skip to main content
department
Free Access

Linear logic

Published:01 October 2010Publication History
Skip Abstract Section

Abstract

A novel approach to computational logic is reaching maturity, opening up opening up new vistas in programming languages, proof nets, and security applications.

References

  1. Abramsky, S., Jagadeesan, R., and Malacaria, P. Full abstraction for PCF (extended abstract). Lecture Notes in Computer Science 789, Proceedings of Conference on Theoretical Aspects of Computer Software, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Bowers, K.D., Bauer, L., Garg, D., Pfenning, F., and Reiter, M.K. Consumable credentials in logic-based access-control systems. Proceedings of the 14th Annual Network and Distributed System Security Symposium, San Diego, CA, Feb. 28-March 2, 2007.Google ScholarGoogle Scholar
  3. Girard, J.-Y. Linear logic. Theoretical Computer Science 50, 1, 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Lincoln, P., Mitchell, J., Scedrov, A., and Shankar, N. Decision problems for propositional linear logic. Proceedings of the 31st Annual Symposium on Foundations of Computer Science, St. Louis, MO, Oct. 22-24, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Miller, D. An overview of linear logic programming. Linear Logic in Computer Science, Ehrhard, T., Girard, J.-Y., Ruet, P., and Scott, P. (Eds.), Cambridge University Press, London, U.K. 2004.Google ScholarGoogle Scholar

Index Terms

  1. Linear logic

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image Communications of the ACM
              Communications of the ACM  Volume 53, Issue 10
              October 2010
              96 pages
              ISSN:0001-0782
              EISSN:1557-7317
              DOI:10.1145/1831407
              Issue’s Table of Contents

              Copyright © 2010 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 October 2010

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • department
              • Popular
              • Un-reviewed
            • Article Metrics

              • Downloads (Last 12 months)82
              • Downloads (Last 6 weeks)36

              Other Metrics

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format .

            View HTML Format