callback( { "result":{ "query":":facetid:toc:\"db/conf/pldi/pldi2014.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"62.16" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"60", "@dc":"60", "@oc":"60", "@id":"43406626", "text":":facetid:toc:db/conf/pldi/pldi2014.bht" } }, "hits":{ "@total":"60", "@computed":"60", "@sent":"30", "@first":"0", "hit":[{ "@score":"1", "@id":"3929001", "info":{"authors":{"author":[{"@pid":"65/4407","text":"Wonsun Ahn"},{"@pid":"63/2791","text":"Jiho Choi"},{"@pid":"145/1026","text":"Thomas Shull"},{"@pid":"95/6451","text":"María Jesús Garzarán"},{"@pid":"t/JosepTorrellas","text":"Josep Torrellas"}]},"title":"Improving JavaScript performance by deconstructing the type system.","venue":"PLDI","pages":"496-507","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pldi/AhnCSGT14","doi":"10.1145/2594291.2594332","ee":"https://doi.org/10.1145/2594291.2594332","url":"https://dblp.org/rec/conf/pldi/AhnCSGT14"}, "url":"URL#3929001" }, { "@score":"1", "@id":"3929002", "info":{"authors":{"author":[{"@pid":"89/6370","text":"Jade Alglave"},{"@pid":"49/4972","text":"Luc Maranget"},{"@pid":"18/1323","text":"Michael Tautschnig"}]},"title":"Herding cats: modelling, simulation, testing, and data-mining for weak memory.","venue":"PLDI","pages":"40","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pldi/AlglaveMT14","doi":"10.1145/2594291.2594347","ee":"https://doi.org/10.1145/2594291.2594347","url":"https://dblp.org/rec/conf/pldi/AlglaveMT14"}, "url":"URL#3929002" }, { "@score":"1", "@id":"3929004", "info":{"authors":{"author":[{"@pid":"132/3414","text":"Steven Arzt"},{"@pid":"119/1650","text":"Siegfried Rasthofer"},{"@pid":"38/6-2","text":"Christian Fritz 0002"},{"@pid":"94/5744","text":"Eric Bodden"},{"@pid":"72/11467","text":"Alexandre Bartel"},{"@pid":"k/JacquesKlein","text":"Jacques Klein"},{"@pid":"95/5206","text":"Yves Le Traon"},{"@pid":"20/11088","text":"Damien Octeau"},{"@pid":"m/PatrickDrewMcDaniel","text":"Patrick D. McDaniel"}]},"title":"FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps.","venue":"PLDI","pages":"259-269","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pldi/ArztRFBBKTOM14","doi":"10.1145/2594291.2594299","ee":"https://doi.org/10.1145/2594291.2594299","url":"https://dblp.org/rec/conf/pldi/ArztRFBBKTOM14"}, "url":"URL#3929004" }, { "@score":"1", "@id":"3929005", "info":{"authors":{"author":[{"@pid":"24/2661","text":"Min Aung"},{"@pid":"h/SusanHorwitz","text":"Susan Horwitz"},{"@pid":"43/9158","text":"Richard Joiner"},{"@pid":"r/TWReps","text":"Thomas W. Reps"}]},"title":"Specialization slicing.","venue":"PLDI","pages":"167","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pldi/AungHJR14","doi":"10.1145/2594291.2594345","ee":"https://doi.org/10.1145/2594291.2594345","url":"https://dblp.org/rec/conf/pldi/AungHJR14"}, "url":"URL#3929005" }, { "@score":"1", "@id":"3929006", "info":{"authors":{"author":[{"@pid":"b/ThomasBall","text":"Thomas Ball"},{"@pid":"51/912","text":"Nikolaj S. Bjørner"},{"@pid":"07/9556","text":"Aaron Gember"},{"@pid":"62/8636","text":"Shachar Itzhaky"},{"@pid":"27/8279","text":"Aleksandr Karbyshev"},{"@pid":"s/SSagiv","text":"Mooly Sagiv"},{"@pid":"15/5634","text":"Michael Schapira"},{"@pid":"145/1065","text":"Asaf Valadarsky"}]},"title":"VeriCon: towards verifying controller programs in software-defined networks.","venue":"PLDI","pages":"282-293","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pldi/BallBGIKSSV14","doi":"10.1145/2594291.2594317","ee":"https://doi.org/10.1145/2594291.2594317","url":"https://dblp.org/rec/conf/pldi/BallBGIKSSV14"}, "url":"URL#3929006" }, { "@score":"1", "@id":"3929010", "info":{"authors":{"author":[{"@pid":"87/7683","text":"Swarnendu