default search action
John Tang Boyland
Person information
- affiliation: University of Wisconsin-Milwaukee, USA
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c39]John Tang Boyland:
Evolution of SASyLF 2008-2021. ThEdu@CADE 2021: 87-107
2010 – 2019
- 2015
- [c38]Jeremy G. Siek, Michael M. Vitousek, Matteo Cimini, John Tang Boyland:
Refined Criteria for Gradual Typing. SNAPL 2015: 274-293 - [e3]John Tang Boyland:
29th European Conference on Object-Oriented Programming, ECOOP 2015, July 5-10, 2015, Prague, Czech Republic. LIPIcs 37, Schloss Dagstuhl - Leibniz-Zentrum für Informatik 2015, ISBN 978-3-939897-86-6 [contents] - 2014
- [c37]John Tang Boyland, Peter Müller, Malte Schwerhoff, Alexander J. Summers:
Constraint Semantics for Abstract Read Permissions. FTfJP@ECOOP 2014: 2:1-2:6 - 2013
- [p1]John Boyland:
Fractional Permissions. Aliasing in Object-Oriented Programming 2013: 270-288 - 2012
- [c36]Yang Zhao, Lingnan Song, Gongxuan Zhang, John Boyland:
Permission Assurance for Semantic Aspects of Design Patterns. APSEC 2012: 559-564 - [c35]Jeremy G. Siek, Jonathan Aldrich, John Tang Boyland:
19th international workshop on foundations of object-oriented languages (FOOL'12). SPLASH 2012: 233-234 - 2010
- [j9]Adrian Johnstone, Anthony Sloane, John Tang Boyland:
Preface. Sci. Comput. Program. 75(1-2): 1-2 (2010) - [j8]John Tang Boyland, Giuseppe Castagna:
Preface. Theor. Comput. Sci. 411(51-52): 4357 (2010) - [j7]John Tang Boyland:
Semantics of fractional permissions with nesting. ACM Trans. Program. Lang. Syst. 32(6): 22:1-22:33 (2010) - [c34]John Tang Boyland:
Generating Bijections between HOAS and the Natural Numbers. LFMTP 2010: 21-35
2000 – 2009
- 2009
- [j6]John Boyland:
An Operational Semantics including "Volatile" for Safe Concurrency. J. Object Technol. 8(4): 33-51 (2009) - [c33]Yang Zhao, John Boyland:
Assuring Lock Usage in Multithreaded Programs with Fractional Permissions. Australian Software Engineering Conference 2009: 277-286 - [c32]Mohamed ElBendary, John Boyland:
Enhancing base-code protection in aspect-oriented programs. FOAL 2009: 19-24 - [c31]John Boyland, Daniel Spiewak:
TOOL PAPER: ScalaBison Recursive Ascent-Descent Parser Generator. LDTA 2009: 65-74 - 2008
- [c30]Yang Zhao, John Boyland:
A Fundamental Permission Interpretation for Ownership Types. TASE 2008: 65-72 - 2007
- [j5]Görel Hedin, John Tang Boyland:
Preface. Sci. Comput. Program. 68(2): 63 (2007) - [c29]John Boyland, Dave Clarke, Gary T. Leavens, Francesco Logozzo, Arnd Poetzsch-Heffter:
Formal Techniques for Java-Like Programs. ECOOP Workshops 2007: 99-107 - 2006
- [j4]John Boyland:
Why we should not add readonly to Java (yet). J. Object Technol. 5(5): 5-29 (2006) - [c28]John Boyland, Anthony Sloane:
Preface. LDTA@ETAPS 2006: 1-2 - [e2]John Boyland, Anthony Sloane:
Proceedings of the Sixth Workshop on Language Descriptions, Tools, and Applications, LDTA@ETAPS 2006, Vienna, Austria, April 1, 2006. Electronic Notes in Theoretical Computer Science 164(2), Elsevier 2006 [contents] - 2005
- [j3]John Tang Boyland:
Remote attribute grammars. J. ACM 52(4): 627-687 (2005) - [c27]Tian Zhao, John Tang Boyland:
Type Annotations to Improve Stack-Based Access Control. CSFW 2005: 197-210 - [c26]Tien Nhut Nguyen, Ethan V. Munson, John Tang Boyland, Cheng Thao:
Configuration Management for Designs of Software Systems. ECBS 2005: 236-243 - [c25]Tien Nhut Nguyen, Ethan V. Munson, John Tang Boyland, Cheng Thao:
Multi-level Configuration Management with Fine-grained Logical Units. EUROMICRO-SEAA 2005: 248-257 - [c24]Tien Nhut Nguyen, Ethan V. Munson, John Tang Boyland, Cheng Thao:
