


default search action
ACM Transactions on Programming Languages and Systems (TOPLAS), Volume 29
Volume 29, Number 1, January 2007
- Vincent Simonet, François Pottier:
A constraint-based approach to guarded algebraic data types. 1 - Stephen M. Blackburn
, Matthew Hertz, Kathryn S. McKinley, J. Eliot B. Moss, Ting Yang:
Profile-based pretenuring. 2 - Milenko Drinic, Darko Kirovski, Hoi Vo:
PPMexe: Program compression. 3 - Tomoyuki Higuchi, Atsushi Ohori:
A static type system for JVM access control. 4 - Amir M. Ben-Amram, Chin Soon Lee:
Program termination analysis in polynomial time. 5:1-5:37 - Patrick Eugster:
Type-based publish/subscribe: Concepts and experiences. 6
Volume 29, Number 2, April 2007
- Martin P. Ward
, Hussein Zedan:
Slicing as a program transformation. 7 - Olivier Tardieu:
A deterministic logical semantics for pure Esterel. 8 - Xiaotong Zhuang, Santosh Pande
:
Allocating architected registers through differential encoding. 9 - Maurice Bruynooghe, Michael Codish
, John P. Gallagher, Samir Genaim
, Wim Vanhoof
:
Termination analysis of logic programs through combination of type-based norms. 10 - Martin Hirzel, Daniel von Dincklage, Amer Diwan, Michael Hind:
Fast online pointer analysis. 11 - Jaydeep Marathe, Frank Mueller, Tushar Mohan, Sally A. McKee, Bronis R. de Supinski, Andy Yoo:
METRIC: Memory tracing via dynamic binary rewriting to identify cache inefficiencies. 12 - Davide Ancona, Christopher Anderson, Ferruccio Damiani
, Sophia Drossopoulou, Paola Giannini
, Elena Zucca:
A provenly correct translation of Fickle into Java. 13
Volume 29, Number 3, May 2007
- Martín Abadi, Jens Palsberg:
Editorial. 14 - Andreas Podelski, Andrey Rybalchenko:
Transition predicate abstraction and fair termination. 15 - Yichen Xie, Alex Aiken
:
Saturn: A scalable framework for error detection using Boolean satisfiability. 16 - J. Nathan Foster, Michael B. Greenwald, Jonathan T. Moore, Benjamin C. Pierce, Alan Schmitt:
Combinators for bidirectional tree transformations: A linguistic approach to the view-update problem. 17
Volume 29, Number 4, August 2007
- Han Bok Lee, Amer Diwan, J. Eliot B. Moss:
Design, implementation, and evaluation of a compilation server. 18 - Bjorn De Sutter, Ludo Van Put, Koen De Bosschere:
A practical interprocedural dominance algorithm. 19 - Harel Paz, David F. Bacon, Elliot K. Kolodner, Erez Petrank, V. T. Rajan:
An efficient on-the-fly cycle collection. 20 - Anders Møller
, Mads Østerby Olesen, Michael I. Schwartzbach:
Static validation of XSL transformations. 21 - Gareth Paul Stoyle, Michael W. Hicks, Gavin M. Bierman, Peter Sewell
, Iulian Neamtiu:
Mutatis Mutandis: Safe and predictable dynamic software updating. 22
Volume 29, Number 5, August 2007
- Mooly Sagiv:
Introduction to special ESOP'05 issue. 23 - Bodil Biering, Lars Birkedal, Noah Torp-Smith:
BI-hyperdoctrines, higher-order separation logic, and abstraction. 24 - Cédric Fournet, Andrew D. Gordon, Sergio Maffeis
:
A type discipline for authorization policies. 25 - Xavier Rival, Laurent Mauborgne:
The trace partitioning abstract domain. 26 - Venkatesh Prasad Ranganath
, Torben Amtoft, Anindya Banerjee, John Hatcliff, Matthew B. Dwyer
:
A new foundation for control dependence and slicing for modern program structures. 27 - Ajay Chander, David Espinosa, Nayeem Islam, Peter Lee, George C. Necula:
Enforcing resource bounds via static verification of dynamic checks. 28 - Markus Müller-Olm, Helmut Seidl:
Analysis of modular arithmetic. 29
Volume 29, Number 6, October 2007
- Kathryn S. McKinley, Keshav Pingali:
Editorial: A changing of the guard. 30 - Kohei Honda, Nobuko Yoshida
:
A uniform type structure for secure information flow. 31 - Christian Grothoff, Jens Palsberg, Jan Vitek:
Encapsulating objects with confined types. 32 - Thomas A. Henzinger, Christoph M. Kirsch:
The embedded machine: Predictable, portable real-time code. 33 - William Thies, Frédéric Vivien
, Saman P. Amarasinghe
:
A step towards unifying schedule and storage optimization. 34 - Christian S. Collberg, Clark D. Thomborson
, Gregg M. Townsend:
Dynamic graph-based software fingerprinting. 35 - Atsushi Ohori:
A proof theory for machine code. 36 - Kevin Casey, M. Anton Ertl, David Gregg:
Optimizing indirect branch prediction accuracy in virtual machine interpreters. 37 - Bageshri Karkare, Uday P. Khedker:
An improved bound for call strings based interprocedural analysis of bit vector frameworks. 38 - Sunae Seo, Hongseok Yang, Kwangkeun Yi, Taisook Han:
Goal-directed weakening of abstract interpretation results. 39

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.