Biswas"},{"@pid":"136/1113","text":"Jipeng Huang"},{"@pid":"136/0961","text":"Aritra Sengupta"},{"@pid":"36/2453","text":"Michael D. Bond"}]},"title":"DoubleChecker: efficient sound and precise atomicity checking.","venue":"PLDI","pages":"28-39","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pldi/BiswasHSB14","doi":"10.1145/2594291.2594323","ee":"https://doi.org/10.1145/2594291.2594323","url":"https://dblp.org/rec/conf/pldi/BiswasHSB14"}, "url":"URL#3929010" }, { "@score":"1", "@id":"3929014", "info":{"authors":{"author":[{"@pid":"36/9538","text":"Mateus Borges"},{"@pid":"40/8264","text":"Antonio Filieri"},{"@pid":"16/608","text":"Marcelo d'Amorim"},{"@pid":"03/4368","text":"Corina S. Pasareanu"},{"@pid":"54/5019","text":"Willem Visser"}]},"title":"Compositional solution space quantification for probabilistic software analysis.","venue":"PLDI","pages":"123-132","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pldi/BorgesFdPV14","doi":"10.1145/2594291.2594329","ee":"https://doi.org/10.1145/2594291.2594329","url":"https://dblp.org/rec/conf/pldi/BorgesFdPV14"}, "url":"URL#3929014" }, { "@score":"1", "@id":"3929016", "info":{"authors":{"author":[{"@pid":"138/0615","text":"Yufei Cai"},{"@pid":"66/9550","text":"Paolo G. Giarrusso"},{"@pid":"72/3832","text":"Tillmann Rendel"},{"@pid":"51/3203","text":"Klaus Ostermann"}]},"title":"A theory of changes for higher-order languages: incrementalizing λ-calculi by static differentiation.","venue":"PLDI","pages":"145-155","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pldi/CaiGRO14","doi":"10.1145/2594291.2594304","ee":"https://doi.org/10.1145/2594291.2594304","url":"https://dblp.org/rec/conf/pldi/CaiGRO14"}, "url":"URL#3929016" }, { "@score":"1", "@id":"3929017", "info":{"authors":{"author":[{"@pid":"134/9158","text":"Quentin Carbonneaux"},{"@pid":"75/425","text":"Jan Hoffmann 0002"},{"@pid":"04/10","text":"Tahina Ramananandro"},{"@pid":"s/ZhongShao","text":"Zhong Shao"}]},"title":"End-to-end verification of stack-space bounds for C programs.","venue":"PLDI","pages":"270-281","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pldi/Carbonneaux0RS14","doi":"10.1145/2594291.2594301","ee":"https://doi.org/10.1145/2594291.2594301","url":"https://dblp.org/rec/conf/pldi/Carbonneaux0RS14"}, "url":"URL#3929017" }, { "@score":"1", "@id":"3929019", "info":{"authors":{"author":[{"@pid":"85/770","text":"Loris D'Antoni"},{"@pid":"42/6841","text":"Margus Veanes"},{"@pid":"46/2924","text":"Benjamin Livshits"},{"@pid":"97/2954","text":"David Molnar"}]},"title":"Fast: a transducer-based language for tree manipulation.","venue":"PLDI","pages":"384-394","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pldi/DAntoniVLM14","doi":"10.1145/2594291.2594309","ee":"https://doi.org/10.1145/2594291.2594309","url":"https://dblp.org/rec/conf/pldi/DAntoniVLM14"}, "url":"URL#3929019" }, { "@score":"1", "@id":"3929020", "info":{"authors":{"author":[{"@pid":"145/1034","text":"Yaniv David"},{"@pid":"54/5133","text":"Eran Yahav"}]},"title":"Tracelet-based code search in executables.","venue":"PLDI","pages":"349-360","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pldi/DavidY14","doi":"10.1145/2594291.2594343","ee":"https://doi.org/10.1145/2594291.2594343","url":"https://dblp.org/rec/conf/pldi/DavidY14"}, "url":"URL#3929020" }, { "@score":"1", "@id":"3929021", "info":{"authors":{"author":[{"@pid":"83/8636","text":"Zachary