


default search action
Proceedings of the ACM on Programming Languages, Volume 3
Volume 3, Number POPL, January 2019
- Evan Cavallo

, Robert Harper:
Higher inductive types in cubical computational type theory. 1:1-1:27 - Ambrus Kaposi

, András Kovács
, Thorsten Altenkirch:
Constructing quotient inductive-inductive types. 2:1-2:24 - Gaëtan Gilbert, Jesper Cockx, Matthieu Sozeau, Nicolas Tabareau:

Definitional proof-irrelevance without K. 3:1-3:28 - Rasmus Ejlers Møgelberg

, Niccolò Veltri
:
Bisimulation as path type for guarded recursive types. 4:1-4:29 - Yizhou Zhang

, Andrew C. Myers:
Abstraction-safe effect handlers via tunneling. 5:1-5:29 - Dariusz Biernacki

, Maciej Piróg
, Piotr Polesiuk
, Filip Sieczkowski
:
Abstracting algebraic effects. 6:1-6:28 - Ugo Dal Lago, Marc de Visme, Damiano Mazza

, Akira Yoshimizu:
Intersection types and runtime errors in the pi-calculus. 7:1-7:29 - Andrej Dudenhefner

, Jakob Rehof:
Principality and approximation under dimensional bound. 8:1-8:29 - Jana Dunfield, Neelakantan R. Krishnaswami:

Sound and complete bidirectional typechecking for higher-rank polymorphism with existentials and indexed types. 9:1-9:28 - Karl Crary:

Fully abstract module compilation. 10:1-10:29 - Gyunghee Park, Jaemin Hong

, Guy L. Steele Jr., Sukyoung Ryu:
Polymorphic symmetric multiple dispatch with variance. 11:1-11:28 - J. Garrett Morris

, James McKinna:
Abstracting extensible data types: or, rows by any other name. 12:1-12:28 - Di Wang

, Jan Hoffmann:
Type-guided worst-case input generation. 13:1-13:30 - Cyrus Omar, Ian Voysey

, Ravi Chugh, Matthew A. Hammer:
Live functional programming with typed holes. 14:1-14:32 - Max S. New, Daniel R. Licata, Amal Ahmed

:
Gradual type theory. 15:1-15:31 - Giuseppe Castagna

, Victor Lanvin, Tommaso Petrucciani, Jeremy G. Siek
:
Gradual typing: a new perspective. 16:1-16:32 - Matías Toro

, Elizabeth Labrada, Éric Tanter:
Gradual parametricity, revisited. 17:1-17:30 - Yusuke Miyazaki

, Taro Sekiyama, Atsushi Igarashi
:
Dynamic type inference for gradual Hindley-Milner typing. 18:1-18:29 - Lau Skorstengaard, Dominique Devriese

, Lars Birkedal
:
StkTokens: enforcing well-bracketed control flow and stack encapsulation using linear capabilities. 19:1-19:28 - G. A. Kavvos

:
Modalities, cohesion, and information flow. 20:1-20:29 - Tom Hirschowitz

:
Familial monads and structural operational semantics. 21:1-21:28 - Jasmin Christian Blanchette

, Lorenzo Gheri, Andrei Popescu
, Dmitriy Traytel
:
Bindings as bounded natural functors. 22:1-22:34 - Paul-André Melliès

:
Categorical combinatorics of scheduling and synchronization in game semantics. 23:1-23:30 - Wen Kokke, Fabrizio Montesi

, Marco Peressotti
:
Better late than never: a fully-abstract semantics for classical processes. 24:1-24:29 - Filippo Bonchi, Joshua Holland, Robin Piedeleu, Pawel Sobocinski, Fabio Zanasi

:
Diagrammatic algebra: from linear to concurrent systems. 25:1-25:28 - Paolo Baldan, Barbara König, Christina Mika-Michalski, Tommaso Padoan:

Fixpoint games on continuous lattices. 26:1-26:29 - Simon Castellan, Nobuko Yoshida

:
Two sides of the same coin: session types and game semantics: a synchronous side and an asynchronous side. 27:1-27:29 - Simon Fowler

