Sciweavers

109
Voted
POPL
2016
ACM
9 years 11 months ago
Pushdown control-flow analysis for free
Traditional control-flow analysis (CFA) for higher-order languages introduces spurious connections between callers and callees, and different invocations of a function may pollut...
Thomas Gilray, Steven Lyde, Michael D. Adams 0001,...
103
Voted
POPL
2016
ACM
9 years 11 months ago
Effects as sessions, sessions as effects
Effect and session type systems are two expressive behavioural type systems. The former is usually developed in the context of the λcalculus and its variants, the latter for the ...
Dominic A. Orchard, Nobuko Yoshida
POPL
2016
ACM
9 years 11 months ago
PSync: a partially synchronous language for fault-tolerant distributed algorithms
Fault-tolerant distributed algorithms play an important role in many critical/high-availability applications. These algorithms are notoriously difficult to implement correctly, d...
Cezara Dragoi, Thomas A. Henzinger, Damien Zuffere...
111
Voted
POPL
2016
ACM
9 years 11 months ago
Example-directed synthesis: a type-theoretic interpretation
Input-output examples have emerged as a practical and user-friendly specification mechanism for program synthesis in many environments. While example-driven tools have demonstrat...
Jonathan Frankle, Peter-Michael Osera, David Walke...
POPL
2016
ACM
9 years 11 months ago
Breaking through the normalization barrier: a self-interpreter for f-omega
According to conventional wisdom, a self-interpreter for a strongly normalizing λ-calculus is impossible. We call this the normalization barrier. The normalization barrier stems ...
Matt Brown, Jens Palsberg
111
Voted
POPL
2016
ACM
9 years 11 months ago
Type theory in type theory using quotient inductive types
We present an internal formalisation of dependent type theory in type theory using a special case of higher inductive types from Homotopy Type Theory which we call quotient induct...
Thorsten Altenkirch, Ambrus Kaposi
121
Voted
POPL
2016
ACM
9 years 11 months ago
Binding as sets of scopes
Our new macro expander for Racket builds on a novel approach to hygiene. Instead of basing macro expansion on variable renamings that are mediated by expansion history, our new ex...
Matthew Flatt
POPETS
2016
65views more  POPETS 2016»
9 years 11 months ago
XPIR : Private Information Retrieval for Everyone
A Private Information Retrieval (PIR) scheme is a protocol in which a user retrieves a record from a database while hiding which from the database administrators. PIR can be achie...
Carlos Aguilar Melchor, Joris Barrier, Laurent Fou...
POPETS
2016
64views more  POPETS 2016»
9 years 11 months ago
Automobile Driver Fingerprinting
Abstract: Today’s automobiles leverage powerful sensors and embedded computers to optimize efficiency, safety, and driver engagement. However the complexity of possible inference...
Miro Enev, Alex Takakuwa, Karl Koscher, Tadayoshi ...
POPETS
2016
66views more  POPETS 2016»
9 years 11 months ago
Are You Sure You Want to Contact Us? Quantifying the Leakage of PII via Website Contact Forms
: The majority of commercial websites provide users the ability to contact them via dedicated contact pages. In these pages, users are typically requested to provide their names, e...
Oleksii Starov, Phillipa Gill, Nick Nikiforakis