DeVito"},{"@pid":"17/7188","text":"Daniel Ritchie"},{"@pid":"57/5879","text":"Matthew Fisher"},{"@pid":"a/AAiken","text":"Alex Aiken"},{"@pid":"h/PatHanrahan","text":"Pat Hanrahan"}]},"title":"First-class runtime generation of high-performance types using exotypes.","venue":"PLDI","pages":"77-88","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pldi/DeVitoRFAH14","doi":"10.1145/2594291.2594307","ee":"https://doi.org/10.1145/2594291.2594307","url":"https://dblp.org/rec/conf/pldi/DeVitoRFAH14"}, "url":"URL#3929021" }, { "@score":"1", "@id":"3929022", "info":{"authors":{"author":[{"@pid":"44/4685-2","text":"Dimitar K. Dimitrov 0002"},{"@pid":"28/8412","text":"Veselin Raychev"},{"@pid":"93/2189","text":"Martin T. Vechev"},{"@pid":"38/5902","text":"Eric Koskinen"}]},"title":"Commutativity race detection.","venue":"PLDI","pages":"305-315","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pldi/DimitrovRVK14","doi":"10.1145/2594291.2594322","ee":"https://doi.org/10.1145/2594291.2594322","url":"https://dblp.org/rec/conf/pldi/DimitrovRVK14"}, "url":"URL#3929022" }, { "@score":"1", "@id":"3929031", "info":{"authors":{"author":[{"@pid":"117/3635","text":"David Greenaway"},{"@pid":"145/1087","text":"Japheth Lim"},{"@pid":"11/6441","text":"June Andronick"},{"@pid":"74/2171","text":"Gerwin Klein"}]},"title":"Don't sweat the small stuff: formal verification of C code without the pain.","venue":"PLDI","pages":"429-439","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pldi/GreenawayLAK14","doi":"10.1145/2594291.2594296","ee":"https://doi.org/10.1145/2594291.2594296","url":"https://dblp.org/rec/conf/pldi/GreenawayLAK14"}, "url":"URL#3929031" }, { "@score":"1", "@id":"3929032", "info":{"authors":{"author":[{"@pid":"145/1014","text":"Ben Greenman"},{"@pid":"145/1074","text":"Fabian Muehlboeck"},{"@pid":"56/893","text":"Ross Tate"}]},"title":"Getting F-bounded polymorphism into shape.","venue":"PLDI","pages":"89-99","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pldi/GreenmanMT14","doi":"10.1145/2594291.2594308","ee":"https://doi.org/10.1145/2594291.2594308","url":"https://dblp.org/rec/conf/pldi/GreenmanMT14"}, "url":"URL#3929032" }, { "@score":"1", "@id":"3929034", "info":{"authors":{"author":[{"@pid":"01/1604","text":"Gagan Gupta"},{"@pid":"72/5661","text":"Srinath Sridharan"},{"@pid":"s/GurindarSSohi","text":"Gurindar S. Sohi"}]},"title":"Globally precise-restartable execution of parallel programs.","venue":"PLDI","pages":"181-192","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pldi/GuptaSS14","doi":"10.1145/2594291.2594306","ee":"https://doi.org/10.1145/2594291.2594306","url":"https://dblp.org/rec/conf/pldi/GuptaSS14"}, "url":"URL#3929034" }, { "@score":"1", "@id":"3929035", "info":{"authors":{"author":[{"@pid":"73/10322","text":"Matthew A. Hammer"},{"@pid":"13/365","text":"Yit Phang Khoo"},{"@pid":"h/MichaelWHicks","text":"Michael Hicks 0001"},{"@pid":"18/2050","text":"Jeffrey S. Foster"}]},"title":"Adapton: composable, demand-driven incremental computation.","venue":"PLDI","pages":"156-166","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pldi/HammerKHF14","doi":"10.1145/2594291.2594324","ee":"https://doi.org/10.1145/2594291.2594324","url":"https://dblp.org/rec/conf/pldi/HammerKHF14"}, "url":"URL#3929035" }, { "@score":"1", "@id":"3929036", "info":{"authors":{"author":[{"@pid":"17/1867","text":"Reinhard von Hanxleden"},{"@pid":"129/7590","text":"Björn Duderstadt"},{"@pid":"81/8643","text":"Christian Motika"},{"@pid":"145/1000","text":"Steven Smyth"},{"@pid":"90/6305","text":"Michael Mendler"},{"@pid":"37/5514","text":"Joaquín