default search action
ACM Transactions on Programming Languages and Systems (TOPLAS), Volume 32
Volume 32, Number 1, October 2009
- Mark Harman, David W. Binkley, Keith B. Gallagher, Nicolas Gold, Jens Krinke:
Dependence clusters in source code. 1:1-1:33 - Haruo Hosoya, Alain Frisch, Giuseppe Castagna:
Parametric polymorphism for XML. 2:1-2:56 - Umut A. Acar, Guy E. Blelloch, Matthias Blume, Robert Harper, Kanat Tangwongsan:
An experimental analysis of self-adjusting computation. 3:1-3:53
Volume 32, Number 2, January 2010
- Shane Markstrum, Daniel Marino, Matthew Esquivel, Todd D. Millstein, Chris Andreae, James Noble:
JavaCOP: Declarative pluggable types for java. 4:1-4:37 - Bertrand Jeannet, Alexey Loginov, Thomas W. Reps, Mooly Sagiv:
A relational approach to interprocedural shape analysis. 5:1-5:52 - Kenneth L. Knowles, Cormac Flanagan:
Hybrid type checking. 6:1-6:34
Volume 32, Number 3, March 2010
- Amal Ahmed, Andrew W. Appel, Christopher D. Richards, Kedar N. Swadi, Gang Tan, Daniel C. Wang:
Semantic foundations for typed assembly languages. 7:1-7:67 - Fausto Spoto, Fred Mesnard, Étienne Payet:
A termination analyzer for Java bytecode based on path-length. 8:1-8:70 - Rob van Nieuwpoort, Gosia Wrzesinska, Ceriel J. H. Jacobs, Henri E. Bal:
Satin: A high-level and efficient grid programming model. 9:1-9:39
Volume 32, Number 4, April 2010
- Kathryn S. McKinley, Keshav Pingali:
La dolce vita at TOPLAS. 10:1-10:6 - Xiaotong Zhuang, Santosh Pande:
An optimization framework for embedded processors with auto-addressing mode. 11:1-11:41 - Peter Sewell, Pawel T. Wojciechowski, Asis Unyapoth:
Nomadic pict: Programming languages, communication infrastructure overlays, and semantics for mobile computation. 12:1-12:63 - Vivy Suhendra, Abhik Roychoudhury, Tulika Mitra:
Scratchpad allocation for concurrent embedded software. 13:1-13:47 - Peter H. Welch, Jan Bækgaard Pedersen:
Santa Claus: Formal analysis of a process-oriented solution. 14:1-14:37 - Yuqiang Huang, Bruce R. Childers, Mary Lou Soffa:
Detecting bugs in register allocation. 15:1-15:36
Volume 32, Number 5, May 2010
- Naoki Kobayashi, Davide Sangiorgi:
A hybrid type system for lock-freedom of mobile processes. 16:1-16:49 - Dennis Jeffrey, Vijay Nagarajan, Rajiv Gupta, Neelam Gupta:
Execution suppression: An automated iterative technique for locating memory errors. 17:1-17:36 - Eran Yahav, Mooly Sagiv:
Verifying safety properties of concurrent heap-manipulating programs. 18:1-18:50 - Sven Apel, DeLesley Hutchins:
A calculus for uniform feature composition. 19:1-19:33
Volume 32, Number 6, August 2010
- Kathryn S. McKinley, Keshav Pingali:
La prossima vita at TOPLAS. 20:1 - Salvatore Ruggieri, Fred Mesnard:
Typing linear constraints. 21:1-21:42 - John Tang Boyland:
Semantics of fractional permissions with nesting. 22:1-22:33 - Gogul Balakrishnan, Thomas W. Reps:
WYSINWYX: What you see is not what you eXecute. 23:1-23:84 - Thomas W. Reps, Mooly Sagiv, Alexey Loginov:
Finite differencing of logical formulas for static analysis. 24:1-24:55
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.