{"created":"2023-05-15T11:59:27.868838+00:00","id":5882,"links":{},"metadata":{"_buckets":{"deposit":"6d7de8f2-0708-44c4-be69-b37e6b6bff7d"},"_deposit":{"created_by":3,"id":"5882","owners":[3],"pid":{"revision_id":0,"type":"depid","value":"5882"},"status":"published"},"_oai":{"id":"oai:kyutech.repo.nii.ac.jp:00005882","sets":["8:24"]},"author_link":["24175","24176","24177","24178"],"control_number":"5882","item_1689815586683":{"attribute_name":"CRID","attribute_value_mlt":[{"subitem_relation_type":"isIdenticalTo","subitem_relation_type_id":{"subitem_relation_type_id_text":"https://cir.nii.ac.jp/crid/1390282763100188800","subitem_relation_type_select":"URI"}}]},"item_21_biblio_info_6":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2019-02-15","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"189","bibliographicPageStart":"177","bibliographicVolumeNumber":"27","bibliographic_titles":[{"bibliographic_title":"Journal of Information Processing","bibliographic_titleLang":"en"}]}]},"item_21_description_4":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"Scheme implementations should be properly tail-recursive and support garbage collection. To reduce the development costs, a Scheme interpreter called JAKLD, which is written in Java, was designed to use execution stacks simply. JAKLD with interchangeable garbage collectors was reimplemented in C. In addition, we have proposed an efficient C-based implementation written in an extended C language called XC-cube, which features language mechanisms for implementing high-level programming languages such as “L-closures” for legitimate execution stack access, with which a running program/process can legitimately access data deeply in execution stacks (C stacks). L-closures are lightweight lexical closures created from nested function definitions. In addition to enhanced C compilers, we have portable implementations of L-closures, which are translators from an extended S-expression based C language into the standard C language. Furthermore, we have another mechanism for legitimate execution stack access, called “closures”. Closures are standard lexical closures created from nested function definitions. Closures can also be implemented using translators. In this study, JAKLD was reimplemented in an extended SC language (S-expression based C language) that features nested functions to evaluate (L-)closures and their implementations, including translators.","subitem_description_language":"en","subitem_description_type":"Abstract"}]},"item_21_link_62":{"attribute_name":"研究者情報","attribute_value_mlt":[{"subitem_link_text":"https://hyokadb02.jimu.kyutech.ac.jp/html/100000440_ja.html","subitem_link_url":"https://hyokadb02.jimu.kyutech.ac.jp/html/100000440_ja.html"}]},"item_21_publisher_7":{"attribute_name":"出版社","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"item_21_relation_12":{"attribute_name":"DOI","attribute_value_mlt":[{"subitem_relation_type":"isIdenticalTo","subitem_relation_type_id":{"subitem_relation_type_id_text":"https://doi.org/10.2197/ipsjjip.27.177","subitem_relation_type_select":"DOI"}}]},"item_21_rights_13":{"attribute_name":"著作権関連情報","attribute_value_mlt":[{"subitem_rights":"Copyright (c) 2019 by the Information Processing Society of Japan"},{"subitem_rights":"ここに掲載した著作物の利用に関する注意 本著作物の著作権は情報処理学会に帰属します。本著作物は著作権者である情報処理学会の許可のもとに掲載するものです。ご利用に当たっては「著作権法」ならびに「情報処理学会倫理綱領」に従うことをお願いいたします。 Notice for the use of this material The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). This material is published on this web site with the agreement of the author (s) and the IPSJ. Please be complied with Copyright Law of Japan and the Code of Ethics of the IPSJ if any users wish to reproduce, make derivative work, distribute or make available to the public any part or whole thereof. All Rights Reserved, Copyright (C) Information Processing Society of Japan."}]},"item_21_select_59":{"attribute_name":"査読の有無","attribute_value_mlt":[{"subitem_select_item":"yes"}]},"item_21_source_id_8":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-6652","subitem_source_identifier_type":"EISSN"}]},"item_21_subject_16":{"attribute_name":"日本十進分類法","attribute_value_mlt":[{"subitem_subject":"548","subitem_subject_scheme":"NDC"}]},"item_21_text_28":{"attribute_name":"論文ID(連携)","attribute_value_mlt":[{"subitem_text_value":"10335400"}]},"item_21_text_63":{"attribute_name":"連携ID","attribute_value_mlt":[{"subitem_text_value":"7574"}]},"item_21_version_type_58":{"attribute_name":"出版タイプ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorAffiliations":[{"affiliationNames":[{"affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"Yasugi, Masahiro","creatorNameLang":"en"},{"creatorName":"八杉, 昌宏","creatorNameLang":"ja"},{"creatorName":"ヤスギ, マサヒロ","creatorNameLang":"ja-Kana"}],"familyNames":[{"familyName":"Yasugi","familyNameLang":"en"},{"familyName":"八杉","familyNameLang":"ja"},{"familyName":"ヤスギ","familyNameLang":"ja-Kana"}],"givenNames":[{"givenName":"Masahiro","givenNameLang":"en"},{"givenName":"昌宏","givenNameLang":"ja"},{"givenName":"マサヒロ","givenNameLang":"ja-Kana"}],"nameIdentifiers":[{"nameIdentifier":"24175","nameIdentifierScheme":"WEKO"},{"nameIdentifier":"30273759","nameIdentifierScheme":"e-Rad","nameIdentifierURI":"https://nrid.nii.ac.jp/ja/nrid/1000030273759"},{"nameIdentifier":"8842955000","nameIdentifierScheme":"Scopus著者ID","nameIdentifierURI":"https://www.scopus.com/authid/detail.uri?authorId=8842955000"},{"nameIdentifier":"0000-0001-5381-7418","nameIdentifierScheme":"ORCiD","nameIdentifierURI":"https://orcid.org/0000-0001-5381-7418"},{"nameIdentifier":"100000440","nameIdentifierScheme":"九工大研究者情報","nameIdentifierURI":"https://hyokadb02.jimu.kyutech.ac.jp/html/100000440_ja.html"}]},{"creatorNames":[{"creatorName":"Ikeuchi, Reichi","creatorNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"24176","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"Hiraishi, Tasuku","creatorNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"24177","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"Komiya, Tsuneyasu","creatorNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"24178","nameIdentifierScheme":"WEKO"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2019-03-25"}],"displaytype":"detail","filename":"ipsjjip.27.177.pdf","filesize":[{"value":"2.0 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"ipsjjip.27.177.pdf","url":"https://kyutech.repo.nii.ac.jp/record/5882/files/ipsjjip.27.177.pdf"},"version_id":"ef2c5133-73b3-418c-9d1f-2c20a362cad0"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"interpreters","subitem_subject_scheme":"Other"},{"subitem_subject":"proper tail recursion","subitem_subject_scheme":"Other"},{"subitem_subject":"execution stacks","subitem_subject_scheme":"Other"},{"subitem_subject":"closures","subitem_subject_scheme":"Other"},{"subitem_subject":"transformation","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"Evaluating Portable Mechanisms for Legitimate Execution Stack Access with a Scheme Interpreter in an Extended SC Language","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Evaluating Portable Mechanisms for Legitimate Execution Stack Access with a Scheme Interpreter in an Extended SC Language","subitem_title_language":"en"}]},"item_type_id":"21","owner":"3","path":["24"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2019-03-25"},"publish_date":"2019-03-25","publish_status":"0","recid":"5882","relation_version_is_last":true,"title":["Evaluating Portable Mechanisms for Legitimate Execution Stack Access with a Scheme Interpreter in an Extended SC Language"],"weko_creator_id":"3","weko_shared_id":-1},"updated":"2024-02-20T02:05:13.181208+00:00"}