Sciweavers

POPL
2015
ACM
9 years 11 months ago
Runtime Enforcement of Security Policies on Black Box Reactive Programs
Security enforcement mechanisms like execution monitors are used to make sure that some untrusted program complies with a policy. Different enforcement mechanisms have different s...
Minh Ngo, Fabio Massacci, Dimiter Milushev, Frank ...
95
Voted
POPL
2015
ACM
9 years 11 months ago
Towards the Essence of Hygiene
Hygiene is an essential aspect of Scheme’s macro system that prevents unintended variable capture. However, previous work on hygiene has focused on algorithmic implementation ra...
Michael D. Adams
POPL
2015
ACM
9 years 11 months ago
Conjugate Hylomorphisms - Or: The Mother of All Structured Recursion Schemes
The past decades have witnessed an extensive study of structured recursion schemes. A general scheme is the hylomorphism, which captures the essence of divide-and-conquer: a probl...
Ralf Hinze, Nicolas Wu, Jeremy Gibbons
103
Voted
POPL
2015
ACM
9 years 11 months ago
Quantitative Interprocedural Analysis
We consider the quantitative analysis problem for interprocedural control-flow graphs (ICFGs). The input consists of an ICFG, a positive weight function that assigns every transi...
Krishnendu Chatterjee, Andreas Pavlogiannis, Yaron...
102
Voted
POPL
2015
ACM
9 years 11 months ago
Faster Algorithms for Algebraic Path Properties in Recursive State Machines with Constant Treewidth
Interprocedural analysis is at the heart of numerous applications in programming languages, such as alias analysis, constant propagation, etc. Recursive state machines (RSMs) are ...
Krishnendu Chatterjee, Rasmus Ibsen-Jensen, Andrea...