, Sam Lindley
, J. Garrett Morris
, Sára Decova:
Exceptional asynchronous session types: session types without tiers. 28:1-28:29 - David Castro-Perez, Raymond Hu

, Sung-Shik Jongmans, Nicholas Ng, Nobuko Yoshida
:
Distributed programming using role-parametric session types in go: statically-typed endpoint APIs for dynamically-instantiated communication structures. 29:1-29:30 - Alceste Scalas

, Nobuko Yoshida
:
Less is more: multiparty session types revisited. 30:1-30:29 - Shih-Han Hung, Kesha Hietala

, Shaopeng Zhu, Mingsheng Ying
, Michael Hicks, Xiaodi Wu:
Quantitative robustness analysis of quantum programs. 31:1-31:29 - Pierre Clairambault, Marc de Visme, Glynn Winskel:

Game semantics for quantum programming. 32:1-32:29 - Dominique Unruh:

Quantum relational Hoare logic. 33:1-33:31 - Kevin Batz, Benjamin Lucien Kaminski

, Joost-Pieter Katoen, Christoph Matheja
, Thomas Noll
:
Quantitative separation logic: a logic for reasoning about probabilistic pointer programs. 34:1-34:29 - Maria I. Gorinova, Andrew D. Gordon, Charles Sutton:

Probabilistic programming with densities in SlicStan: efficient, flexible, and deterministic. 35:1-35:30 - Matthijs Vákár

, Ohad Kammar, Sam Staton:
A domain theory for statistical probabilistic programming. 36:1-36:29 - Feras A. Saad

, Marco F. Cusumano-Towner, Ulrich Schaechtle, Martin C. Rinard, Vikash K. Mansinghka:
Bayesian synthesis of probabilistic programs for automatic data modeling. 37:1-37:32 - Tetsuya Sato, Alejandro Aguirre

, Gilles Barthe, Marco Gaboardi
, Deepak Garg, Justin Hsu
:
Formal verification of higher-order probabilistic programs: reasoning about approximation, convergence, Bayesian inference, and optimization. 38:1-38:30 - Calvin Smith, Justin Hsu

, Aws Albarghouthi:
Trace abstraction modulo probability. 39:1-39:31 - Uri Alon

, Meital Zilberstein, Omer Levy, Eran Yahav:
code2vec: learning distributed representations of code. 40:1-40:29 - Gagandeep Singh

, Timon Gehr, Markus Püschel, Martin T. Vechev:
An abstract domain for certifying neural networks. 41:1-41:30 - Patrick Cousot, Roberto Giacobazzi, Francesco Ranzato:

A²I: abstract² interpretation. 42:1-42:31 - John Toman

, Dan Grossman:
Concerto: a framework for combined concrete and abstract interpretation. 43:1-43:29 - Martin Bodin

, Philippa Gardner, Thomas P. Jensen, Alan Schmitt:
Skeletal semantics and their interpretations. 44:1-44:31 - John Cyphert

, Jason Breck, Zachary Kincaid
, Thomas W. Reps:
Refinement of path expressions for static analysis. 45:1-45:29 - Umang Mathur

, P. Madhusudan, Mahesh Viswanathan:
Decidable verification of uninterpreted programs. 46:1-46:29 - Oana Fabiana Andreescu, Thomas P. Jensen, Stéphane Lescuyer, Benoît Montagu

:
Inferring frame conditions with static correlation analysis. 47:1-47:29 - Johannes Späth, Karim Ali, Eric Bodden:

Context-, flow-, and field-sensitive data-flow analysis using synchronized Pushdown systems. 48:1-48:29 - Taolue Chen

, Matthew Hague
, Anthony W. Lin
, Philipp Rümmer, Zhilin Wu:
Decision procedures for path feasibility of string-manipulating programs with complex operations. 49:1-49:30 - Rajeev Alur, Konstantinos Mamouras