Aguado"},{"@pid":"129/7717","text":"Stephen Mercer"},{"@pid":"129/7689","text":"Owen O'Brien"}]},"title":"SCCharts: sequentially constructive statecharts for safety-critical applications: HW/SW-synthesis for a conservative extension of synchronous statecharts.","venue":"PLDI","pages":"372-383","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pldi/HanxledenDMSMAMO14","doi":"10.1145/2594291.2594310","ee":"https://doi.org/10.1145/2594291.2594310","url":"https://dblp.org/rec/conf/pldi/HanxledenDMSMAMO14"}, "url":"URL#3929036" }, { "@score":"1", "@id":"3929038", "info":{"authors":{"author":{"@pid":"h/CARHoare","text":"Tony Hoare"}},"title":"Laws of concurrent programming.","venue":"PLDI","pages":"168","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pldi/Hoare14","doi":"10.1145/2594291.2604002","ee":"https://doi.org/10.1145/2594291.2604002","url":"https://dblp.org/rec/conf/pldi/Hoare14"}, "url":"URL#3929038" }, { "@score":"1", "@id":"3929039", "info":{"authors":{"author":[{"@pid":"145/1103","text":"Chun-Hung Hsiao"},{"@pid":"36/6883","text":"Cristiano Pereira"},{"@pid":"74/3437-16","text":"Jie Yu 0016"},{"@pid":"78/3196","text":"Gilles Pokam"},{"@pid":"27/3820","text":"Satish Narayanasamy"},{"@pid":"c/PeterMChen","text":"Peter M. Chen"},{"@pid":"145/0977","text":"Ziyun Kong"},{"@pid":"14/85","text":"Jason Flinn"}]},"title":"Race detection for event-driven mobile applications.","venue":"PLDI","pages":"326-336","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pldi/HsiaoPYPNCKF14","doi":"10.1145/2594291.2594330","ee":"https://doi.org/10.1145/2594291.2594330","url":"https://dblp.org/rec/conf/pldi/HsiaoPYPNCKF14"}, "url":"URL#3929039" }, { "@score":"1", "@id":"3929041", "info":{"authors":{"author":[{"@pid":"68/4706-1","text":"Jeff Huang 0001"},{"@pid":"29/1064","text":"Patrick O'Neil Meredith"},{"@pid":"r/GrigoreRosu","text":"Grigore Rosu"}]},"title":"Maximal sound predictive race detection with control flow abstraction.","venue":"PLDI","pages":"337-348","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pldi/HuangMR14","doi":"10.1145/2594291.2594315","ee":"https://doi.org/10.1145/2594291.2594315","url":"https://dblp.org/rec/conf/pldi/HuangMR14"}, "url":"URL#3929041" }, { "@score":"1", "@id":"3929042", "info":{"authors":{"author":[{"@pid":"75/3287","text":"Chung-Kil Hur"},{"@pid":"n/AdityaVNori","text":"Aditya V. Nori"},{"@pid":"r/SriramKRajamani","text":"Sriram K. Rajamani"},{"@pid":"145/1089","text":"Selva Samuel"}]},"title":"Slicing probabilistic programs.","venue":"PLDI","pages":"133-144","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pldi/HurNRS14","doi":"10.1145/2594291.2594303","ee":"https://doi.org/10.1145/2594291.2594303","url":"https://dblp.org/rec/conf/pldi/HurNRS14"}, "url":"URL#3929042" }, { "@score":"1", "@id":"3929044", "info":{"authors":{"author":[{"@pid":"j/SJagannathan","text":"Suresh Jagannathan"},{"@pid":"11/4177","text":"Gustavo Petri"},{"@pid":"v/JanVitek","text":"Jan Vitek"},{"@pid":"37/6728","text":"David Pichardie"},{"@pid":"66/8883","text":"Vincent Laporte"}]},"title":"Atomicity refinement for verified compilation.","venue":"PLDI","pages":"27","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pldi/JagannathanPVPL14","doi":"10.1145/2594291.2594346","ee":"https://doi.org/10.1145/2594291.2594346","url":"https://dblp.org/rec/conf/pldi/JagannathanPVPL14"}, "url":"URL#3929044" }, { "@score":"1", "@id":"3929049", "info":{"authors":{"author":[{"@pid":"139/2539","text":"Lindsey Kuper"},{"@pid":"145/0976","text":"Aaron Todd"},{"@pid":"56/3287","text":"Sam