This list will be revised from time to time.
Table of Contents
Security & Privacy
- Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control
- (Mark S. Miller, 2006)
Miller’s dissertation discusses object-capability security in the context of the distributed language E.
- A Theory of Information-Flow Labels
- (Montagu, Pierce, Pollack, and Surée, 2012)
Montagu et al’s work lays out a founding theory capturing most of the work on information flow labels.
- A Decentralized Model for Information Flow Control
- (Andrew C. Myers and Barbara Liskov, 1997)
Myers and Liskov describe a system for statically checking information flow labels in a system with decentralised authority.
- Spectre is Here to Stay: An Analysis of Side-Channels and Speculative Execution
- (Mcilroy, Sevcik, Tebbi, Titzer, and Verwaest, 2019)
Google security researchers’ paper explain why software mitigations aren’t enough to protect against Spectre attacks. The implications on language design are quite huge.
Model & Execution
- An Introduction to Algebraic Effects and Handlers
- (Matija Pretnar, 2015)
A tutorial on algebraic effects, as implemented in Eff. Matija’s thesis is more mathematically rigorous on the theory of effect handlers, but I have not had the time to read it yet.
- Do Be Do Be Do
- (Lindley, McBride, and McLaughlin, 2016)
Frank introduces ideas of inferring and propagating effects through an effect system, and uses one-shot continuations for its effects.
- Yield: Mainstream Delimited Continuations
- (Roshan P. James and Amr Sabry, 2011)
- Predicate Dispatching: A Unified Theory of Dispatch
- (Ernst, Kaplan, and Chambers, 1998)
The paper shows how previous formulations of multi-methods can be generalised into a theory of predicate dispatching, and how this may be implemented efficiently.
- Korz: Simple, Symmetric, Subjective, Context-Oriented Programming
- (Ungar, Ossher, and Kimelman, 2014)
Korz proposes a model based entirely on multi-methods where dispatch is subjective to a notion of context (threaded dynamically through the call stack). Much of the work in Siren and Purr is based on this and the early work in Us. (Note that this isn’t an open access article, sadly)
- Matching Objects With Patterns
- (Emir, Odersky, and Williams, 2006)
Emir et al’s paper introduces the notion of Extractors, which Purr uses as a foundation for pattern matching supporting capability security and user-defined privacy rules.
- Making Reliable Distributed Systems in the Presence of Software Errors
- (Joe Armstrong, 2003)
Erlang’s design around actors and supervisors for reliable distributed systems is a big influence in Purr’s own idea of actors.
- F-ing Modules
- (Rossberg, Russo, and Dreyer, 2010)
Rossberg et al’s work provides an unifying theory for ML-like modules.
- Modules Divided: Interface and Implement
- (David Barbour, 2011 — a blog post)
While not being rigorous or very specific, Barbour’s idea in this article is a huge influence on Purr’s module system.
Contracts & Types
- Contracts for Higher-Order Functions
- (Robert B. Findler and Matthias Felleisen, 2002)
Findler and Felleisen work describes a contract system that assigns correct blame in a language that supports higher-order functions. It provides some of the power of dependent types without the complexities of proofs.
- Glamorous Toolkit
- The idea of “moldable development” is similar to Purr’s idea of lenses.
- Cap’n Proto
- A serialisation and RPC format that supports capability security and is designed with data evolution in mind.
- A functional language with a gradual type system and principled support for live programming.
- A practical Lisp dialect, incorporating many ideas from functional programming and other paradigms in an accessible way.
- A Smalltalk dialect with optional types (and pluggable checkers), capability-secure modules, and focus on live/literate programming.
- Maybe not
- (Rich Hickey, 2018)
Discusses how evolution is important for data, and how constraints make more sense at the use site than the definition site.
- Programming by Sketching
- (Ras Bodik, 2009)
Shows how program synthesis could be used to help programmers design complex algorithms, letting them provide a rough/partial definition and let the compiler fill in the rest.
- Towards “annex”, a Fact Based Dependency System
- (Mark Hibberd, 2014)
The idea of attaching facts (metadata) to entities from anywhere, and using constraints to piece them together is the basis for Purr’s module system and dispatch system.
- Towards Language Support for Distributed Systems
- (Heather Miller, 2018)
A good discussion of the evolution and ideas in distributed languages over the years.
- Security for Humans: Privacy and Coercion Resistant Design
- (Morgan Marquis-Boire, 2015)
Discusses the issues of privacy in software, coercion in the real world, and trade-offs in attacks.
- How Does Code Sound?
- (Felienne Hermans, 2018)
Discusses the issues of reading code and the impact of this in teaching and comprehension, particularly with people who don’t speak English and people who need assistive technologies.
- Confidence, Trust, and Certainty for Collaboration Between Humans and Automated Systems
- (Peter Norvig, 2017)
Discusses the challenges of AI-based systems in how humans can have confidence that they’re going to do what they expect.