, Caleb Stanford
:
Modular quantitative monitoring. 50:1-50:31 - Kyungmin Bae

, Jia Lee:
Bounded model checking of signal temporal logic properties using syntactic separation. 51:1-51:30 - Luca Aceto, Antonis Achilleos, Adrian Francalanza, Anna Ingólfsdóttir, Karoliina Lehtinen

:
Adventures in monitorability: from branching to linear time and back again. 52:1-52:29 - Krishnendu Chatterjee, Amir Kafshdar Goharshady

, Nastaran Okati, Andreas Pavlogiannis
:
Efficient parameterized algorithms for data packing. 53:1-53:28 - Valentin Touzeau, Claire Maïza, David Monniaux

, Jan Reineke:
Fast and exact analysis for LRU caches. 54:1-54:29 - Zachary Kincaid

, Jason Breck, John Cyphert
, Thomas W. Reps:
Closed forms for numerical loops. 55:1-55:29 - Xin Yi

, Liqian Chen, Xiaoguang Mao
, Tao Ji:
Efficient automated repair of high floating-point errors in numerical libraries. 56:1-56:29 - Nikos Gorogiannis, Peter W. O'Hearn, Ilya Sergey

:
A true positives theorem for a static race detector. 57:1-57:29 - Roland Meyer, Sebastian Wolff

:
Decoupling lock-free data structures from memory reclamation for static analysis. 58:1-58:31 - Klaus von Gleissenthall, Rami Gökhan Kici, Alexander Bakst

, Deian Stefan, Ranjit Jhala:
Pretend synchrony: synchronous verification of asynchronous distributed programs. 59:1-59:30 - Michael Emmi, Constantin Enea:

Weak-consistency specification via visibility relaxation. 60:1-60:28 - Spencer P. Florence, Shu-Hung You

, Jesse A. Tov, Robert Bruce Findler:
A calculus for Esterel: if can, can. if no can, no can. 61:1-61:29 - Yuting Wang

, Pierre Wilke, Zhong Shao
:
An abstract stack based approach to verified compositional compilation to machine code. 62:1-62:30 - Aymeric Fromherz, Nick Giannarakis, Chris Hawblitzel, Bryan Parno, Aseem Rastogi, Nikhil Swamy:

A verified, efficient embedding of a verifiable assembly language. 63:1-63:30 - Joseph Tassarotti, Robert Harper:

A separation logic for concurrent randomized programs. 64:1-64:30 - Ales Bizjak, Daniel Gratzer

, Robbert Krebbers, Lars Birkedal
:
Iron: managing obligations in higher-order concurrent separation logic. 65:1-65:30 - José Fragoso Santos

, Petar Maksimovic
, Gabriela Cunha Sampaio
, Philippa Gardner:
JaVerT 2.0: compositional symbolic execution for JavaScript. 66:1-66:31 - Kayvan Memarian

, Victor B. F. Gomes, Brooks Davis, Stephen Kell, Alexander Richardson
, Robert N. M. Watson, Peter Sewell
:
Exploring C semantics and pointer provenance. 67:1-67:32 - Azalea Raad, Marko Doko

, Lovro Rozic, Ori Lahav
, Viktor Vafeiadis
:
On library correctness under weak memory consistency: specifying and verifying concurrent libraries under declarative consistency models. 68:1-68:31 - Anton Podkopaev, Ori Lahav

, Viktor Vafeiadis
:
Bridging the gap between programming languages and hardware weak memory models. 69:1-69:31 - Soham Chakraborty, Viktor Vafeiadis

:
Grounding thin-air reads with event structures. 70:1-70:28 - Alasdair Armstrong, Thomas Bauereiss, Brian Campbell

, Alastair Reid
, Kathryn E. Gray, Robert M. Norton, Prashanth Mundkur, Mark Wassell, Jon French, Christopher Pulte
, Shaked Flur, Ian Stark, Neel Krishnaswami, Peter Sewell
:
ISA semantics for ARMv8-a, RISC-v, and CHERI-MIPS. 71:1-71:31 - Nadia Polikarpova, Ilya Sergey

:
Structuring the synthesis of heap-manipulating programs. 72:1-72:30 - Kensen Shi, Jacob Steinhardt, Percy Liang:

FrAngel: component-based synthesis with control structures. 73:1-73:29 - Farzin Houshmand, Mohsen Lesani:

Hamsaz: replication coordination analysis and synthesis. 74:1-74:32 - James Parker, Niki Vazou, Michael Hicks:

LWeb: information flow security for multi-tier web applications. 75:1-75:30 - Marco Vassena, Alejandro Russo

, Deepak Garg, Vineet Rajani
, Deian Stefan:
From fine- to coarse-grained dynamic information flow control and back. 76:1-76:31 - Conrad Watt, John Renner, Natalie Popescu

, Sunjay Cauligi, Deian Stefan:
CT-wasm: type-driven secure cryptography for the web ecosystem. 77:1-77:29
Volume 3, Number ICFP, August 2019
- Matthew Flatt, Caner Derici, R. Kent Dybvig, Andrew W. Keep, Gustavo E. Massaccesi, Sarah Spall, Sam Tobin-Hochstadt

, Jon Zeppieri:
Rebuilding racket on chez scheme (experience report). 78:1-78:15 - Youyou Cong, Leo Osvald, Grégory M. Essertel, Tiark Rompf:

Compiling with continuations, or without? whatever. 79:1-79:28 - Akimasa Morihata

:
Lambda calculus with algebraic simplification for reduction parallelization by equational reasoning. 80:1-80:25 - Stefan K. Muller

, Sam Westrick
, Umut A. Acar:
Fairness in responsive parallelism. 81:1-81:30
- Benjamin Delaware, Sorawit Suriyakarn, Clément Pit-Claudel

, Qianchuan Ye
, Adam Chlipala:
Narcissus: correct-by-construction derivation of decoders and encoders from binary formats. 82:1-82:29 - Zoe Paraskevopoulou, Andrew W. Appel

:
Closure conversion is safe for space. 83:1-83:29 - Thomas Van Strydonck, Frank Piessens, Dominique Devriese

:
Linear capabilities for fully abstract compilation of separation-logic-verified code. 84:1-84:29 - Daniel Patterson

, Amal Ahmed
:
The next 700 compiler correctness theorems (functional pearl). 85:1-85:29
- Matthieu Sozeau, Cyprien Mangin:

Equations reloaded: high-level dependently-typed functional programming and proving in Coq. 86:1-86:29 - Andrea Vezzosi

, Anders Mörtberg, Andreas Abel:
Cubical agda: a dependently typed programming language with univalence and higher inductive types. 87:1-87:29 - Joseph Eremondi

, Éric Tanter, Ronald Garcia:
Approximate normalization for gradual dependent types. 88:1-88:30
- Maximilian Algehed, Jean-Philippe Bernardy:

Simple noninterference from parametricity. 89:1-89:22 - Andrey Mokhov, Georgy Lukyanov, Simon Marlow, Jerémie Dimino:

Selective applicative functors. 90:1-90:29 - Gert-Jan Bottu, Ningning Xie, Koar Marntirosian, Tom Schrijvers

:
Coherence of type class resolution. 91:1-91:28
- Weihao Qu, Marco Gaboardi

, Deepak Garg:
Relational cost analysis for functional-imperative programs. 92:1-92:29 - Hengchu Zhang, Edo Roth, Andreas Haeberlen

, Benjamin C. Pierce, Aaron Roth
:
Fuzzi: a three-level logic for differential privacy. 93:1-93:28 - Calvin Smith, Aws Albarghouthi:

Synthesizing differentially private programs. 94:1-94:29 - Anders Miltner

, Solomon Maina, Kathleen Fisher, Benjamin C. Pierce, David Walker
, Steve Zdancewic:
Synthesizing symmetric lenses. 95:1-95:28
- Fei Wang, Daniel Zheng, James M. Decker, Xilun Wu, Grégory M. Essertel, Tiark Rompf:

Demystifying differentiable programming: shift/reset the penultimate backpropagator. 96:1-96:31 - Amir Shaikhha, Andrew W. Fitzgibbon, Dimitrios Vytiniotis, Simon Peyton Jones:

