default search action
ACM Transactions on Programming Languages and Systems (TOPLAS), Volume 30
Volume 30, Number 1, November 2007
- Uday P. Khedker, Amitabha Sanyal, Amey Karkare:
Heap reference analysis using access graphs. 1 - Peng Zhao, Shimin Cui, Yaoqing Gao, Raúl Silvera, José Nelson Amaral:
Forma: A framework for safe automatic array reshaping. 2 - David W. Binkley, Mark Harman, Jens Krinke:
Empirical study of optimization techniques for massive slicing. 3 - David J. Pearce, Paul H. J. Kelly, Chris Hankin:
Efficient field-sensitive pointer analysis of C. 4 - Joseph Gil, Yoav Zibin:
Efficient dynamic dispatching with type slicing. 5 - Stephen Tse, Steve Zdancewic:
Run-time principals in information-flow type systems. 6
Volume 30, Number 2, March 2008
- Barak A. Pearlmutter, Jeffrey Mark Siskind:
Reverse-mode AD in a functional framework: Lambda the ultimate backpropagator. 7:1-7:36 - Westley Weimer, George C. Necula:
Exceptional situations and program reliability. 8:1-8:51 - Daniel E. Cooke, J. Nelson Rushton, Brad Nemanich, Robert G. Watson, Per Andersen:
Normalize, transpose, and distribute: An automatic approach for handling nonscalars. 9:1-9:49 - Tao Wang, Abhik Roychoudhury:
Dynamic slicing on Java bytecode traces. 10:1-10:49 - Luigi Liquori, Arnaud Spiwack:
FeatherTrait: A modest extension of Featherweight Java. 11:1-11:32
Volume 30, Number 3, May 2008
- David Monniaux:
The pitfalls of verifying floating-point computations. 12:1-12:41 - Noam Rinetzky, G. Ramalingam, Shmuel Sagiv, Eran Yahav:
On the complexity of partially-flow-sensitive alias analysis. 13:1-13:28 - Daniel S. Dantas, David Walker, Geoffrey Washburn, Stephanie Weirich:
AspectML: A polymorphic aspect-oriented functional programming language. 14:1-14:60 - Tachio Terauchi, Alex Aiken:
Witnessing side effects. 15:1-15:42 - Amir M. Ben-Amram:
Size-change termination with difference constraints. 16:1-16:31 - Zhelong Pan, Rudolf Eigenmann:
PEAK - a fast and effective performance tuning system via compiler optimization orchestration. 17:1-17:43
Volume 30, Number 4, July 2008
- Michael Furr, Jeffrey S. Foster:
Checking type safety of foreign function calls. 18:1-18:63 - Ondrej Lhoták, Laurie J. Hendren:
Relations as an abstraction for BDD-based program analysis. 19:1-19:63 - Cormac Flanagan, Stephen N. Freund, Marina Lifshin, Shaz Qadeer:
Types for atomicity: Static checking and inference for Java. 20:1-20:53 - Andreas Gal, Christian W. Probst, Michael Franz:
Java bytecode verification via static single assignment form. 21:1-21:21 - Sapan Bhatia, Charles Consel, Calton Pu:
Remote specialization for efficient embedded operating systems. 22:1-22:32 - Hongbo Rong, Alban Douillet, Guang R. Gao:
Register allocation for software pipelined multidimensional loops. 23:1-23:68 - Noah Torp-Smith, Lars Birkedal, John C. Reynolds:
Local reasoning about a copying garbage collector. 24:1-24:58
Volume 30, Number 5, August 2008
- Mila Dalla Preda, Mihai Christodorescu, Somesh Jha, Saumya K. Debray:
A semantics-based approach to malware detection. 25:1-25:54 - James Cheney, Christian Urban:
Nominal logic programming. 26:1-26:47 - Tachio Terauchi, Alex Aiken:
A capability calculus for concurrency and determinism. 27:1-27:30 - Joseph Gil, William W. Pugh, Grant E. Weddell, Yoav Zibin:
Two-dimensional bidirectional object layout. 28:1-28:38 - Mayur Naik, Jens Palsberg:
A type system equivalent to a model checker. 29:1-29:24
Volume 30, Number 6, October 2008
- Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon:
Verifying policy-based web services security. 30:1-30:59 - Laurence Tratt:
Domain specific language implementation via compile-time meta-programming. 31:1-31:40 - Manuel Arenaz, Juan Touriño, Ramon Doallo:
XARK: An extensible framework for automatic recognition of computational kernels. 32:1-32:56 - Roland Ducournau:
Perfect hashing as an almost perfect subtype test. 33:1-33:56 - Joseph M. Morris, Malcolm Tyrrell:
Dually nondeterministic functions. 34:1-34:34
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.