Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2024
Polymorphic Reachability Types: Tracking Freshness, Aliasing, and Separation in Higher-Order Generic Programs
Proceedings of the ACM on Programming Languages (PACMPL), Volume 8, Issue POPLArticle No.: 14, Pages 393–424https://doi.org/10.1145/3632856Fueled by the success of Rust, many programming languages are adding substructural features to their type systems. The promise of tracking properties such as lifetimes and sharing is tremendous, not just for low-level memory management, but also for ...
A flexible type system for fearless concurrency
PLDI 2022: Proceedings of the 43rd ACM SIGPLAN International Conference on Programming Language Design and ImplementationPages 458–473https://doi.org/10.1145/3519939.3523443This paper proposes a new type system for concurrent programs, allowing threads to exchange complex object graphs without risking destructive data races. While this goal is shared by a rich history of past work, existing solutions either rely on ...
- research-articleOctober 2021
Reachability types: tracking aliasing and separation in higher-order functional programs
Proceedings of the ACM on Programming Languages (PACMPL), Volume 5, Issue OOPSLAArticle No.: 139, Pages 1–32https://doi.org/10.1145/3485516Ownership type systems, based on the idea of enforcing unique access paths, have been primarily focused on objects and top-level classes. However, existing models do not as readily reflect the finer aspects of nested lexical scopes, capturing, or ...
Context-, flow-, and field-sensitive data-flow analysis using synchronized Pushdown systems
Proceedings of the ACM on Programming Languages (PACMPL), Volume 3, Issue POPLArticle No.: 48, Pages 1–29https://doi.org/10.1145/3290361Precise static analyses are context-, field- and flow-sensitive. Context- and field-sensitivity are both expressible as context-free language (CFL) reachability problems. Solving both CFL problems along the same data-flow path is undecidable, which is ...
- columnDecember 2018
Reasoning Challenges of Data Abstraction and Aliasing in Concurrent Programs
ACM SIGSOFT Software Engineering Notes (SIGSOFT), Volume 43, Issue 3Page 18https://doi.org/10.1145/3229783.3229799Substantial effort has been directed toward the specification and verification of concurrent programs. Separation logic is one such project and is considered by many to be the state of the art int he field. However, the shortcomings of separation logic ...
-
A practical type system for safe aliasing
SLE 2018: Proceedings of the 11th ACM SIGPLAN International Conference on Software Language EngineeringPages 133–146https://doi.org/10.1145/3276604.3276612Aliasing is a vital concept of programming, but it comes with a plethora of challenging issues, such as the problems related to race safety. This has motivated years of research, and promising solutions such as ownership or linear types have found their ...
- short-paperSeptember 2018
Towards automatic restrictification of CUDA kernel arguments
ASE '18: Proceedings of the 33rd ACM/IEEE International Conference on Automated Software EngineeringPages 928–931https://doi.org/10.1145/3238147.3241533Many procedural languages, such as C and C++, have pointers. Pointers are powerful and convenient, but pointer aliasing still hinders compiler optimizations, despite several years of research on pointer aliasing analysis. Because alias analysis is a ...
- short-paperAugust 2018
Detecting aliasing artifacts in image sequences using deep neural networks
HPG '18: Proceedings of the Conference on High-Performance GraphicsArticle No.: 4, Pages 1–4https://doi.org/10.1145/3231578.3231580In this short paper we present a machine learning approach to detect visual artifacts in rendered image sequences. Specifically, we train a deep neural network using example aliased and antialiased image sequences exported from a real-time renderer. The ...
IDEal: efficient and precise alias-aware dataflow analysis
Proceedings of the ACM on Programming Languages (PACMPL), Volume 1, Issue OOPSLAArticle No.: 99, Pages 1–27https://doi.org/10.1145/3133923Program analyses frequently track objects throughout a program, which requires reasoning about aliases. Most dataflow analysis frameworks, however, delegate the task of handling aliases to the analysis clients, which causes a number of problems. For ...
- research-articleMarch 2017
Automatic Detection of Game Engine Artifacts Using Full Reference Image Quality Metrics
ACM Transactions on Applied Perception (TAP), Volume 14, Issue 3Article No.: 14, Pages 1–17https://doi.org/10.1145/3047407Contemporary game engines offer an outstanding graphics quality but they are not free from visual artifacts. A typical example is aliasing, which, despite advanced antialiasing techniques, is still visible to the game players. Essential deteriorations ...