Efficient differentiable programming in a functional array-processing language. 97:1-97:30 - Rajan Walia, Praveen Narayanan, Jacques Carette, Sam Tobin-Hochstadt

, Chung-chieh Shan:
From high-level inference algorithms to efficient code. 98:1-98:30 - Benjamin Sherman, Jesse Michel, Michael Carbin:

Sound and robust solid modeling via exact real arithmetic and continuity. 99:1-99:29
- David Thrane Christiansen, Iavor S. Diatchki, Robert Dockins, Joe Hendrix, Tristan Ravitch:

Dependently typed Haskell in industry (experience report). 100:1-100:16 - Stephanie Weirich, Pritam Choudhury, Antoine Voizard, Richard A. Eisenberg

:
A role for dependent types in Haskell. 101:1-101:29 - Csongor Kiss, Tony Field, Susan Eisenbach, Simon Peyton Jones:

Higher-order type-level programming in Haskell. 102:1-102:26
- Wouter Swierstra, Tim Baanen:

A predicate transformer semantics for effects (functional pearl). 103:1-103:26 - Kenji Maillard

, Danel Ahman
, Robert Atkey, Guido Martínez, Catalin Hritcu, Exequiel Rivas
, Éric Tanter:
Dijkstra monads for all. 104:1-104:29 - Amin Timany

, Lars Birkedal
:
Mechanized relational verification of concurrent programs with continuations. 105:1-105:28 - Nicholas V. Lewchenko, Arjun Radhakrishna

, Akash Gaonkar, Pavol Cerný:
Sequential programming for replicated data stores. 106:1-106:28
- Daniel Gratzer

, Jonathan Sterling
, Lars Birkedal
:
Implementing a modal dependent type theory. 107:1-107:29 - Pierre-Marie Pédrot, Nicolas Tabareau

, Hans Jacob Fehrmann, Éric Tanter:
A reasonably exceptional type theory. 108:1-108:29 - Patrick Bahr

, Christian Graulund
, Rasmus Ejlers Møgelberg
:
Simply RaTT: a fitch-style modal calculus for reactive programming without space leaks. 109:1-109:27 - Dominic Orchard, Vilem-Benjamin Liepelt, Harley Eades III:

Quantitative program reasoning with graded modal types. 110:1-110:30
- Bert Lindenhovius, Michael W. Mislove

, Vladimir Zamdzhiev:
Mixed linear and non-linear recursive types. 111:1-111:29 - Jinxu Zhao, Bruno C. d. S. Oliveira, Tom Schrijvers

:
A mechanical formalization of higher-ranked polymorphic type inference. 112:1-112:29 - Victor Cacciari Miraldo, Wouter Swierstra:

An efficient algorithm for type-safe structural diffing. 113:1-113:29
- Jennifer Hackett, Graham Hutton

:
Call-by-need is clairvoyant call-by-value. 114:1-114:23 - Aliya Hameer, Brigitte Pientka:

Teaching the art of functional programming using automated grading (experience report). 115:1-115:15 - Jeremy Yallop, Leo White:

Lambda: the ultimate sublanguage (experience report). 116:1-116:17
Volume 3, Number OOPSLA, October 2019
- Kia Rahmani, Kartik Nagar, Benjamin Delaware, Suresh Jagannathan:

CLOTHO: directed test generation for weakly consistent database systems. 117:1-117:28 - Osbert Bastani, Xin Zhang

, Armando Solar-Lezama
:
Probabilistic verification of fairness properties via concentration. 118:1-118:27 - Vimuth Fernando, Keyur Joshi

, Sasa Misailovic:
Verifying safety and accuracy of approximate parallel programs via canonical sequentialization. 119:1-119:29 - Marcos Yukio Siraichi, Vinícius Fernandes dos Santos, Caroline Collange, Fernando Magno Quintão Pereira:

Qubit allocation as a combination of subgraph isomorphism and token swapping. 120:1-120:29 - Arshavir Ter-Gabrielyan, Alexander J. Summers, Peter Müller:

