Report copyright - Phantom Types and Subtyping - Cornell University · (b) Safe operations Fig. 2. Socket operations such as sockets. These are typically accessed via a foreign-function interface and
Please pass captcha verification before submit form