Sciweavers

OOPSLA
2015
Springer
8 years 6 months ago
Constraints as a design pattern
Imperative programming has great merits. As the ubiquitous style, it is familiar and its linear, step by step nature is favored by the human mind. Expert programmers, however, are...
Hesam Samimi, Alessandro Warth, Mahdi Eslamimehr, ...
OOPSLA
2015
Springer
8 years 6 months ago
Static analysis of event-driven Node.js JavaScript applications
Many JavaScript programs are written in an event-driven style. In particular, in server-side Node.js applications, operations involving sockets, streams, and files are typically ...
Magnus Madsen, Frank Tip, Ondrej Lhoták
OOPSLA
2015
Springer
8 years 6 months ago
A formal foundation for trace-based JIT compilers
Trace-based JIT compilers identify frequently executed program paths at run-time and subsequently record, compile and optimize their execution. In order to improve the performance...
Maarten Vandercammen, Jens Nicolay, Stefan Marr, J...
OOPSLA
2015
Springer
8 years 6 months ago
Automating grammar comparison
We consider from a practical perspective the problem of checking equivalence of context-free grammars. We present techniques for proving equivalence, as well as techniques for fi...
Ravichandhran Madhavan, Mikaël Mayer, Sumit G...
OOPSLA
2015
Springer
8 years 6 months ago
GTInspector: a moldable domain-aware object inspector
Understanding the run-time behaviour of object-oriented applications entails the comprehension of run-time objects. Traditional object inspectors favor generic views that focus on...
Andrei Chis, Oscar Nierstrasz, Aliaksei Syrel, Tud...
OOPSLA
2015
Springer
8 years 6 months ago
Cross-layer memory management for managed language applications
Performance and energy efficiency in memory have become critically important for a wide range of computing domains. However, it is difficult to control and optimize memory power...
Michael R. Jantz, Forrest J. Robinson, Prasad A. K...
OOPSLA
2015
Springer
8 years 6 months ago
Gaps and future directions in mobile security research
The ease with which security flaws in today’s mobile devices can be exploited underscores the need for mobile security research. The advent of the Internet of Things (IoT)—wh...
Violetta Vylegzhanina, Douglas C. Schmidt, Jules W...
OOPSLA
2015
Springer
8 years 6 months ago
Finding deep compiler bugs via guided stochastic program mutation
Compiler testing is important and challenging. Equivalence Modulo Inputs (EMI) is a recent promising approach for compiler validation. It is based on mutating the unexecuted state...
Vu Le, Chengnian Sun, Zhendong Su
OOPSLA
2015
Springer
8 years 6 months ago
RAIVE: runtime assessment of floating-point instability by vectorization
Floating point representation has limited precision and inputs to floating point programs may also have errors. Consequently, during execution, errors are introduced, propagated,...
Wen-Chuan Lee, Tao Bao, Yunhui Zheng, Xiangyu Zhan...
OOPSLA
2015
Springer
8 years 6 months ago
Race-driven UI-level test generation for JavaScript-based web applications
Due to its asynchronous, event-driven nature, JavaScript, similar to concurrent programs, suffers from the problem of data races. Past research provides methods for automatically ...
Martin Billes