Modular verification of heap reachability properties in separation logic. 121:1-121:28 - Ben Greenman

, Matthias Felleisen, Christos Dimoulas
:
Complete monitors for gradual types. 122:1-122:29 - Igor Konnov

, Jure Kukovec, Thanh-Hai Tran:
TLA+ model checking made symbolic. 123:1-123:30 - Krishnendu Chatterjee, Andreas Pavlogiannis

, Viktor Toman
:
Value-centric dynamic partial order reduction. 124:1-124:29 - Ariya Shajii, Ibrahim Numanagic, Riyadh Baghdadi, Bonnie Berger, Saman P. Amarasinghe

:
Seq: a high-performance language for bioinformatics. 125:1-125:29 - Guannan Wei

, Yuxuan Chen, Tiark Rompf:
Staged abstract interpreters: fast and modular whole-program analysis via meta-programming. 126:1-126:32 - Ian Henriksen

, Gianfranco Bilardi, Keshav Pingali:
Derivative grammars: a symbolic approach to parsing with derivatives. 127:1-127:28 - Yoav Zuriel, Michal Friedman

, Gali Sheffi, Nachshon Cohen, Erez Petrank:
Efficient lock-free durable sets. 128:1-128:26 - Mingzhang Huang, Hongfei Fu

, Krishnendu Chatterjee, Amir Kafshdar Goharshady
:
Modular verification for almost-sure termination of probabilistic programs. 129:1-129:29 - Yu-Ping Wang

, Xu-Qiang Hu, Zi-Xin Zou, Wende Tan, Gang Tan:
IVT: an efficient method for sharing subtype polymorphic objects. 130:1-130:22 - Luís Caires, Bernardo Toninho

:
Refinement kinds: type-safe programming with practical type-level computation. 131:1-131:30 - Benjamin Mariano, Josh Reese, Siyuan Xu, ThanhVu Nguyen, Xiaokang Qiu

, Jeffrey S. Foster, Armando Solar-Lezama
:
Program synthesis with algebraic library specifications. 132:1-132:25 - Conrad Watt, Andreas Rossberg, Jean Pichon-Pharabod:

Weakening WebAssembly. 133:1-133:28 - Tetsuro Yamazaki

, Tomoki Nakamaru, Kazuhiro Ichikawa, Shigeru Chiba:
Generating a fluent API with syntax checking from an LR grammar. 134:1-134:24 - Azalea Raad, John Wickerson, Viktor Vafeiadis

:
Weak persistency semantics from the ground up: formalising the persistency semantics of ARMv8 and transactional models. 135:1-135:27 - Vilhelm Sjöberg, Yuyang Sang, Shu-Chun Weng, Zhong Shao

:
DeepSEA: a language for certified system software. 136:1-136:27 - Zhuo Zhang

, Wei You, Guanhong Tao, Guannan Wei
, Yonghwi Kwon, Xiangyu Zhang:
BDA: practical dependence analysis for binary executables by unbiased whole-program path sampling and per-path abstract interpretation. 137:1-137:31 - Ivana Vukotic, Vincent Rahli

, Paulo Jorge Esteves Veríssimo:
Asphalion: trustworthy shielding against Byzantine faults. 138:1-138:32 - Rong Pan, Qinheping Hu, Gaowei Xu, Loris D'Antoni:

Automatic repair of regular expressions. 139:1-139:29 - Benno Stein, Benjamin Barslev Nielsen, Bor-Yuh Evan Chang

, Anders Møller:
Static analysis with demand-driven value refinement. 140:1-140:29 - Jia Chen, Jiayi Wei, Yu Feng, Osbert Bastani, Isil Dillig:

Relational verification using reinforcement learning. 141:1-141:30 - John Bender, Jens Palsberg:

A formalization of Java's concurrent access modes. 142:1-142:28 - Anders Miltner

, Sumit Gulwani, Vu Le, Alan Leung
, Arjun Radhakrishna
, Gustavo Soares, Ashish Tiwari, Abhishek Udupa:
On the fly synthesis of edit suggestions. 143:1-143:29 - Ragnar Mogk, Joscha Drechsler, Guido Salvaneschi

