Sciweavers

PLPV
2012
ACM
14 years 8 days ago
LTL types FRP: linear-time temporal logic propositions as types, proofs as functional reactive programs
Functional Reactive Programming (FRP) is a form of reactive programming whose model is pure functions over signals. FRP is often expressed in terms of arrows with loops, which is ...
Alan Jeffrey
PEPM
2012
ACM
14 years 8 days ago
Ideas for connecting inductive program synthesis and bidirectionalization
We share a vision of connecting the topics of bidirectional transformation and inductive program synthesis, by proposing to use the latter in approaching problematic aspects of th...
Janis Voigtländer
142
Voted
PEPM
2012
ACM
14 years 8 days ago
Scala-virtualized
This paper describes Scala-Virtualized, which extends the Scala language and compiler with a small number of features that enable combining the benefits of shallow and deep embed...
Adriaan Moors, Tiark Rompf, Philipp Haller, Martin...
PC
2012
223views Management» more  PC 2012»
14 years 8 days ago
Using shared arrays in message-driven parallel programs
This paper describes a safe and efficient combination of the object-based message-driven execution and shared array parallel programming models. In particular, we demonstrate how ...
Phil Miller, Aaron Becker, Laxmikant V. Kalé...
PC
2012
228views Management» more  PC 2012»
14 years 8 days ago
DAGuE: A generic distributed DAG engine for High Performance Computing
— The frenetic development of the current architectures places a strain on the current state-of-the-art programming environments. Harnessing the full potential of such architectu...
George Bosilca, Aurelien Bouteiller, Anthony Danal...
PAM
2012
Springer
14 years 8 days ago
Geolocating IP Addresses in Cellular Data Networks
Smartphones connected to cellular networks are increasingly being used to access Internet-based services. Using data collected from smartphones running a popular location-based app...
Sipat Triukose, Sebastien Ardon, Anirban Mahanti, ...
PAM
2012
Springer
14 years 8 days ago
Re-wiring Activity of Malicious Networks
This paper studies the AS-level re-wiring dynamics (changes in the connectivity) of malicious networks. Anecdotal evidence suggests that some malicious ASes that are primarily invo...
Maria Konte, Nick Feamster
PAM
2012
Springer
14 years 8 days ago
SyFi: A Systematic Approach for Estimating Stateful Firewall Performance
Due to the lack of a standardized methodology for reporting firewall performance, current datasheets are designed for marketing and provide inflated throughput measurements obtai...
Yordanos Beyene, Michalis Faloutsos, Harsha V. Mad...