An infrastructure for development of object-oriented, multi-level configuration management services. ICSE 2005: 215-224 - [c23]Tien Nhut Nguyen, Ethan V. Munson, John Tang Boyland, Cheng Thao:
Structure-oriented Product Versioning. ITCC (2) 2005: 456-461 - [c22]John Tang Boyland, William Retert:
Connecting effects and uniqueness with adoption. POPL 2005: 283-295 - [c21]John Tang Boyland, Görel Hedin:
Preface. LDTA@ETAPS 2005: 1-3 - [e1]John Boyland, Görel Hedin:
Proceedings of the Fifth Workshop on Language Descriptions, Tools, and Applications, LDTA@ETAPS 2005, Edinburgh, UK, April 3, 2005. Electronic Notes in Theoretical Computer Science 141(4), Elsevier 2005 [contents] - 2004
- [c20]Tien Nhut Nguyen, Ethan V. Munson, John Boyland, Cheng Thao:
Flexible Fine-grained Version Control for Software Documents. APSEC 2004: 212-219 - [c19]Tien Nhut Nguyen, Ethan V. Munson, John Boyland:
The Molhado hypertext versioning system. Hypertext 2004: 185-194 - [c18]Tien Nhut Nguyen, Ethan V. Munson, John Boyland, Cheng Thao:
Architectural Software Configuration Management in Molhado. ICSM 2004: 296-305 - [c17]Tien Nhut Nguyen, Ethan V. Munson, John Boyland, Cheng Thao:
Molhado: Object-Oriented Architectural Software Configuration Management. ICSM 2004: 510 - [c16]Tien Nhut Nguyen, Ethan V. Munson, John Boyland:
Object-oriented, structural software configuration management. OOPSLA Companion 2004: 35-36 - 2003
- [c15]Tien Nhut Nguyen, Ethan V. Munson, John Boyland:
Configuration management in a hypermedia-based software development environment. Hypertext 2003: 194-195 - [c14]John Boyland:
Checking Interference with Fractional Permissions. SAS 2003: 55-72 - 2002
- [c13]John Boyland:
Incremental Evaluators for Remote Attribute Grammars. LDTA@ETAPS 2002: 9-29 - 2001
- [j2]John Boyland:
Alias burying: Unique variables without destructive reads. Softw. Pract. Exp. 31(6): 533-553 (2001) - [c12]John Boyland, James Noble, William Retert:
Capabilities for Sharing: A Generalisation of Uniqueness and Read-Only. ECOOP 2001: 2-27
1990 – 1999
- 1999
- [c11]Aaron Greenhouse, John Boyland:
An Object-Oriented Effects System. ECOOP 1999: 205-229 - [c10]John Boyland, Aaron Greenhouse:
MayEqual: A New Alias Question. ECOOP Workshops 1999: 141-143 - [c9]John Boyland:
Alias Killing: Unique Variables without Destructive Reads. ECOOP Workshops 1999: 148-149 - 1998
- [c8]John Boyland:
Analyzing Direct Non-local Dependencies in Attribute Grammars. CC 1998: 31-49 - [c7]Edwin C. Chan, John Boyland, William L. Scherlis:
Promises: Limited Specifications for Analysis and Manipulation. ICSE 1998: 167-176 - 1997
- [c6]Manuel Fähndrich, John Boyland:
Statically Checkable Pattern Abstractions. ICFP 1997: 75-84 - [c5]John Boyland, Giuseppe Castagna:
Parasitic Methods: An Implementation of Multi-Methods for Java. OOPSLA 1997: 66-76 - 1996
- [j1]John Boyland:
Conditional Attribute Grammars. ACM Trans. Program. Lang. Syst. 18(1): 73-108 (1996) - [c4]John Boyland, Giuseppe Castagna:
Type-Safe Compilation of Covariant Specialization: A Practical Case. ECOOP 1996: 3-25 - 1994
- [c3]John Boyland, Susan L. Graham:
Composing Tree Attributions. POPL 1994: 375-388 - 1991
- [c2]Christopher W. Fraser, John Boyland, Helmut Emmelmann:
Discussion: Code Generator Specification Techniques. Code Generation 1991: 66-69 - [c1]John Boyland, Charles Farnum, Susan L. Graham:
Attributed Transformational Code Generation for Dynamic Compilers. Code Generation 1991: 227-254
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-09 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint