skip to main content
research-article
Free access

Ur/Web: a simple model for programming the web

Published: 22 July 2016 Publication History
First page of PDF

References

[1]
Armstrong, J. Erlang -- A survey of the language and its industrial applications. In Proceedings of the Symposium on Industrial Applications of Prolog (INAP96) (1996), 16--18.
[2]
Balat, V. Ocsigen: Typing Web interaction with Objective Caml. In Proceedings of the 2006 Workshop on ML, ML '06 (New York, NY, USA, 2006). ACM, 84--94.
[3]
Balat, V., Vouillon, J., Yakobowski, B. Experience report: Ocsigen, a Web programming framework. In Proceedings of the 14th ACM SIGPLAN International Conference on Functional Programming, ICFP '09 (New York, NY, USA, 2009). ACM, 311--316.
[4]
Cheney, J., Lindley, S., Wadler, P. A practical theory of language-integrated query. In Proceedings of the 18th ACM SIGPLAN International Conference on Functional Programming, ICFP '13 (New York, NY, USA, 2013). ACM, 403--416.
[5]
Chlipala, A. Ur: Statically-typed metaprogramming with type-level record computation. In Proceedings of the 31st ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '10 (New York, NY, USA, 2010). ACM, 122--133.
[6]
Chlipala, A. An optimizing compiler for a purely functional web-application language. In Proceedings of the 20th ACM SIGPLAN International Conference on Functional Programming, ICFP 2015 (New York, NY, USA, 2015). ACM, 10--21.
[7]
Chlipala, A. Ur/Web: A simple model for programming the Web. In Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL '15 (New York, NY, USA, 2015). ACM, 153--165.
[8]
Cooper, E., Lindley, S., Wadler, P., Yallop, J. Links: Web programming without tiers. In Proceedings of the 5th International Conference on Formal Methods for Components and Objects, FMCO'06 (Berlin, Heidelberg, 2007). Springer-Verlag, 266--296.
[9]
Czaplicki, E., Chong, S. Asynchronous functional reactive programming for GUIs. In Proceedings of the 34th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '13 (New York, NY, USA, 2013). ACM, 411--422.
[10]
Krishnamurthi, S., Hopkins, P.W., McCarthy, J., Graunke, P.T., Pettyjohn, G., Felleisen, M. Implementation and use of the PLT Scheme Web Server. Higher Order Symbol. Comput. 20, 4 (2007), 431--460.
[11]
MacQueen, D. Modules for standard ML. In Proceedings of the 1984 ACM Symposium on LISP and Functional Programming, LFP '84 (New York, NY, USA, 1984). ACM, 198--207.
[12]
Meijer, E., Beckman, B., Bierman, G. LINQ: Reconciling objects, relations and XML in the .NET framework. In Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data, SIGMOD '06 (New York, NY, USA, 2006). ACM, 706--706.
[13]
Meyerovich, L.A., Guha, A., Baskin, J., Cooper, G.H., Greenberg, M., Bromfield, A., Krishnamurthi, S. Flapjax: A programming language for Ajax applications. In Proceedings of the 24th ACM SIGPLAN Conference on Object Oriented Programming Systems Languages and Applications, OOPSLA '09 (New York, NY, USA, 2009). ACM, 1--20.
[14]
Peyton Jones, S.L., Wadler, P. Imperative functional programming. In Proceedings of the 20th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL '93 (New York, NY, USA, 1993). ACM, 71--84.
[15]
Reppy, J.H. Concurrent Programming in ML. Cambridge University Press, New York, NY, USA, 1999.
[16]
Serrano, M., Gallesio, E., Loitsch, F. Hop, a language for programming the Web 2.0. In Proceedings of the First Dynamic Languages Symposium, DLS '06 (New York, NY, USA, 2006). ACM.
[17]
Wadler, P., Blott, S. How to make ad-hoc polymorphism less ad hoc. In Proceedings of the 16th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL '89 (New York, NY, USA, 1989). ACM, 60--76.

Cited By

View all
  • (2022)Graphical Password Authentication System for Web and Mobile Applications in JavaScriptCybersecurity Issues, Challenges, and Solutions in the Business World10.4018/978-1-6684-5827-3.ch011(160-185)Online publication date: 14-Oct-2022
  • (2022)Statically identifying XSS using deep learningScience of Computer Programming10.1016/j.scico.2022.102810219:COnline publication date: 1-Jul-2022
  • (2021)Towards Scalable Security of Real-time Applications: A Formally Certified Approach2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA )10.1109/ETFA45728.2021.9613489(01-04)Online publication date: 7-Sep-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 59, Issue 8
August 2016
94 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/2975594
  • Editor:
  • Moshe Y. Vardi
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 July 2016
Published in CACM Volume 59, Issue 8

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Research
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)373
  • Downloads (Last 6 weeks)66
Reflects downloads up to 15 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Graphical Password Authentication System for Web and Mobile Applications in JavaScriptCybersecurity Issues, Challenges, and Solutions in the Business World10.4018/978-1-6684-5827-3.ch011(160-185)Online publication date: 14-Oct-2022
  • (2022)Statically identifying XSS using deep learningScience of Computer Programming10.1016/j.scico.2022.102810219:COnline publication date: 1-Jul-2022
  • (2021)Towards Scalable Security of Real-time Applications: A Formally Certified Approach2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA )10.1109/ETFA45728.2021.9613489(01-04)Online publication date: 7-Sep-2021
  • (2020)Evolution of the WebDSL runtime: reliability engineering of the WebDSL web programming languageCompanion Proceedings of the 4th International Conference on Art, Science, and Engineering of Programming10.1145/3397537.3397553(77-83)Online publication date: 23-Mar-2020
  • (2020)Runtime Protection of Real-time Critical Control Applications against Known ThreatsIEEE Design & Test10.1109/MDAT.2020.300772937:6(88-95)Online publication date: Dec-2020
  • (2019)MoCaDiXProceedings of the ACM on Human-Computer Interaction10.1145/33311593:EICS(1-40)Online publication date: 13-Jun-2019
  • (2018)Designing Safe and Secure Industrial Control Systems: A Tutorial ReviewIEEE Design & Test10.1109/MDAT.2018.281694335:3(73-88)Online publication date: Jun-2018
  • (2018)Safety and Security in Cyber-Physical Systems and Internet-of-Things SystemsProceedings of the IEEE10.1109/JPROC.2017.2781198106:1(9-20)Online publication date: Jan-2018
  • (2018)ARMET: Behavior-Based Secure and Resilient Industrial Control SystemsProceedings of the IEEE10.1109/JPROC.2017.2725642106:1(129-143)Online publication date: Jan-2018
  • (2018)Towards a completely extensible dynamic geometry software with metadataComputer Languages, Systems & Structures10.1016/j.cl.2017.11.00152(1-20)Online publication date: Jun-2018
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Digital Edition

View this article in digital edition.

Digital Edition

Magazine Site

View this article on the magazine site (external)

Magazine Site

Login options

Full Access

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media