


default search action
PLDI 2016: Santa Barbara, CA, USA
- Chandra Krintz, Emery D. Berger

:
Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2016, Santa Barbara, CA, USA, June 13-17, 2016. ACM 2016, ISBN 978-1-4503-4261-2
Down to the Metal I
- Kayvan Memarian

, Justus Matthiesen, James Lingard, Kyndylan Nienhuis, David Chisnall
, Robert N. M. Watson, Peter Sewell
:
Into the depths of C: elaborating the de facto standards. 1-15 - Buddhika Chamith, Bo Joel Svensson, Luke Dalessandro, Ryan R. Newton:

Living on the edge: rapid-toggling probes with cross-modification on x86. 16-26 - Matthew Noonan, Alexey Loginov, David R. Cok:

Polymorphic type inference for machine code. 27-41
Verification I
- Saswat Padhi, Rahul Sharma, Todd D. Millstein

:
Data-driven precondition inference with learned features. 42-56 - Marcelo Sousa, Isil Dillig:

Cartesian hoare logic for verifying k-safety properties. 57-69 - Wonyeol Lee

, Rahul Sharma, Alex Aiken
:
Verifying bit-manipulations of floating-point. 70-84
Testing and Debugging
- Yuting Chen, Ting Su, Chengnian Sun, Zhendong Su

, Jianjun Zhao:
Coverage-directed differential testing of JVM implementations. 85-99 - Tyler Sorensen

, Alastair F. Donaldson:
Exposing errors related to weak memory in GPU applications. 100-113 - Maarten Faddegon, Olaf Chitil:

Lightweight computation tree tracing for lazy functional languages. 114-128
Energy and Performance
- Changwan Hong, Wenlei Bao, Albert Cohen, Sriram Krishnamoorthy, Louis-Noël Pouchet, Fabrice Rastello, J. Ramanujam

, P. Sadayappan
:
Effective padding of multidimensional arrays to avoid cache conflict misses. 129-144 - Yuhao Zhu, Vijay Janapa Reddi:

GreenWeb: language extensions for energy-efficient mobile web computing. 145-160 - Michael A. Laurenzano, Parker Hill, Mehrzad Samadi, Scott A. Mahlke, Jason Mars, Lingjia Tang:

Input responsiveness: using canary inputs to dynamically steer approximation. 161-176
New Languages
- Sara Achour

, Rahul Sarpeshkar, Martin C. Rinard:
Configuration synthesis for programmable analog devices with Arco. 177-193 - Magnus Madsen

, Ming-Ho Yee
, Ondrej Lhoták:
From Datalog to flix: a declarative language for fixed points on lattices. 194-208 - Leonard Truong, Rajkishore Barik, Ehsan Totoni, Hai Liu, Chick Markley, Armando Fox, Tatiana Shpeisman:

Latte: a language, compiler, and runtime for elegant and efficient deep neural networks. 209-223
Parsing and Compilation
- Michael D. Adams, Celeste Hollenbeck, Matthew Might:

On the complexity and performance of parsing with derivatives. 224-236
Down to the Metal II
- Stefan Heule, Eric Schkufza, Rahul Sharma, Alex Aiken

:
Stratified synthesis: automatically learning the x86-64 instruction set. 237-250 - Ariel Eizenberg, Shiliang Hu, Gilles Pokam, Joseph Devietti

:
Remix: online detection and repair of cache contention for the JVM. 251-265 - Yaniv David

, Nimrod Partush, Eran Yahav
:
Statistical similarity of binaries. 266-280
Types I
- Yizhou Zhang

, Guido Salvaneschi
, Quinn Beightol, Barbara Liskov, Andrew C. Myers:
Accepting blame for safe tunneled exceptions. 281-295 - Andrew M. Kent, David Kempe, Sam Tobin-Hochstadt

:
Occurrence typing modulo theories. 296-309 - Panagiotis Vekris, Benjamin Cosman

, Ranjit Jhala:
Refinement types for TypeScript. 310-325
Synthesis I
- Calvin Smith, Aws Albarghouthi:

MapReduce program synthesis. 326-340 - Ravi Chugh, Brian Hempel, Mitchell Spradlin, Jacob Albers:

Programmatic and direct manipulation, together at last. 341-354 - Calvin Loncaric, Emina Torlak, Michael D. Ernst:

Fast synthesis of fast collections. 355-368
Software-Defined Networking
- Jedidiah McClurg, Hossein Hojjat, Nate Foster, Pavol Cerný:

Event-driven network programming. 369-385 - Ryan Beckett, Michael Greenberg

, David Walker
:
Temporal NetKAT. 386-401 - Ahmed El-Hassany, Jeremie Miserez, Pavol Bielik, Laurent Vanbever, Martin T. Vechev:

SDNRacer: concurrency analysis for software-defined networks. 402-415
Verifying Systems
- Rian Shambaugh, Aaron Weiss, Arjun Guha:

Rehearsal: a configuration verification tool for puppet. 416-430 - Hao Chen, Xiongnan (Newman) Wu, Zhong Shao

, Joshua Lockerman, Ronghui Gu:
Toward compositional verification of interruptible OS kernels and device drivers. 431-447 - Eric Mullen, Daryl Zuniga, Zachary Tatlock

, Dan Grossman:
Verified peephole optimizations for CompCert. 448-461
Types II
- Brianna M. Ren, Jeffrey S. Foster:

Just-in-time static type checking for dynamic languages. 462-476 - Tomas Petricek

, Gustavo Guerra, Don Syme:
Types from data: making structured data first-class citizens in F#. 477-490 - He Zhu

, Gustavo Petri, Suresh Jagannathan:
Automatically learning shape specifications. 491-507
Synthesis II
- Navid Yaghmazadeh, Christian Klinger, Isil Dillig, Swarat Chaudhuri:

Synthesizing transformations on hierarchically structured data. 508-521 - Nadia Polikarpova, Ivan Kuraj, Armando Solar-Lezama

:
Program synthesis from polymorphic refinement types. 522-538
Parallelism I
- Sepideh Maleki, Annie Yang, Martin Burtscher:

Higher-order and tuple-based massively-parallel prefix sums. 539-552 - Junghyun Kim, Gangwon Jo, Jaehoon Jung, Jungwon Kim, Jaejin Lee:

A distributed OpenCL framework using redundant computation and data replication. 553-569
Memory Management
- Ulan Degenbaev, Jochen Eisinger, Manfred Ernst, Ross McIlroy, Hannes Payer:

Idle time garbage collection scheduling. 570-583 - Nicholas Jacek, Meng-Chieh Chiu, Benjamin M. Marlin

, Eliot Moss:
Assessing the limits of program-specific garbage collection performance. 584-598
Verification II
- Klaus von Gleissenthall, Nikolaj S. Bjørner, Andrey Rybalchenko:

Cardinalities and universal quantifiers for verifying parameterized systems. 599-613 - Oded Padon

, Kenneth L. McMillan, Aurojit Panda, Mooly Sagiv, Sharon Shoham
:
Ivy: safety verification by interactive generalization. 614-630
Security
- Jean Yang, Travis Hance, Thomas H. Austin

, Armando Solar-Lezama
, Cormac Flanagan, Stephen Chong:
Precise, dynamic information flow for database-backed applications. 631-647 - David Costanzo, Zhong Shao

, Ronghui Gu:
End-to-end verification of information-flow security for C and assembly programs. 648-664 - Rohit Sinha, Manuel Costa, Akash Lal, Nuno P. Lopes

, Sriram K. Rajamani, Sanjit A. Seshia, Kapil Vaswani:
A design and verification methodology for secure isolated regions. 665-681
Parallelism II
- Alexander Spiegelman, Guy Golan-Gueta, Idit Keidar:

Transactional data structure libraries. 682-696 - Sara S. Baghsorkhi, Nalini Vasudevan, Youfeng Wu:

FlexVec: auto-vectorization for irregular loops. 697-710 - Shoaib Kamil, Alvin Cheung

, Shachar Itzhaky, Armando Solar-Lezama
:
Verified lifting of stencil computations. 711-726

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