Tobin-Hochstadt"},{"@pid":"34/3982","text":"Ryan R. Newton"}]},"title":"Taming the parallel effect zoo: extensible deterministic parallelism with LVish.","venue":"PLDI","pages":"2-14","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pldi/KuperTTN14","doi":"10.1145/2594291.2594312","ee":"https://doi.org/10.1145/2594291.2594312","url":"https://dblp.org/rec/conf/pldi/KuperTTN14"}, "url":"URL#3929049" }, { "@score":"1", "@id":"3929050", "info":{"authors":{"author":[{"@pid":"00/2651-2","text":"Vu Le 0002"},{"@pid":"131/1698","text":"Mehrdad Afshari"},{"@pid":"s/ZhendongSu","text":"Zhendong Su 0001"}]},"title":"Compiler validation via equivalence modulo inputs.","venue":"PLDI","pages":"216-226","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pldi/LeAS14","doi":"10.1145/2594291.2594334","ee":"https://doi.org/10.1145/2594291.2594334","url":"https://dblp.org/rec/conf/pldi/LeAS14"}, "url":"URL#3929050" }, { "@score":"1", "@id":"3929051", "info":{"authors":{"author":[{"@pid":"00/2651-2","text":"Vu Le 0002"},{"@pid":"g/SumitGulwani","text":"Sumit Gulwani"}]},"title":"FlashExtract: a framework for data extraction by examples.","venue":"PLDI","pages":"542-553","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pldi/LeG14","doi":"10.1145/2594291.2594333","ee":"https://doi.org/10.1145/2594291.2594333","url":"https://dblp.org/rec/conf/pldi/LeG14"}, "url":"URL#3929051" }, { "@score":"1", "@id":"3929054", "info":{"authors":{"author":[{"@pid":"92/3","text":"Francesco Logozzo"},{"@pid":"32/2903","text":"Shuvendu K. Lahiri"},{"@pid":"f/ManuelFahndrich","text":"Manuel Fähndrich"},{"@pid":"86/8008","text":"Sam Blackshear"}]},"title":"Verification modulo versions: towards usable verification.","venue":"PLDI","pages":"294-304","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pldi/LogozzoLFB14","doi":"10.1145/2594291.2594326","ee":"https://doi.org/10.1145/2594291.2594326","url":"https://dblp.org/rec/conf/pldi/LogozzoLFB14"}, "url":"URL#3929054" }, { "@score":"1", "@id":"3929055", "info":{"authors":{"author":[{"@pid":"55/3921","text":"Fan Long"},{"@pid":"37/1475","text":"Stelios Sidiroglou-Douskos"},{"@pid":"r/MartinCRinard","text":"Martin C. Rinard"}]},"title":"Automatic runtime error repair and containment via recovery shepherding.","venue":"PLDI","pages":"227-238","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pldi/LongSR14","doi":"10.1145/2594291.2594337","ee":"https://doi.org/10.1145/2594291.2594337","url":"https://dblp.org/rec/conf/pldi/LongSR14"}, "url":"URL#3929055" }, { "@score":"1", "@id":"3929056", "info":{"authors":{"author":[{"@pid":"72/2266","text":"Li Lu"},{"@pid":"45/2857","text":"Weixing Ji"},{"@pid":"s/MichaelLScott","text":"Michael L. Scott"}]},"title":"Dynamic enforcement of determinism in a parallel scripting language.","venue":"PLDI","pages":"519-529","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pldi/LuJS14","doi":"10.1145/2594291.2594300","ee":"https://doi.org/10.1145/2594291.2594300","url":"https://dblp.org/rec/conf/pldi/LuJS14"}, "url":"URL#3929056" }, { "@score":"1", "@id":"3929057", "info":{"authors":{"author":[{"@pid":"145/1016","text":"Loi Luu"},{"@pid":"136/8404","text":"Shweta Shinde"},{"@pid":"90/105","text":"Prateek Saxena"},{"@pid":"47/3381","text":"Brian Demsky"}]},"title":"A model counter for constraints over unbounded strings.","venue":"PLDI","pages":"565-576","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/pldi/LuuSSD14","doi":"10.1145/2594291.2594331","ee":"https://doi.org/10.1145/2594291.2594331","url":"https://dblp.org/rec/conf/pldi/LuuSSD14"}, "url":"URL#3929057" } ] } } } )