithm for reverse engineering semantically sound object-oriented data models from programs written in…
Expand
2005
2005
Using symbolic execution to guide test generation
Gareth Lee
,
John Morris
,
Kris Parker
,
G. Bundell
,
C. Lam
Software testing, verification & reliability
2005
Corpus ID: 14803486
Although a number of weaknesses of symbolic execution, when used for software testing, have been highlighted in the literature…
Expand
2004
2004
Architecture for a Next-Generation GCC
Christopher Arthur Lattner
,
Vikram S. Adve
2004
Corpus ID: 17391679
This paper presents a design and implementation of a whole-program interprocedural optimizer built in the GCC framework. Through…
Expand
2002
2002
RTML: A Role-based Trust-management Markup Language
Ninghui Li
,
John C. Mitchell
,
Yuane Qiu
2002
Corpus ID: 6156800
RT is a framework for Role-based Trust Management [20]. In comparison with systems like SPKI/SDSI and KeyNote, the advantages of…
Expand
Highly Cited
2001
Highly Cited
2001
Fault-tolerant, Scalable, Wide-Area Internet Service Composition
Z. Morley Mao
,
E. Brewer
,
R. Katz
2001
Corpus ID: 14292192
As the Internet rapidly evolves, a growing number of Web services begins to emerge, and the demand for accessing them through…
Expand
Highly Cited
2001
Highly Cited
2001
Development of volcanic passive margins: Two‐dimensional laboratory models
J. Callot
,
C. Grigné
,
L. Geoffroy
,
J. Brun
2001
Corpus ID: 53692807
Volcanic margins are inferred to develop during lithosphere extension above mantle plumes. Continental breakup is characterized…
Expand
1996
1996
Using Metaobjects to Model Concurrent Objects with PICT
M. Lumpe
,
Jean-Guy Schneider
,
Oscar Nierstrasz
Langages et Modèles à Objets
1996
Corpus ID: 6876838
We seek to support the development of open, distributed applications from plug-compatible software abstractions. In order to…
Expand
Highly Cited
1995
Highly Cited
1995
Specifying Open GIS with Functional Languages
A. Frank
,
W. Kuhn
International Multi-Conference on Systems…
1995
Corpus ID: 14298570
The concept of Open GIS depends on precise definitions of data, operations and interfaces. This paper argues for the use of…
Expand
1983
1983
Mechanisms for compile-time enforcement of security
R. Strom
ACM-SIGACT Symposium on Principles of Programming…
1983
Corpus ID: 6630704
This paper discusses features of a secure systems programming language designed and implemented at IBM's Watson Research Lab. Two…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE