callback( { "result":{ "query":":facetid:toc:\"db/conf/icfp/icfp2016.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"66.49" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"41", "@dc":"41", "@oc":"41", "@id":"43401791", "text":":facetid:toc:db/conf/icfp/icfp2016.bht" } }, "hits":{ "@total":"41", "@computed":"41", "@sent":"30", "@first":"0", "hit":[{ "@score":"1", "@id":"3270433", "info":{"authors":{"author":[{"@pid":"54/4483-2","text":"Ralf Jung 0002"},{"@pid":"96/8576","text":"Robbert Krebbers"},{"@pid":"31/910","text":"Lars Birkedal"},{"@pid":"d/DerekDreyer","text":"Derek Dreyer"}]},"title":"Higher-order ghost state.","venue":"ICFP","pages":"256-269","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icfp/0002KBD16","doi":"10.1145/2951913.2951943","ee":"https://doi.org/10.1145/2951913.2951943","url":"https://dblp.org/rec/conf/icfp/0002KBD16"}, "url":"URL#3270433" }, { "@score":"1", "@id":"3270434", "info":{"authors":{"author":{"@pid":"a/MartinAbadi","text":"Martín Abadi"}},"title":"TensorFlow: learning functions at scale.","venue":"ICFP","pages":"1","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icfp/Abadi16","doi":"10.1145/2951913.2976746","ee":"https://doi.org/10.1145/2951913.2976746","url":"https://dblp.org/rec/conf/icfp/Abadi16"}, "url":"URL#3270434" }, { "@score":"1", "@id":"3270435", "info":{"authors":{"author":[{"@pid":"44/3421","text":"Umut A. Acar"},{"@pid":"55/5002","text":"Arthur Charguéraud"},{"@pid":"82/6878","text":"Mike Rainey"},{"@pid":"39/9960","text":"Filip Sieczkowski"}]},"title":"Dag-calculus: a calculus for parallel computation.","venue":"ICFP","pages":"18-32","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icfp/AcarCRS16","doi":"10.1145/2951913.2951946","ee":"https://doi.org/10.1145/2951913.2951946","url":"https://dblp.org/rec/conf/icfp/AcarCRS16"}, "url":"URL#3270435" }, { "@score":"1", "@id":"3270437", "info":{"authors":{"author":[{"@pid":"184/8339","text":"Michael Arntzenius"},{"@pid":"92/1903","text":"Neelakantan R. Krishnaswami"}]},"title":"Datafun: a functional Datalog.","venue":"ICFP","pages":"214-227","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icfp/ArntzeniusK16","doi":"10.1145/2951913.2951948","ee":"https://doi.org/10.1145/2951913.2951948","url":"https://dblp.org/rec/conf/icfp/ArntzeniusK16"}, "url":"URL#3270437" }, { "@score":"1", "@id":"3270439", "info":{"authors":{"author":[{"@pid":"b/SandrineBlazy","text":"Sandrine Blazy"},{"@pid":"66/8883","text":"Vincent Laporte"},{"@pid":"37/6728","text":"David Pichardie"}]},"title":"An abstract memory functor for verified C static analyzers.","venue":"ICFP","pages":"325-337","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icfp/BlazyLP16","doi":"10.1145/2951913.2951937","ee":"https://doi.org/10.1145/2951913.2951937","url":"https://dblp.org/rec/conf/icfp/BlazyLP16"}, "url":"URL#3270439" }, { "@score":"1", "@id":"3270440", "info":{"authors":{"author":[{"@pid":"38/2005","text":"Johannes Borgström"},{"@pid":"44/3105","text":"Ugo Dal Lago"},{"@pid":"g/AndrewDGordon","text":"Andrew D. Gordon 0001"},{"@pid":"143/2921-2","text":"Marcin Szymczak 0002"}]},"title":"A lambda-calculus foundation for universal probabilistic