Abstract is missing.
- Symbolic evaluation graphs and term rewriting: a general methodology for analyzing logic programsJürgen Giesl, Thomas Ströder, Peter Schneider-Kamp, Fabian Emmes, Carsten Fuhs. 1-12 [doi]
- Matrix codeMaarten van Emden. 13-24 [doi]
- Automatic synthesis of specifications for first order curry programsGiovanni Bacci, Marco Comini, Marco Antonio Feliú, Alicia Villanueva. 25-34 [doi]
- Goal-directed execution of answer set programsKyle Marple, Ajay Bansal, Richard Min, Gopal Gupta. 35-44 [doi]
- Layered fixed point logicPiotr Filipiuk, Flemming Nielson, Hanne Riis Nielson. 45-54 [doi]
- A polynomial time λ-calculus with multithreading and side effectsAntoine Madet. 55-66 [doi]
- Modeling datalog fact assertion and retraction in linear logicEdmund Soon Lee Lam, Iliano Cervesato. 67-78 [doi]
- Regular expression sub-matching using partial derivativesMartin Sulzmann, Kenny Zhuo Ming Lu. 79-90 [doi]
- Functional semantics of parsing actions, and left recursion elimination as continuation passingHayo Thielecke. 91-102 [doi]
- Tor: extensible search with hookable disjunctionTom Schrijvers, Markus Triska, Bart Demoen. 103-114 [doi]
- Linear dependent types in a call-by-value scenarioUgo Dal Lago, Barbara Petit. 115-126 [doi]
- Transparent function types: clearing up opacityEnrique Martin-Martin, Juan Rodríguez-Hortalá. 127-138 [doi]
- Session types revisitedOrnela Dardha, Elena Giachino, Davide Sangiorgi. 139-150 [doi]
- Exception handling for copyless messagingSvetlana Jaksic, Luca Padovani. 151-162 [doi]
- From the π-calculus to flat GHCRubén Monjaraz, Julio Mariño. 163-172 [doi]
- Compiling CHR to parallel hardwareAndrea Triossi, Salvatore Orlando, Alessandra Raffaetà, Thom W. Frühwirth. 173-184 [doi]
- Declarative distributed advertisement system for iDTV: an industrial experienceMacías López, Laura M. Castro, David Cabrero. 185-194 [doi]
- Task-oriented programming in a pure functional languageRinus Plasmeijer, Bas Lijnse, Steffen Michels, Peter Achten, Pieter W. M. Koopman. 195-206 [doi]
- A linear concurrent constraint approach for the automatic verification of access permissionsCarlos Olarte, Elaine Pimentel, Camilo Rueda, Néstor Cataño. 207-216 [doi]