- short-paperOctober 2016
Short Paper: Rusty Types for Solid Safety
PLAS '16: Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for SecurityPages 69–75https://doi.org/10.1145/2993600.2993604Programs operating "close to the metal" necessarily handle memory directly. Because of this, they must be written in languages like C or C++. These languages lack any kind of guarantee on memory or race safety, often leading to security vulnerabilities ...
- research-articleJuly 2016
Clews 2
HCI '16: Proceedings of the 30th International BCS Human Computer Interaction Conference: Companion VolumeArticle No.: 5, Pages 1–2https://doi.org/10.14236/ewic/HCI2016.52Clews 2 is an update to Clews which was installed at the Slade School of Art in 1979. (Bell 2013)
Participants instruct a person with a video camera pointed at the maze to change their view by giving simple verbal instructions, 'up', 'down', 'left', '...
- research-articleApril 2016
An Imperative Pure Calculus
Electronic Notes in Theoretical Computer Science (ENTCS) (ENTCS), Volume 322, Issue CPages 87–102https://doi.org/10.1016/j.entcs.2016.03.007We present a simple calculus where imperative features are modeled by just rewriting source code terms, rather than by modifying an auxiliary structure which mimics physical memory. Formally, this is achieved by the block construct, introducing local ...
- research-articleApril 2016
Exploiting Linearity in Sharing Analysis of Object-oriented Programs
Electronic Notes in Theoretical Computer Science (ENTCS) (ENTCS), Volume 322, Issue CPages 3–18https://doi.org/10.1016/j.entcs.2016.03.002We propose a new sharing analysis of object-oriented programs based on abstract interpretation. Two variables share when they are bound to data structures which overlap. We show that sharing analysis can greatly benefit from linearity analysis. We ...
- research-articleMarch 2016
Cooperative decoupled processes: the e-calculus and linearity
MODULARITY 2016: Proceedings of the 15th International Conference on ModularityPages 82–93https://doi.org/10.1145/2889443.2889449Event-driven programming has become a major paradigm in developing concurrent, distributed systems. Its benefits are often informally captured by the key tenet of “decoupling”, a notion which roughly captures the ability of modules to join and leave (...
- tutorialNovember 2015
A Sample Reduction Technique by Aliasing Channel Response for Fast Equalizing Transceiver Design
ICCAD '15: Proceedings of the IEEE/ACM International Conference on Computer-Aided DesignPages 567–574This paper proposes a technique to reduce the sample number of channel's pulse response required to optimize equalization coefficients. In our method, channel's pulse response is aliased in calculating equalization coefficients reducing the number of ...
- research-articleSeptember 2015
Using full reference image quality metrics to detect game engine artefacts
SAP '15: Proceedings of the ACM SIGGRAPH Symposium on Applied PerceptionPages 83–90https://doi.org/10.1145/2804408.2804414Contemporary game engines offer an outstanding graphics quality but they are not free from visual artefacts. A typical example is aliasing, which, despite advanced antialiasing techniques, is still visible to the game players. Essential deteriorations ...
- research-articleJune 2015
High-level synthesis of error detecting cores through low-cost modulo-3 shadow datapaths
DAC '15: Proceedings of the 52nd Annual Design Automation ConferenceArticle No.: 161, Pages 1–6https://doi.org/10.1145/2744769.2744851In this study, we propose a low-cost approach to error detection for arithmetic orientated data paths by performing lightweight shadow computations in modulo-3 space for each main computation. By leveraging the binding and scheduling flexibility of high-...
- research-articleMay 2015
An Image Recapture Detection Algorithm Based on Learning Dictionaries of Edge Profiles
IEEE Transactions on Information Forensics and Security (TIFS), Volume 10, Issue 5Pages 953–968https://doi.org/10.1109/TIFS.2015.2392566With today's digital camera technology, high-quality images can be recaptured from an liquid crystal display (LCD) monitor screen with relative ease. An attacker may choose to recapture a forged image in order to conceal imperfections and to increase its ...
- research-articleMarch 2014
Sub-pixel shadow mapping
I3D '14: Proceedings of the 18th meeting of the ACM SIGGRAPH Symposium on Interactive 3D Graphics and GamesPages 103–110https://doi.org/10.1145/2556700.2556709The limited resolution of shadow maps (SM) may result in erroneous shadowing, yielding artificially jagged edges and temporally crawling shadows even using perspective optimization techniques. We introduce Sub-Pixel Shadow Maps (SPSM) for real-time ...