programming.","venue":"ICFP","pages":"33-46","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icfp/BorgstromLGS16","doi":"10.1145/2951913.2951942","ee":"https://doi.org/10.1145/2951913.2951942","url":"https://dblp.org/rec/conf/icfp/BorgstromLGS16"}, "url":"URL#3270440" }, { "@score":"1", "@id":"3270442", "info":{"authors":{"author":[{"@pid":"c/GiuseppeCastagna","text":"Giuseppe Castagna"},{"@pid":"182/2309","text":"Tommaso Petrucciani"},{"@pid":"72/5342-1","text":"Kim Nguyen 0001"}]},"title":"Set-theoretic types for polymorphic variants.","venue":"ICFP","pages":"378-391","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icfp/CastagnaP016","doi":"10.1145/2951913.2951928","ee":"https://doi.org/10.1145/2951913.2951928","url":"https://dblp.org/rec/conf/icfp/CastagnaP016"}, "url":"URL#3270442" }, { "@score":"1", "@id":"3270443", "info":{"authors":{"author":[{"@pid":"259/3482","text":"David Castro 0006"},{"@pid":"35/4224","text":"Kevin Hammond"},{"@pid":"99/365","text":"Susmit Sarkar"}]},"title":"Farms, pipes, streams and reforestation: reasoning about structured parallel processes using types and hylomorphisms.","venue":"ICFP","pages":"4-17","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icfp/CastroHS16","doi":"10.1145/2951913.2951920","ee":"https://doi.org/10.1145/2951913.2951920","url":"https://dblp.org/rec/conf/icfp/CastroHS16"}, "url":"URL#3270443" }, { "@score":"1", "@id":"3270444", "info":{"authors":{"author":[{"@pid":"184/8406","text":"David R. Christiansen"},{"@pid":"232/9760","text":"Edwin C. Brady"}]},"title":"Elaborator reflection: extending Idris in Idris.","venue":"ICFP","pages":"284-297","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icfp/ChristiansenB16","doi":"10.1145/2951913.2951932","ee":"https://doi.org/10.1145/2951913.2951932","url":"https://dblp.org/rec/conf/icfp/ChristiansenB16"}, "url":"URL#3270444" }, { "@score":"1", "@id":"3270445", "info":{"authors":{"author":[{"@pid":"49/6309","text":"Jan Christiansen"},{"@pid":"118/5974","text":"Nikita Danilenko"},{"@pid":"184/8370","text":"Sandra Dylus"}]},"title":"All sorts of permutations (functional pearl).","venue":"ICFP","pages":"168-179","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icfp/ChristiansenDD16","doi":"10.1145/2951913.2951949","ee":"https://doi.org/10.1145/2951913.2951949","url":"https://dblp.org/rec/conf/icfp/ChristiansenDD16"}, "url":"URL#3270445" }, { "@score":"1", "@id":"3270446", "info":{"authors":{"author":[{"@pid":"160/7728","text":"Ezgi Çiçek"},{"@pid":"167/1599","text":"Zoe Paraskevopoulou"},{"@pid":"45/6786-1","text":"Deepak Garg 0001"}]},"title":"A type theory for incremental computational complexity with control flow changes.","venue":"ICFP","pages":"132-145","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icfp/CicekP016","doi":"10.1145/2951913.2951950","ee":"https://doi.org/10.1145/2951913.2951950","url":"https://dblp.org/rec/conf/icfp/CicekP016"}, "url":"URL#3270446" }, { "@score":"1", "@id":"3270447", "info":{"authors":{"author":[{"@pid":"143/2636","text":"Jesper Cockx"},{"@pid":"74/8301","text":"Dominique Devriese"},{"@pid":"85/6647","text":"Frank Piessens"}]},"title":"Unifiers as equivalences: proof-relevant unification of dependently typed data.","venue":"ICFP","pages":"270-283","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icfp/CockxDP16","doi":"10.1145/2951913.2951917","ee":"https://doi.org/10.1145/2951913.2951917","url":"https://dblp.org/rec/conf/icfp/CockxDP16"}, "url":"URL#3270447" }, { "@score":"1", "@id":"3270448", "info":{"authors":{"author":[{"@pid":"50/3978","text":"Pierre-Évariste Dagand"},{"@pid":"56/3285","text":"Nicolas Tabareau"},{"@pid":"t/EricTanter","text":"Éric Tanter"}]},"title":"Partial type equivalences for verified dependent interoperability.","venue":"ICFP","pages":"298-310","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icfp/DagandTT16","doi":"10.1145/2951913.2951933","ee":"https://doi.org/10.1145/2951913.2951933","url":"https://dblp.org/rec/conf/icfp/DagandTT16"}, "url":"URL#3270448" }, { "@score":"1", "@id":"3270449", "info":{"authors":{"author":[{"@pid":"10/8656","text":"David Darais"},{"@pid":"77/2466","text":"David Van Horn"}]},"title":"Constructive Galois connections: taming the Galois connection framework for mechanized metatheory.","venue":"ICFP","pages":"311-324","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icfp/DaraisH16","doi":"10.1145/2951913.2951934","ee":"https://doi.org/10.1145/2951913.2951934","url":"https://dblp.org/rec/conf/icfp/DaraisH16"}, "url":"URL#3270449" }, { "@score":"1", "@id":"3270451", "info":{"authors":{"author":[{"@pid":"03/2293","text":"Christos Dimoulas"},{"@pid":"173/9463","text":"Max S. New"},{"@pid":"f/RBFindler","text":"Robert Bruce Findler"},{"@pid":"f/MFelleisen","text":"Matthias Felleisen"}]},"title":"Oh Lord, please don't let contracts be misunderstood (functional pearl).","venue":"ICFP","pages":"117-131","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icfp/DimoulasNFF16","doi":"10.1145/2951913.2951930","ee":"https://doi.org/10.1145/2951913.2951930","url":"https://dblp.org/rec/conf/icfp/DimoulasNFF16"}, "url":"URL#3270451" }, { "@score":"1", "@id":"3270452", "info":{"authors":{"author":[{"@pid":"90/11109","text":"Paul Downen"},{"@pid":"161/3760","text":"Luke Maurer"},{"@pid":"76/2207","text":"Zena M. Ariola"},{"@pid":"j/SimonLPeytonJones","text":"Simon Peyton Jones"}]},"title":"Sequent calculus as a compiler intermediate language.","venue":"ICFP","pages":"74-88","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icfp/DownenMAJ16","doi":"10.1145/2951913.2951931","ee":"https://doi.org/10.1145/2951913.2951931","url":"https://dblp.org/rec/conf/icfp/DownenMAJ16"}, "url":"URL#3270452" }, { "@score":"1", "@id":"3270454", "info":{"authors":{"author":[{"@pid":"71/2967","text":"Kento Emoto"},{"@pid":"53/1261","text":"Kiminori Matsuzaki"},{"@pid":"24/5199","text":"Zhenjiang Hu"},{"@pid":"75/229","text":"Akimasa Morihata"},{"@pid":"58/4276","text":"Hideya Iwasaki"}]},"title":"Think like a vertex, behave like a function! a functional DSL for vertex-centric big graph processing.","venue":"ICFP","pages":"200-213","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icfp/EmotoMHMI16","doi":"10.1145/2951913.2951938","ee":"https://doi.org/10.1145/2951913.2951938","url":"https://dblp.org/rec/conf/icfp/EmotoMHMI16"}, "url":"URL#3270454" }, { "@score":"1", "@id":"3270457", "info":{"authors":{"author":[{"@pid":"84/3396","text":"Marco Gaboardi"},{"@pid":"00/5408","text":"Shin-ya Katsumata"},{"@pid":"12/7603","text":"Dominic A. Orchard"},{"@pid":"13/11469","text":"Flavien Breuvart"},{"@pid":"u/TarmoUustalu","text":"Tarmo Uustalu"}]},"title":"Combining effects and coeffects via