default search action
PLDI 2007: San Diego, California, USA
- Jeanne Ferrante, Kathryn S. McKinley:
Proceedings of the ACM SIGPLAN 2007 Conference on Programming Language Design and Implementation, San Diego, California, USA, June 10-13, 2007. ACM 2007, ISBN 978-1-59593-633-2
Errors detected & corrected
- Gene Novark, Emery D. Berger, Benjamin G. Zorn:
Exterminator: automatically correcting memory errors with high probability. 1-11 - Sebastian Burckhardt, Rajeev Alur, Milo M. K. Martin:
CheckFence: checking consistency of concurrent data types on relaxed memory models. 12-21 - Satish Narayanasamy, Zhenghao Wang, Jordan Tigani, Andrew Edwards, Brad Calder:
Automatically classifying benign and harmful data racesallusing replay analysis. 22-31 - Gary Wassermann, Zhendong Su:
Sound and precise analysis of web applications for injection vulnerabilities. 32-41
Compiled correctly
- Frances Perry, Lester W. Mackey, George A. Reis, Jay Ligatti, David I. August, David Walker:
Fault-tolerant typed assembly language. 42-53 - Adam Chlipala:
A certified type-preserving compiler from lambda calculus to assembly language. 54-65 - Hongxu Cai, Zhong Shao, Alexander Vaynberg:
Certified self-modifying code. 66-77 - Tatiana Shpeisman, Vijay Menon, Ali-Reza Adl-Tabatabai, Steven Balensiefer, Dan Grossman, Richard L. Hudson, Katherine F. Moore, Bratin Saha:
Enforcing isolation and ordering in STM. 78-88
Programs analyzed
- Nicholas Nethercote, Julian Seward:
Valgrind: a framework for heavyweight dynamic binary instrumentation. 89-100 - Jungwoo Ha, Christopher J. Rossbach, Jason V. Davis, Indrajit Roy, Hany E. Ramadan, Donald E. Porter, David L. Chen, Emmett Witchel:
Improved error reporting for software that uses black-box components. 101-111 - Manu Sridharan, Stephen J. Fink, Rastislav Bodík:
Thin slicing. 112-122 - Murali Krishna Ramanathan, Ananth Grama, Suresh Jagannathan:
Static specification inference using predicate mining. 123-134 - Erika Rice Scherpelz, Sorin Lerner, Craig Chambers:
Automatic inference of optimizer flow functions from semantic meanings. 135-145
Languages designed
- Kazutaka Morita, Akimasa Morihata, Kiminori Matsuzaki, Zhenjiang Hu, Masato Takeichi:
Automatic inversion generates divide-and-conquer parallel programs. 146-155 - Perry H. Wang, Jamison D. Collins, Gautham N. Chinya, Hong Jiang, Xinmin Tian, Milind Girkar, Nick Y. Yang, Guei-Yuan Lueh, Hong Wang:
EXOCHI: architecture and programming environment for a heterogeneous multi-core multithreaded system. 156-166 - Armando Solar-Lezama, Gilad Arnold, Liviu Tancau, Rastislav Bodík, Vijay A. Saraswat, Sanjit A. Seshia:
Sketching stencils. 167-178 - Charles Edwin Killian, James W. Anderson, Ryan Braud, Ranjit Jhala, Amin Vahdat:
Mace: language support for building distributed systems. 179-188 - Peng Li, Steve Zdancewic:
Combining events and threads for scalable network services implementation and evaluation of monadic, application-level concurrency primitives. 189-199 - Nupur Kothari, Ramakrishna Gummadi, Todd D. Millstein, Ramesh Govindan:
Reliable and efficient programming abstractions for wireless sensor networks. 200-210
Executed concurrently
- Milind Kulkarni, Keshav Pingali, Bruce Walter, Ganesh Ramanarayanan, Kavita Bala, L. Paul Chew:
Optimistic parallelism requires abstractions. 211-222 - Chen Ding, Xipeng Shen, Kirk Kelsey, Chris Tice, Ruke Huang, Chengliang Zhang:
Software behavior oriented parallelization. 223-234 - Sriram Krishnamoorthy, Muthu Manikandan Baskaran, Uday Bondhugula, J. Ramanujam, Atanas Rountev, P. Sadayappan:
Effective automatic parallelization of stencil computations. 235-244 - Tayfun Elmas, Shaz Qadeer, Serdar Tasiran:
Goldilocks: a race and transaction-aware java runtime. 245-255
Pointers analyzed
- Bolei Guo, Neil Vachharajani, David I. August:
Shape analysis with inductive recursion synthesis. 256-265 - Alexey Gotsman, Josh Berdine, Byron Cook, Mooly Sagiv:
Thread-modular shape analysis. 266-277 - Chris Lattner, Andrew Lenharth, Vikram S. Adve:
Making context-sensitive points-to analysis with heap cloning practical for the real world. 278-289 - Ben Hardekopf, Calvin Lin:
The ant and the grasshopper: fast and accurate pointer analysis for millions of lines of code. 290-299
Programs analyzed
- Dirk Beyer, Thomas A. Henzinger, Rupak Majumdar, Andrey Rybalchenko:
Path invariants. 300-309 - Ajeet Shankar, Rastislav Bodík:
DITTO: automatic incrementalization of data structure invariant checks (in Java). 310-319 - Byron Cook, Andreas Podelski, Andrey Rybalchenko:
Proving thread termination. 320-330 - John Kodumal, Alex Aiken:
Regularly annotated set constraints. 331-341 - Pierre Genevès, Nabil Layaïda, Alan Schmitt:
Efficient static analysis of XML paths and types. 342-351
Executed efficiently
- Ben L. Titzer, Joshua S. Auerbach, David F. Bacon, Jens Palsberg:
The ExoVM system for automatic VM and application reduction. 352-362 - Nathan Cooprider, John Regehr:
Offline compression for on-chip ram. 363-372 - Florian T. Schneider, Mathias Payer, Thomas R. Gross:
Online optimizations driven by hardware performance monitoring. 373-382 - Weijia Li, Youtao Zhang, Jun Yang, Jiang Zheng:
UCC: update-conscious compilation for energy efficiency in wireless sensor networks. 383-393 - Feihui Li, Guangyu Chen, Mahmut T. Kandemir, Ibrahim Kolcu:
Profile-driven energy reduction in network-on-chips. 394-404 - Lakshminarayanan Renganarayanan, DaeGon Kim, Sanjay V. Rajopadhye, Michelle Mills Strout:
Parameterized tiled loops for free. 405-414
Errors detected
- Xiangyu Zhang, Sriraman Tallam, Neelam Gupta, Rajiv Gupta:
Towards locating execution omission errors. 415-424 - Benjamin S. Lerner, Matthew Flower, Dan Grossman, Craig Chambers:
Searching for type-error messages. 425-434 - Isil Dillig, Thomas Dillig, Alex Aiken:
Static error detection using semantic inconsistency inference. 435-445 - Madanlal Musuvathi, Shaz Qadeer:
Iterative context bounding for systematic testing of multithreaded programs. 446-455
Memory managed
- Martin T. Vechev, Eran Yahav, David F. Bacon, Noam Rinetzky:
CGCExplorer: a semi-automated search procedure for provably correct concurrent collectors. 456-467 - Andrew McCreight, Zhong Shao, Chunxiao Lin, Long Li:
A general framework for certifying garbage collectors and their mutators. 468-479 - Sigmund Cherem, Lonnie Princehouse, Radu Rugina:
Practical memory leak detection using guarded value-flow analysis. 480-491
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.