{"id":"https://openalex.org/W2295150383","doi":"https://doi.org/10.1145/1111037.1111071","title":"Harmless advice","display_name":"Harmless advice","publication_year":2006,"publication_date":"2006-01-11","ids":{"openalex":"https://openalex.org/W2295150383","doi":"https://doi.org/10.1145/1111037.1111071","mag":"2295150383"},"language":"en","primary_location":{"id":"doi:10.1145/1111037.1111071","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1111037.1111071","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Conference record of the 33rd ACM SIGPLAN-SIGACT symposium on Principles of programming languages","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079756402","display_name":"Daniel S. Dantas","orcid":null},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Daniel S. Dantas","raw_affiliation_strings":["Princeton University"],"affiliations":[{"raw_affiliation_string":"Princeton University","institution_ids":["https://openalex.org/I20089843"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049454219","display_name":"David Walker","orcid":"https://orcid.org/0000-0003-3681-149X"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"David Walker","raw_affiliation_strings":["Princeton University"],"affiliations":[{"raw_affiliation_string":"Princeton University","institution_ids":["https://openalex.org/I20089843"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5079756402"],"corresponding_institution_ids":["https://openalex.org/I20089843"],"apc_list":null,"apc_paid":null,"fwci":27.9124,"has_fulltext":false,"cited_by_count":133,"citation_normalized_percentile":{"value":0.99697302,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"383","last_page":"396"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9886000156402588,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/advice","display_name":"Advice (programming)","score":0.9517128467559814},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.87425297498703},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7614508271217346},{"id":"https://openalex.org/keywords/control-flow","display_name":"Control flow","score":0.5757412910461426},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.5496793389320374},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4550155699253082},{"id":"https://openalex.org/keywords/object","display_name":"Object (grammar)","score":0.4326101541519165},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.42309486865997314},{"id":"https://openalex.org/keywords/property","display_name":"Property (philosophy)","score":0.41408833861351013},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37602171301841736},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3622041642665863},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.15229997038841248}],"concepts":[{"id":"https://openalex.org/C2779955035","wikidata":"https://www.wikidata.org/wiki/Q4686785","display_name":"Advice (programming)","level":2,"score":0.9517128467559814},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.87425297498703},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7614508271217346},{"id":"https://openalex.org/C160191386","wikidata":"https://www.wikidata.org/wiki/Q868299","display_name":"Control flow","level":2,"score":0.5757412910461426},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.5496793389320374},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4550155699253082},{"id":"https://openalex.org/C2781238097","wikidata":"https://www.wikidata.org/wiki/Q175026","display_name":"Object (grammar)","level":2,"score":0.4326101541519165},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.42309486865997314},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.41408833861351013},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37602171301841736},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3622041642665863},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.15229997038841248},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1111037.1111071","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1111037.1111071","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Conference record of the 33rd ACM SIGPLAN-SIGACT symposium on Principles of programming languages","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7900000214576721}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W39612086","https://openalex.org/W126340784","https://openalex.org/W131747578","https://openalex.org/W193724929","https://openalex.org/W205574843","https://openalex.org/W1493941137","https://openalex.org/W1494264673","https://openalex.org/W1500601312","https://openalex.org/W1533525390","https://openalex.org/W1552618981","https://openalex.org/W1597824249","https://openalex.org/W1610570299","https://openalex.org/W1851327982","https://openalex.org/W1855341394","https://openalex.org/W1965418329","https://openalex.org/W2023499869","https://openalex.org/W2052856457","https://openalex.org/W2061056245","https://openalex.org/W2075867419","https://openalex.org/W2093186740","https://openalex.org/W2095355321","https://openalex.org/W2116244845","https://openalex.org/W2117153488","https://openalex.org/W2122049982","https://openalex.org/W2124476310","https://openalex.org/W2127491409","https://openalex.org/W2137689716","https://openalex.org/W2141704790","https://openalex.org/W2141988808","https://openalex.org/W2149612550","https://openalex.org/W2154677029","https://openalex.org/W2157405063","https://openalex.org/W2158126684","https://openalex.org/W2160614176","https://openalex.org/W2164067955","https://openalex.org/W2522196895","https://openalex.org/W4240166417","https://openalex.org/W4285719527","https://openalex.org/W4353004773","https://openalex.org/W4386985741","https://openalex.org/W6636083506"],"related_works":["https://openalex.org/W1667647204","https://openalex.org/W2404647514","https://openalex.org/W4247536566","https://openalex.org/W2018477250","https://openalex.org/W3119814709","https://openalex.org/W4241418540","https://openalex.org/W1508895727","https://openalex.org/W2725786787","https://openalex.org/W4393601209","https://openalex.org/W1524101012"],"abstract_inverted_index":{"This":[0],"paper":[1,139,169],"defines":[2,140],"an":[3,172],"object-oriented":[4],"language":[5,176],"with":[6,164],"harmless":[7,13,35,73,89,109,159,182],"aspect-oriented":[8,21,117],"advice.":[9],"A":[10],"piece":[11],"of":[12,52,66,72,98,108,174],"advice":[14,36,46,74,90,110,160,183],"is":[15,37,75,156],"a":[16,27,41,141,178],"computation":[17],"that,":[18],"like":[19],"ordinary":[20,33],"advice,":[22,34],"executes":[23],"when":[24,91],"control":[25],"reaches":[26],"designated":[28],"control-flow":[29],"point.":[30],"However,":[31],"unlike":[32],"designed":[38],"to":[39,111,133,148,184],"obey":[40],"weak":[42],"non-interference":[43],"property.":[44],"Harmless":[45],"may":[47,87,104],"change":[48],"the":[49,63,67,94,129,138,165,175],"termination":[50],"behavior":[51],"computations":[53],"and":[54,135,144,177],"use":[55],"I/O,":[56],"but":[57],"it":[58,77],"does":[59,161],"not":[60,162],"otherwise":[61],"influence":[62],"final":[64],"result":[65,155],"mainline":[68,130,166],"code.":[69],"The":[70,152,168],"benefit":[71],"that":[76,157],"facilitates":[78],"local":[79],"reasoning":[80,92],"about":[81,93],"program":[82],"behavior.":[83],"More":[84],"specifically,":[85],"programmers":[86,103],"ignore":[88],"partial":[95],"correctness":[96],"properties":[97],"their":[99],"programs.":[100],"In":[101],"addition,":[102],"add":[105],"new":[106],"pieces":[107],"pre-existing":[112],"programs":[113],"in":[114],"typical":[115],"\"after-the-fact\"":[116],"style":[118],"without":[119],"fear":[120],"they":[121],"will":[122],"break":[123],"important":[124],"data":[125],"invariants":[126],"used":[127],"by":[128],"code.In":[131],"order":[132],"detect":[134],"enforce":[136],"harmlessness,":[137],"novel":[142],"type":[143,150],"effect":[145],"system":[146],"related":[147],"information-flow":[149],"systems.":[151],"central":[153],"technical":[154],"well-typed":[158],"interfere":[163],"computation.":[167],"also":[170],"presents":[171],"implementation":[173],"case":[179],"study":[180],"using":[181],"implement":[185],"security":[186],"policies.":[187]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":7},{"year":2013,"cited_by_count":8},{"year":2012,"cited_by_count":10}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2016-06-24T00:00:00"}
