Abstract
The Communications Web site, http://cacm.acm.org, features more than a dozen bloggers in the BLOG@CACM community. In each issue of Communications, we'll publish selected posts or excerpts.
Follow us on Twitter at http://twitter.com/blogCACM
http://cacm.acm.org/blogs/blog-cacm
Void safety, says Bertrand Meyer, relies on type declarations and static analysis.
- Hoare, C.A.R., Null References: The Billion-Dollar Mistake, August 25, 2009, http://bit.ly/2lAhgePGoogle Scholar
- Kogtenkov, A., Void Safety, ETH Zurich Ph.D. thesis, January 2017, http://se.inf.ethz.ch/people/kogtenkov/thesis.pdf.Google Scholar
- Meyer, B., Attached Types and their Application to Three Open Problems of Object-Oriented Programming, in ECOOP 2005 (Proceedings of European Conference on Object-Oriented Programming, Edinburgh, 25--29 July 2005), ed. Andrew Black, Lecture Notes in Computer Science 3586, Springer, 2005, pages 1--32, http://bit.ly/2muJ8Ff Google ScholarDigital Library
- Meyer, B., Kogtenkov, A., and Stapf, E.: Avoid a Void: The Eradication of Null Dereferencing, in Reflections on the Work of C.A.R. Hoare, eds. C. B. Jones, A.W. Roscoe and K.R. Wood, Springer, 2010, pages 189--211, http://bit.ly/2lsNfN0 Google ScholarCross Ref
- Meyer, B., Those Who Say Code Does Not Matter, CACM, April 15, 2014, http://bit.ly/1mNqoutGoogle Scholar
- Void safety documentation at eiffel.org: http://bit.ly/2lsS2xZGoogle Scholar
Index Terms
- Ending null pointer crashes
Recommendations
An Improved Approach for Sarcasm Detection Avoiding Null Tweets
Pattern Recognition and Machine IntelligenceAbstractAmong the plethora of social media, Twitter has emerged as the favorite destination for researchers in recent times. Many researchers are inclined to work on Twitter due to the availability of massive tweets and its unique features like hashtags ...
Rejecting the null hypothesis of apathetic retweeting of us politicians and SPLC-defined hate groups in the 2016 US presidential election
ASONAM '18: Proceedings of the 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and MiningWe characterize the Twitter networks of both major presidential candidates, Donald Trump and Hillary Clinton, with various American hate groups defined by the US Southern Poverty Law Center (SPLC). We further examined the Twitter networks for Bernie ...
Identifying the influential bloggers in a community
WSDM '08: Proceedings of the 2008 International Conference on Web Search and Data MiningBlogging becomes a popular way for a Web user to publish information on the Web. Bloggers write blog posts, share their likes and dislikes, voice their opinions, provide suggestions, report news, and form groups in Blogosphere. Bloggers form their ...
Comments