Author of the publication

The Objective Caml system release 3.09; Documentation and user's manual

, , , and . Institut National de Recherche en Informatique et en Automatique, Rocquencourt, Paris, (October 2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Objective Caml system release 3.09; Documentation and user's manual, , , and . Institut National de Recherche en Informatique et en Automatique, Rocquencourt, Paris, (October 2005)Hashconsing in an incrementally garbage-collected system: a story of weak pointers and hashconsing in ocaml 3.10.2., and . ML, page 13-22. ACM, (2008)Avoiding Security Pitfalls with Functional Programming: A Report on the Development of a Secure XML Validator., , , and . ICSE (2), page 209-218. IEEE Computer Society, (2015)ISBN 978-1-4799-1934-5 (Vol. I + II ???).The Objective Caml system, Documentation and user's manual, , , , and . (2003)urlhttp://caml.inria.fr/ocaml/htmlman.Zenon : An Extensible Automated Theorem Prover Producing Checkable Proofs., , and . LPAR, volume 4790 of Lecture Notes in Computer Science, page 151-165. Springer, (2007)Conception, réalisation et certification d'un glaneur de cellules concurrent. (Design, implementation and certification of a concurrent garbage collector).. Paris Diderot University, France, (1995)A foundation for flow-based program matching: using temporal logic and model checking., , , , and . POPL, page 114-126. ACM, (2009)Portable, Unobtrusive Garbage Collection for Multiprocessor Systems., and . POPL, page 70-83. ACM Press, (1994)The TLA<sup> + </sup> Proof System: Building a Heterogeneous Verification Platform, , , and . Theoretical Aspects of Computing – ICTAC 2010, volume 6255 of Lecture Notes in Computer Science, Springer Berlin / Heidelberg, 10.1007/978-3-642-14808-8_3.(2010)Experience in using a typed functional language for the development of a security application., , , and . F-IDE, volume 149 of EPTCS, page 58-63. (2014)