grading.","venue":"ICFP","pages":"476-489","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icfp/GaboardiKOBU16","doi":"10.1145/2951913.2951939","ee":"https://doi.org/10.1145/2951913.2951939","url":"https://dblp.org/rec/conf/icfp/GaboardiKOBU16"}, "url":"URL#3270457" }, { "@score":"1", "@id":"3270459", "info":{"authors":{"author":[{"@pid":"126/4984","text":"Thomas Gilray"},{"@pid":"37/3316-1","text":"Michael D. Adams 0001"},{"@pid":"57/2128","text":"Matthew Might"}]},"title":"Allocation characterizes polyvariance: a unified methodology for polyvariant control-flow analysis.","venue":"ICFP","pages":"407-420","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icfp/Gilray0M16","doi":"10.1145/2951913.2951936","ee":"https://doi.org/10.1145/2951913.2951936","url":"https://dblp.org/rec/conf/icfp/Gilray0M16"}, "url":"URL#3270459" }, { "@score":"1", "@id":"3270464", "info":{"authors":{"author":[{"@pid":"184/4729","text":"Wazim Mohammed Ismail"},{"@pid":"s/ChungchiehShan","text":"Chung-chieh Shan"}]},"title":"Deriving a probability density calculator (functional pearl).","venue":"ICFP","pages":"47-59","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icfp/IsmailS16","doi":"10.1145/2951913.2951922","ee":"https://doi.org/10.1145/2951913.2951922","url":"https://dblp.org/rec/conf/icfp/IsmailS16"}, "url":"URL#3270464" }, { "@score":"1", "@id":"3270469", "info":{"authors":{"author":{"@pid":"47/1513","text":"Dan Licata"}},"title":"A functional programmer's guide to homotopy type theory.","venue":"ICFP","pages":"3","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icfp/Licata16","doi":"10.1145/2951913.2976748","ee":"https://doi.org/10.1145/2951913.2976748","url":"https://dblp.org/rec/conf/icfp/Licata16"}, "url":"URL#3270469" }, { "@score":"1", "@id":"3270470", "info":{"authors":{"author":[{"@pid":"97/4946","text":"Sam Lindley"},{"@pid":"28/8610","text":"J. Garrett Morris"}]},"title":"Talking bananas: structural recursion for session types.","venue":"ICFP","pages":"434-447","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icfp/LindleyM16","doi":"10.1145/2951913.2951921","ee":"https://doi.org/10.1145/2951913.2951921","url":"https://dblp.org/rec/conf/icfp/LindleyM16"}, "url":"URL#3270470" }, { "@score":"1", "@id":"3270475", "info":{"authors":{"author":[{"@pid":"31/9117","text":"Trevor L. McDonell"},{"@pid":"176/1226","text":"Timothy A. K. Zakian"},{"@pid":"29/7866","text":"Matteo Cimini"},{"@pid":"34/3982","text":"Ryan R. Newton"}]},"title":"Ghostbuster: a tool for simplifying and converting GADTs.","venue":"ICFP","pages":"338-350","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icfp/McDonellZCN16","doi":"10.1145/2951913.2951914","ee":"https://doi.org/10.1145/2951913.2951914","url":"https://dblp.org/rec/conf/icfp/McDonellZCN16"}, "url":"URL#3270475" }, { "@score":"1", "@id":"3270477", "info":{"authors":{"author":{"@pid":"28/8610","text":"J. Garrett Morris"}},"title":"The best of both worlds: linear functional programming without compromise.","venue":"ICFP","pages":"448-461","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icfp/Morris16","doi":"10.1145/2951913.2951925","ee":"https://doi.org/10.1145/2951913.2951925","url":"https://dblp.org/rec/conf/icfp/Morris16"}, "url":"URL#3270477" }, { "@score":"1", "@id":"3270478", "info":{"authors":{"author":[{"@pid":"05/4442","text":"Shin-Cheng