RustBelt: Securing the foundations of the Rust programming language

R Jung, JH Jourdan, R Krebbers, D Dreyer�- Proceedings of the ACM on�…, 2017 - dl.acm.org
… We start by presenting the two core notions of lifetimes and full borrows in ğ5.1. We then
continue in ğ5.2, explaining how lifetimes can be compared and intersected. Finally, in ğ5.3, we …

Pr�zi: from package-based to call-based dependency networks

J Hejderup, M Beller, K Triantafyllou…�- Empirical Software�…, 2022 - Springer
… To illustrate this process, we introduce the following scenario: Package A depends on
package B and package C. Both B and C depend on the library serde. Furthermore, B has a class …

A Multi-target, Multi-paradigm DSL Compiler for Algorithmic Graph Processing

…, G Wachsmuth, M Dwars, D Chiadmi�- Proceedings of the 15th�…, 2022 - dl.acm.org
… We introduce the IR with a small example algorithm, before we introduce its syntax in
detail in the remainder of the section. We mainly care about the abstract syntax of the IR, but …