, Mira Mezini:
A fault-tolerant programming model for distributed interactive applications. 144:1-144:29 - Marianna Rapoport, Ondrej Lhoták:

A path to DOT: formalizing fully path-dependent types. 145:1-145:29 - Théophile Bastian, Stephen Kell, Francesco Zappa Nardelli:

Reliable and fast DWARF-based stack unwinding. 146:1-146:24 - Vytautas Astrauskas, Peter Müller, Federico Poli

, Alexander J. Summers:
Leveraging rust types for modular specification and verification. 147:1-147:30 - Jingbo Lu, Jingling Xue:

Precision-preserving yet fast object-sensitive pointer analysis with partial context sensitivity. 148:1-148:29 - Abhinav Jangda, Donald Pinckney

, Yuriy Brun, Arjun Guha:
Formal foundations of serverless computing. 149:1-149:26 - Parosh Aziz Abdulla, Mohamed Faouzi Atig, Bengt Jonsson, Magnus Lång

, Tuan Phong Ngo
, Konstantinos Sagonas
:
Optimal stateless model checking for reads-from equivalence under sequential consistency. 150:1-150:29 - Pavel Panchekha, Michael D. Ernst, Zachary Tatlock

, Shoaib Kamil:
Modular verification of web page layout. 151:1-151:26 - Sifei Luan, Di Yang, Celeste Barnaby, Koushik Sen, Satish Chandra:

Aroma: code recommendation via structural code search. 152:1-152:28 - Aviral Goel

, Jan Vitek:
On the design, implementation, and use of laziness in R. 153:1-153:27 - Gowtham Kaki

, Swarn Priya
, K. C. Sivaramakrishnan, Suresh Jagannathan:
Mergeable replicated data types. 154:1-154:29 - Michaël Marcozzi, Qiyi Tang

, Alastair F. Donaldson, Cristian Cadar
:
Compiler fuzzing: how much does it matter? 155:1-155:29 - Grégory M. Essertel, Guannan Wei

, Tiark Rompf:
Precise reasoning with structured time, structured heaps, and collective operations. 157:1-157:30 - Luis Mastrangelo, Matthias Hauswirth, Nathaniel Nystrom:

Casting about in the dark: an empirical study of cast operations in Java programs. 158:1-158:31 - Johannes Bader

, Andrew Scott, Michael Pradel, Satish Chandra:
Getafix: learning to fix bugs automatically. 159:1-159:27 - Baijun Wu, John Peter Campora III, Yi He

, Alexander Schlecht, Sheng Chen
:
Generating precise error specifications for C: a zero shot learning approach. 160:1-160:30 - Aleksandar Nanevski, Anindya Banerjee

, Germán Andrés Delbianco
, Ignacio Fábregas
:
Specifying concurrent programs in separation logic: morphisms and simulations. 161:1-161:30 - Yi Li, Shaohua Wang, Tien N. Nguyen, Son Van Nguyen:

Improving bug detection via context-based code representation learning and attention-based neural networks. 162:1-162:30 - Filip Krikava, Heather Miller, Jan Vitek:

Scala implicits are everywhere: a large-scale study of the use of Scala implicits in the wild. 163:1-163:28 - Rajkishore Barik, Manu Sridharan, Murali Krishna Ramanathan, Milind Chabbi:

Optimization of swift protocols. 164:1-164:27 - Ranadeep Biswas, Constantin Enea:

On the complexity of checking transactional consistency. 165:1-165:28 - Jad Hamza, Nicolas Voirol, Viktor Kuncak

:
System FR: formalized foundations for the stainless verifier. 166:1-166:30 - Guido Salvaneschi

, Mirko Köhler
, Daniel Sokolowski
, Philipp Haller, Sebastian Erdweg
, Mira Mezini:
Language-integrated privacy-aware distributed queries. 167:1-167:30 - Rohan Bavishi, Caroline Lemieux, Roy Fox, Koushik Sen, Ion Stoica:

