文件名称:PLDI 2011-ACM SIGPLAN conference on PLDI 2011
文件大小:34.16MB
文件格式:RAR
更新时间:2014-10-15 11:20:59
ACM 程序设计语言 编程方法及理论 PLDI
(我现在主要在CSDN上整理计算机安全、软件工程(可信软件)、系统及通信方面的论文及相关理论书籍,如果对这方面内容感兴趣,可以访问:http://qysh123.download.csdn.net/ 查看我上传的所有资料。内容比较多,需要大家人工手动查找。另外,资料顺序并不按照时间排列,只是想起来了就上传。请大家见谅。) 国际程序语言设计和分析方面的*会议,PLDI 2011年的论文集,关于PLDI的档次,可以参考下面这个链接:http://citeseerx.ist.psu.edu/stats/venues PLDI排在所有会议中的第三名,非常适合软件工程、编程语言、可信软件方面的研究人员阅读和参考。 大名鼎鼎的Pin,Valgrind等Framework就是最早由PLDI会议论文设计并提出,上述框架多用于程序代码的调试及二进制代码分析,程序插桩等方面。
【文件预览】:
PLDI 2011
----Debugging I()
--------LeakChaser _ helping programmers narrow down causes of memory leaks.pdf(617KB)
--------Toward generating reducible replay logs.pdf(579KB)
--------Higher-order test generation.pdf(489KB)
----Program verification I()
--------Mostly-automated verification of low-level programs in computational separation logic.pdf(524KB)
--------Probabilistic, modular and scalable inference of typestate specifications.pdf(786KB)
--------Predicate abstraction and CEGAR for higher-order model checking.pdf(471KB)
----Parallel programming notations()
--------Commutative set _ a language extension for implicit parallel programming.pdf(849KB)
--------Parallelism orchestration using DoPE _ the degree of parallelism executive.pdf(665KB)
--------The tao of parallelism in algorithms.pdf(634KB)
----Memory models()
--------Partial-coherence abstractions for relaxed memory models.pdf(931KB)
--------A case for an SC-preserving compiler.pdf(575KB)
--------Understanding POWER multiprocessors.pdf(523KB)
----Singular topics()
--------LL _ the foundation of the ANTLR parser generator.pdf(691KB)
--------Garbage collection for monitoring parametric properties.pdf(483KB)
----Debugging II()
--------kb-anonymity _ a model for anonymized behaviour-preserving test and debugging data.pdf(554KB)
--------Cause clue clauses _ error localization using maximum satisfiability.pdf(614KB)
----Transforming and editing by example()
--------Systematic editing _ generating program transformations from an example.pdf(2.06MB)
--------Spreadsheet table transformations from examples.pdf(557KB)
----Program paths()
--------Path-based inductive synthesis for program inversion.pdf(684KB)
--------Mining hot calling contexts in small space.pdf(503KB)
--------Directed incremental symbolic execution.pdf(579KB)
----Program analysis()
--------Precise and compact modular procedure summaries for heap manipulating programs.pdf(968KB)
--------On inter-procedural analysis of programs with lists and data.pdf(623KB)
--------Scaling abstraction refinement via pruning.pdf(693KB)
----Program optimization II()
--------Automatic CPU-GPU communication management and optimization.pdf(573KB)
--------EnerJ _ approximate data types for safe and general low-power computation.pdf(702KB)
--------Automatic compilation of MATLAB programs for synergistic execution on heterogeneous processors.pdf(1.06MB)
----Program parallelization()
--------ALTER _ exploiting breakable dependences for parallelization.pdf(541KB)
--------Kremlin _ rethinking and rebooting gprof for the multicore age.pdf(477KB)
--------Automatic parallelization via matrix multiplication.pdf(448KB)
----Program synthesis()
--------Data representation synthesis.pdf(700KB)
--------Synthesis of loop-free programs.pdf(664KB)
--------Synthesizing geometry constructions.pdf(791KB)
----Program optimization I()
--------Brainy _ effective selection of data structures.pdf(1.24MB)
--------An SSA-based algorithm for optimal speculative code motion under an execution profile.pdf(677KB)
--------Generalized just-in-time trace compilation using a parallel task farm in a dynamic binary translator.pdf(1.63MB)
----Concurrency defects()
--------Automated atomicity-violation fixing.pdf(591KB)
--------NDSeq _ runtime checking for nondeterministic sequential specifications of parallel correctness.pdf(1.29MB)
--------Isolating and understanding concurrency errors using reconstructed execution fragments.pdf(760KB)
----Concurrent programming()
--------Synchronization via scheduling _ techniques for efficiently managing shared state.pdf(855KB)
--------Composable asynchronous events.pdf(586KB)
----Security()
--------A security policy oracle _ detecting security holes using multiple API implementations.pdf(533KB)
--------Cruiser _ concurrent heap buffer overflow monitoring using lock-free data structures.pdf(640KB)
--------Language-independent sandboxing of just-in-time compilation and self-modifying code.pdf(612KB)
----Compiler correctness()
--------Evaluating value-graph translation validation for LLVM.pdf(737KB)
--------Safe optimisations for shared-memory concurrent programs.pdf(501KB)
--------Finding and understanding bugs in C compilers.pdf(622KB)
----Program verification II()
--------Exploiting the commutativity lattice.pdf(612KB)
--------Verification of semantic commutativity conditions and inverse operations on linked data structures.pdf(512KB)
--------Separation logic + superposition calculus = heap theorem prover.pdf(596KB)
----Taming wildcards()
--------Taming the wildcards _ combining definition- and use-site variance.pdf(560KB)
--------Taming wildcards in Java's type system.pdf(772KB)
----Domain specific languages and their compilers()
--------Steno _ automatic optimization of declarative queries.pdf(496KB)
--------Languages as libraries.pdf(549KB)
--------Caisson _ a hardware description language for secure information flow.pdf(1.31MB)