


default search action
ACM Transactions on Programming Languages and Systems, Volume 37
Volume 37, Number 1, November 2014
- Jens Palsberg:
Editorial. 1e:1 - Graeme Gange
, Jorge A. Navas, Peter Schachte
, Harald Søndergaard
, Peter J. Stuckey:
Interval Analysis and Machine Arithmetic: Why Signedness Ignorance Is Bliss. 1:1-1:35 - Tony Nowatzki, Michael Sartin-Tarm, Lorenzo De Carli
, Karthikeyan Sankaralingam, Cristian Estan, Behnam Robatmili:
A Scheduling Framework for Spatial Architectures Across Multiple Constraint-Solving Theories. 2:1-2:30 - Camil Demetrescu, Irene Finocchi
, Andrea Ribichini:
Reactive Imperative Programming with Dataflow Constraints. 3:1-3:53 - Donald E. Porter, Michael D. Bond
, Indrajit Roy, Kathryn S. McKinley, Emmett Witchel
:
Practical Fine-Grained Information Flow Control Using Laminar. 4:1-4:51
Volume 37, Number 2, April 2015
- Michael Frechtling, Philip Heng Wai Leong
:
MCALIB: Measuring Sensitivity to Rounding Error with Monte Carlo Programming. 5:1-5:25 - Marco Patrignani
, Pieter Agten, Raoul Strackx, Bart Jacobs
, Dave Clarke, Frank Piessens:
Secure Compilation to Protected Module Architectures. 6:1-6:50 - Andrew W. Appel
:
Verification of a Cryptographic Primitive: SHA-256. 7:1-7:31
Volume 37, Number 3, June 2015
- Baris Kasikci
, Cristian Zamfir, George Candea:
Automated Classification of Data Races Under Both Strong and Weak Memory Models. 8:1-8:44 - Farn Wang, Sven Schewe
, Chung-Hao Huang:
An Extension of ATL with Strategy Interaction. 9:1-9:41 - Adam Betts, Nathan Chong
, Alastair F. Donaldson, Jeroen Ketema, Shaz Qadeer, Paul Thomson, John Wickerson:
The Design and Implementation of a Verification Technique for GPU Kernels. 10:1-10:49
Volume 37, Number 4, August 2015
- Michele Bugliesi
, Stefano Calzavara
, Fabienne Eigner, Matteo Maffei:
Affine Refinement Types for Secure Distributed Programming. 11:1-11:66 - Tobias Grosser
, Sven Verdoolaege, Albert Cohen:
Polyhedral AST Generation Is More Than Scanning Polyhedra. 12:1-12:50 - Gary T. Leavens, David A. Naumann
:
Behavioral Subtyping, Specification Inheritance, and Modular Reasoning. 13:1-13:88

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.