AutoPandas: neural-backed generators for program synthesis. 168:1-168:27 - Ulf Adams:

Ryū revisited: printf floating point conversion. 169:1-169:23 - Bo Shen, Wei Zhang, Haiyan Zhao, Guangtai Liang, Zhi Jin, Qianxiang Wang:

IntelliMerge: a refactoring-aware software merging technique. 170:1-170:28 - Shengyi Wang, Qinxiang Cao, Anshuman Mohan

, Aquinas Hobor:
Certifying graph-manipulating C programs via localizations within data structures. 171:1-171:30 - Joseph P. Near, David Darais, Chike Abuah

, Tim Stevens, Pranav Gaddamadugu, Lun Wang, Neel Somani, Mu Zhang, Nikhil Sharma, Alex Shan, Dawn Song:
Duet: an expressive higher-order language and linear type system for statically enforcing differential privacy. 172:1-172:30 - Michalis Kokologiannakis

, Azalea Raad, Viktor Vafeiadis
:
Effective lock handling in stateless model checking. 173:1-173:26 - Rohan Padhye

, Caroline Lemieux, Koushik Sen, Laurent Simon, Hayawardh Vijayakumar:
FuzzFactory: domain-specific fuzzing with waypoints. 174:1-174:29 - José Pablo Cambronero, Martin C. Rinard:

AL: autogenerating supervised learning programs. 175:1-175:28 - Sven Keidel

, Sebastian Erdweg
:
Sound and reusable components for abstract interpretation. 176:1-176:28 - Ahmet Çelik, Pengyu Nie, Christopher J. Rossbach, Milos Gligoric:

Design, implementation, and application of GPU-based Java bytecode interpreters. 177:1-177:28 - Timos Antonopoulos, Eric Koskinen, Ton Chanh Le:

Specification and inference of trace refinement relations. 178:1-178:30 - Kaan Genç, Jake Roemer, Yufan Xu, Michael D. Bond

:
Dependence-aware, unbounded sound predictive race detection. 179:1-179:30 - Burcu Kulahcioglu Ozkan

, Rupak Majumdar, Simin Oraee:
Trace aware random testing for distributed systems. 180:1-180:29 - Leonidas Lampropoulos

, Michael Hicks, Benjamin C. Pierce:
Coverage guided, property based testing. 181:1-181:29 - Emma Tosch, Eytan Bakshy, Emery D. Berger

, David D. Jensen, J. Eliot B. Moss:
PlanAlyzer: assessing threats to the validity of online experiments. 182:1-182:30 - Milijana Surbatovich

, Limin Jia
, Brandon Lucia:
I/O dependent idempotence bugs in intermittent systems. 183:1-183:31 - Christian Wimmer, Codrut Stancu, Peter Hofer

, Vojin Jovanovic, Paul Wögerer, Peter B. Kessler, Oleg Pliss, Thomas Würthinger:
Initialize once, start fast: application initialization at build time. 184:1-184:29 - Ilya Sergey, Vaivaswatha Nagaraj, Jacob Johannsen, Amrit Kumar, Anton Trunov, Ken Chan Guan Hao:

Safer smart contract programming with Scilla. 185:1-185:30 - Hashim Sharif, Prakalp Srivastava, Muhammad Huzaifa, Maria Kotsifakou, Keyur Joshi

, Yasmin Sarita, Nathan Zhao, Vikram S. Adve, Sasa Misailovic, Sarita V. Adve:
ApproxHPVM: a portable compiler IR for accuracy-aware optimizations. 186:1-186:30 - August Shi, Milica Hadzi-Tanovic, Lingming Zhang, Darko Marinov, Owolabi Legunsen:

Reflection-aware static regression test selection. 187:1-187:29 - Dowon Song, Myungho Lee, Hakjoo Oh:

Automatic and scalable detection of logical errors in functional programming assignments. 188:1-188:30 - Shuai Wang, Chengyu Zhang

, Zhendong Su
:
Detecting nondeterministic payment bugs in Ethereum smart contracts. 189:1-189:29

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














