Abstract is missing.
- The Lazy Evaluation of Infinitesimal Logic ExpressionsRuchi Agarwal, William W. Wadge. 3-7
- GIPSY - A Platform for the Investigation on Intensional Programming LanguagesJoey Paquet, Aihua Wu. 8-14
- Toward JLucid, Lucid with Embedded Java Functions in the GIPSYPeter Grogono, Serguei A. Mokhov, Joey Paquet. 15-21
- Objective Lucid - First Step in Object-Oriented Intensional Programming in the GIPSYSerguei A. Mokhov, Joey Paquet. 22-28
- A Generic Framework for Migrating Demands in the GIPSY Demand-Driven Execution EngineEmil Vassev, Joey Paquet. 29-35
- General Imperative Compiler Framework within the GIPSYSerguei A. Mokhov, Joey Paquet. 36-42
- Object-Oriented Intensional Programming in the GIPSY: Preliminary InvestigationsAihua Wu, Joey Paquet. 43-47
- Lucx: Lucid Enriched with ContextKaiyu Wan, Vasu S. Alagar, Joey Paquet. 48-56
- Towards Closureless Functional LanguagesMarco T. Morazán. 57-63
- SequenceL - An Overview of a Simple LanguageDaniel E. Cooke, J. Nelson Rushton. 64-70
- Toward Functionality Oriented ProgrammingChengpu Wang. 71-77
- Components of Meta-Programming, Computer Analogies and MetaphorsDavid Dodds. 78-86
- A Characterization of Traces in Java ProgramsBorys J. Bradel, Tarek S. Abdelrahman. 87-93
- Cuckoo: a Language for Implementing Memory- and Thread-safe System ServicesRichard West, Gary T. Wong. 94-100
- Adding States into Object TypesHaitong Xu, Sheng Yu. 101-107
- A Programming System for Peer-to-Peer ComputingWeichang Du, Qian Jia. 108-114
- Improved Passive SplittingKeith D. Cooper, Jason Eckhardt. 115-122
- Null Values in Programming LanguagesChristian Heinlein. 123-129
- Exploiting Syntactic Analysis for Lambda LiftingBarbara Mucha, Marco T. Morazán. 130-136
- An Exceptional Programming LanguageMichael M. J. Zastre, John Aycock. 137
- Towards Program Composing AssistantsZorica Suvajdzin, Miroslav Hajdukovic. 142-150
- Inferring Java Security Policies Through Dynamic SandboxingHajime Inoue. 151-157
- New Programming Language Concepts for ConfidentialityChristian Hummert, Gisela Menger. 158-164
- Exception Handling with Resumption: Design and Implementation in JavaAlexander Gruler, Christian Heinlein. 165-171
- Container Types for Automatic Garbage Collection in Hard Real-Time ComputingKevin M. Cleereman. 172-178
- Garbage Collection With a Large Address Space for Server ApplicationsSergiy Kyrylkov, Darko Stefanovic. 179-186
- Compilation Scheduling for the Java Virtual MachineRobert Chun, Azeem S. Jiva. 187-193
- TUBE - Structure-Orientation in a Prototype-Based Programming EnvironmentPatrick Renner, Axel Rauschmayer. 194-200
- Micky: Methods With Implicit CallsBryan Crawley, Raphael A. Finkel. 201-206
- A Framework for Extensible and Adaptable System SoftwarePaniti Netinant, Tzilla Elrad. 207-213
- A Comparison of Z and UML: Two Case StudiesBing Dong Li, Mansur H. Samadzadeh. 214-222
- Object and Access Evolution in JarrahMark Evered. 223-229
- Component State Mapping for Runtime EvolutionYves Vandewoude, Yolande Berbers. 230-236
- Targeting System Evolution by Explicit Modeling of Control Flows Using UML 2 Activity ChartsStefan Sarstedt, Jens Kohlmeyer, Alexander Raschke, Matthias Schneiderhan. 237-244
- Object Interdependencies, Behaviors, Semantics, and TypesCong-Cong Xing, Boumediene Belkhouche. 245