


default search action
ACM Transactions on Programming Languages and Systems (TOPLAS), Volume 30
Volume 30, Number 1, November 2007
- Uday P. Khedker, Amitabha Sanyal, Amey Karkare

:
Heap reference analysis using access graphs. 1 - Peng Zhao, Shimin Cui, Yaoqing Gao, Raúl Silvera, José Nelson Amaral:

Forma: A framework for safe automatic array reshaping. 2 - David W. Binkley, Mark Harman

, Jens Krinke
:
Empirical study of optimization techniques for massive slicing. 3 - David J. Pearce, Paul H. J. Kelly, Chris Hankin

:
Efficient field-sensitive pointer analysis of C. 4 - Joseph Gil, Yoav Zibin:

Efficient dynamic dispatching with type slicing. 5 - Stephen Tse, Steve Zdancewic:

Run-time principals in information-flow type systems. 6
Volume 30, Number 2, March 2008
- Barak A. Pearlmutter

, Jeffrey Mark Siskind
:
Reverse-mode AD in a functional framework: Lambda the ultimate backpropagator. 7:1-7:36 - Westley Weimer, George C. Necula:

Exceptional situations and program reliability. 8:1-8:51 - Daniel E. Cooke, J. Nelson Rushton, Brad Nemanich, Robert G. Watson, Per Andersen:

Normalize, transpose, and distribute: An automatic approach for handling nonscalars. 9:1-9:49 - Tao Wang, Abhik Roychoudhury

:
Dynamic slicing on Java bytecode traces. 10:1-10:49 - Luigi Liquori

, Arnaud Spiwack:
FeatherTrait: A modest extension of Featherweight Java. 11:1-11:32
Volume 30, Number 3, May 2008
- David Monniaux

:
The pitfalls of verifying floating-point computations. 12:1-12:41 - Noam Rinetzky, G. Ramalingam, Shmuel Sagiv, Eran Yahav:

On the complexity of partially-flow-sensitive alias analysis. 13:1-13:28 - Daniel S. Dantas, David Walker

, Geoffrey Washburn, Stephanie Weirich
:
AspectML: A polymorphic aspect-oriented functional programming language. 14:1-14:60 - Tachio Terauchi

, Alex Aiken
:
Witnessing side effects. 15:1-15:42 - Amir M. Ben-Amram:

Size-change termination with difference constraints. 16:1-16:31 - Zhelong Pan, Rudolf Eigenmann:

PEAK - a fast and effective performance tuning system via compiler optimization orchestration. 17:1-17:43
Volume 30, Number 4, July 2008
- Michael Furr, Jeffrey S. Foster:

Checking type safety of foreign function calls. 18:1-18:63 - Ondrej Lhoták, Laurie J. Hendren:

Relations as an abstraction for BDD-based program analysis. 19:1-19:63 - Cormac Flanagan, Stephen N. Freund

, Marina Lifshin, Shaz Qadeer:
Types for atomicity: Static checking and inference for Java. 20:1-20:53 - Andreas Gal, Christian W. Probst

, Michael Franz:
Java bytecode verification via static single assignment form. 21:1-21:21 - Sapan Bhatia, Charles Consel, Calton Pu:

Remote specialization for efficient embedded operating systems. 22:1-22:32 - Hongbo Rong, Alban Douillet, Guang R. Gao:

Register allocation for software pipelined multidimensional loops. 23:1-23:68 - Noah Torp-Smith, Lars Birkedal, John C. Reynolds:

Local reasoning about a copying garbage collector. 24:1-24:58
Volume 30, Number 5, August 2008
- Mila Dalla Preda, Mihai Christodorescu, Somesh Jha, Saumya K. Debray:

A semantics-based approach to malware detection. 25:1-25:54 - James Cheney, Christian Urban:

Nominal logic programming. 26:1-26:47 - Tachio Terauchi

, Alex Aiken
:
A capability calculus for concurrency and determinism. 27:1-27:30 - Joseph Gil, William W. Pugh, Grant E. Weddell, Yoav Zibin:

Two-dimensional bidirectional object layout. 28:1-28:38 - Mayur Naik, Jens Palsberg:

A type system equivalent to a model checker. 29:1-29:24
Volume 30, Number 6, October 2008
- Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon:

Verifying policy-based web services security. 30:1-30:59 - Laurence Tratt

:
Domain specific language implementation via compile-time meta-programming. 31:1-31:40 - Manuel Arenaz, Juan Touriño

, Ramon Doallo:
XARK: An extensible framework for automatic recognition of computational kernels. 32:1-32:56 - Roland Ducournau:

Perfect hashing as an almost perfect subtype test. 33:1-33:56 - Joseph M. Morris, Malcolm Tyrrell:

Dually nondeterministic functions. 34:1-34:34

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