Mu"},{"@pid":"184/8405","text":"Yu-Hsi Chiang"},{"@pid":"21/9256","text":"Yu-Han Lyu"}]},"title":"Queueing and glueing for optimal partitioning (functional pearl).","venue":"ICFP","pages":"158-167","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icfp/MuCL16","doi":"10.1145/2951913.2951923","ee":"https://doi.org/10.1145/2951913.2951923","url":"https://dblp.org/rec/conf/icfp/MuCL16"}, "url":"URL#3270478" }, { "@score":"1", "@id":"3270481", "info":{"authors":{"author":[{"@pid":"173/9463","text":"Max S. New"},{"@pid":"163/3115","text":"William J. Bowman"},{"@pid":"a/AmalAhmed","text":"Amal Ahmed 0001"}]},"title":"Fully abstract compilation via universal embedding.","venue":"ICFP","pages":"103-116","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icfp/NewBA16","doi":"10.1145/2951913.2951941","ee":"https://doi.org/10.1145/2951913.2951941","url":"https://dblp.org/rec/conf/icfp/NewBA16"}, "url":"URL#3270481" }, { "@score":"1", "@id":"3270483", "info":{"authors":{"author":[{"@pid":"146/3436","text":"Liam O'Connor"},{"@pid":"146/3373","text":"Zilin Chen"},{"@pid":"50/9861","text":"Christine Rizkallah"},{"@pid":"22/11041","text":"Sidney Amani"},{"@pid":"145/1087","text":"Japheth Lim"},{"@pid":"31/6289","text":"Toby C. Murray"},{"@pid":"21/607","text":"Yutaka Nagashima"},{"@pid":"98/1593","text":"Thomas Sewell"},{"@pid":"74/2171","text":"Gerwin Klein"}]},"title":"Refinement through restraint: bringing down the cost of verification.","venue":"ICFP","pages":"89-102","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icfp/OConnorCRALMNSK16","doi":"10.1145/2951913.2951940","ee":"https://doi.org/10.1145/2951913.2951940","url":"https://dblp.org/rec/conf/icfp/OConnorCRALMNSK16"}, "url":"URL#3270483" }, { "@score":"1", "@id":"3270484", "info":{"authors":{"author":[{"@pid":"20/7796","text":"Bruno C. d. S. Oliveira"},{"@pid":"19/222","text":"Zhiyuan Shi"},{"@pid":"176/1865","text":"João Alpuim"}]},"title":"Disjoint intersection types.","venue":"ICFP","pages":"364-377","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icfp/OliveiraSA16","doi":"10.1145/2951913.2951945","ee":"https://doi.org/10.1145/2951913.2951945","url":"https://dblp.org/rec/conf/icfp/OliveiraSA16"}, "url":"URL#3270484" }, { "@score":"1", "@id":"3270487", "info":{"authors":{"author":[{"@pid":"53/10735","text":"Maciej Piróg"},{"@pid":"23/7856","text":"Nicolas Wu"}]},"title":"String diagrams for free monads (functional pearl).","venue":"ICFP","pages":"490-501","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icfp/PirogW16","doi":"10.1145/2951913.2951947","ee":"https://doi.org/10.1145/2951913.2951947","url":"https://dblp.org/rec/conf/icfp/PirogW16"}, "url":"URL#3270487" }, { "@score":"1", "@id":"3270488", "info":{"authors":{"author":[{"@pid":"02/484","text":"Ram Raghunathan"},{"@pid":"162/0450","text":"Stefan K. Muller"},{"@pid":"44/3421","text":"Umut A. Acar"},{"@pid":"b/GEBlelloch","text":"Guy E. Blelloch"}]},"title":"Hierarchical memory management for parallel programs.","venue":"ICFP","pages":"392-406","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icfp/RaghunathanMAB16","doi":"10.1145/2951913.2951935","ee":"https://doi.org/10.1145/2951913.2951935","url":"https://dblp.org/rec/conf/icfp/RaghunathanMAB16"}, "url":"URL#3270488" } ] } } } )