Title/Authors | Title | Research Artifacts
[?] A research
artifact is any by-product of a research project that is not
directly included in the published research paper. In Computer
Science research this is often source code and data sets, but
it could also be media, documentation, inputs to proof
assistants, shell-scripts to run experiments, etc.
|
Details |
---|
Selective control-flow abstraction via jumping Sam Blackshear, Bor-Yuh Evan Chang, Manu Sridharan |
Selective control-flow abstraction via jumping Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Optimizing hash-array mapped tries for fast and lean immutable JVM collections Michael J. Steindorfer, Jurgen J. Vinju |
Optimizing hash-array mapped tries for fast and lean immutable JVM collections Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Learning a strategy for adapting a program analysis via bayesian optimisation Hakjoo Oh, Hongseok Yang, Kwangkeun Yi |
Learning a strategy for adapting a program analysis via bayesian optimisation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Remote-scope promotion: clarified, rectified, and verified John Wickerson, Mark Batty, Bradford M. Beckmann, Alastair F. Donaldson |
Remote-scope promotion: clarified, rectified, and verified Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Ravichandhran Madhavan, Mikaël Mayer, Sumit Gulwani, Viktor Kuncak |
Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
(Open-source code available with MIT license)
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Runtime pointer disambiguation Péricles Alves, Fabian Gruber, Johannes Doerfert, Alexandros Lamprineas, Tobias Grosser, Fabrice Rastello, Fernando Magno Quintão Pereira |
Runtime pointer disambiguation Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Vectorization of apply to reduce interpretation overhead of R Haichuan Wang, David A. Padua, Peng Wu |
Vectorization of apply to reduce interpretation overhead of R Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Scalable race detection for Android applications Pavol Bielik, Veselin Raychev, Martin T. Vechev |
Scalable race detection for Android applications Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Disjointness domains for fine-grained aliasing Stephan Brandauer, Dave Clarke, Tobias Wrigstad |
Disjointness domains for fine-grained aliasing Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Use at your own risk: the Java unsafe API in the wild Luis Mastrangelo, Luca Ponzanelli, Andrea Mocci, Michele Lanza, Matthias Hauswirth, Nathaniel Nystrom |
Use at your own risk: the Java unsafe API in the wild Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Galois transformers and modular abstract interpreters: reusable metatheory for program analysis David Darais, Matthew Might, David Van Horn |
Galois transformers and modular abstract interpreters: reusable metatheory for program analysis Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Automating ad hoc data representation transformations Vlad Ureche, Aggelos Biboudis, Yannis Smaragdakis, Martin Odersky |
Automating ad hoc data representation transformations Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Accurate profiling in the presence of dynamic compilation Yudi Zheng, Lubomír Bulej, Walter Binder |
Accurate profiling in the presence of dynamic compilation Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A sound and optimal incremental build system with dynamic dependencies Sebastian Erdweg, Moritz Lichter, Manuel Weiel |
A sound and optimal incremental build system with dynamic dependencies Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Customizable gradual polymorphic effects for Scala Matías Toro, Éric Tanter |
Customizable gradual polymorphic effects for Scala Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
How scale affects structure in Java programs Cristina V. Lopes, Joel Ossher |
How scale affects structure in Java programs Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Automatic memory reclamation for lock-free data structures Nachshon Cohen, Erez Petrank |
Automatic memory reclamation for lock-free data structures Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
John Bender, Mohsen Lesani, Jens Palsberg |
Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Reasoning about the POSIX file system: local update and global pathnames Gian Ntzik, Philippa Gardner |
Reasoning about the POSIX file system: local update and global pathnames Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
EXPLORER : query- and demand-driven exploration of interprocedural control flow properties Yu Feng, Xinyu Wang, Isil Dillig, Calvin Lin |
EXPLORER : query- and demand-driven exploration of interprocedural control flow properties Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Approximate computation with outlier detection in Topaz Sara Achour, Martin C. Rinard |
Approximate computation with outlier detection in Topaz Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Checks and balances: constraint solving without surprises in object-constraint programming languages Tim Felgentreff, Todd D. Millstein, Alan Borning, Robert Hirschfeld |
Checks and balances: constraint solving without surprises in object-constraint programming languages Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Stefan Marr, Stéphane Ducasse |
Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Partial evaluation of machine code Venkatesh Srinivasan, Thomas W. Reps |
Partial evaluation of machine code Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced no artifacts
Verification:
Authors have
verified
information
|
Static analysis of event-driven Node.js JavaScript applications Magnus Madsen, Frank Tip, Ondrej Lhoták |
Static analysis of event-driven Node.js JavaScript applications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
The chemical approach to typestate-oriented programming Silvia Crafa, Luca Padovani |
The chemical approach to typestate-oriented programming Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Versatile yet lightweight record-and-replay for Android Yongjian Hu, Tanzirul Azim, Iulian Neamtiu |
Versatile yet lightweight record-and-replay for Android Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
AutoMO: automatic inference of memory order parameters for C/C++11 Peizhao Ou, Brian Demsky |
AutoMO: automatic inference of memory order parameters for C/C++11 Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Synthesizing Java expressions from free-form queries Tihomir Gvero, Viktor Kuncak |
Synthesizing Java expressions from free-form queries Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Programming with enumerable sets of structures Ivan Kuraj, Viktor Kuncak, Daniel Jackson |
Programming with enumerable sets of structures Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
A co-contextual formulation of type rules and its application to incremental type checking Sebastian Erdweg, Oliver Bracevac, Edlira Kuci, Matthias Krebs, Mira Mezini |
A co-contextual formulation of type rules and its application to incremental type checking Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Probability type inference for flexible approximate programming Brett Boston, Adrian Sampson, Dan Grossman, Luis Ceze |
Probability type inference for flexible approximate programming Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Incremental computation with names Matthew A. Hammer, Joshua Dunfield, Kyle Headley, Nicholas Labich, Jeffrey S. Foster, Michael W. Hicks, David Van Horn |
Incremental computation with names Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Ganesha Upadhyaya, Hridesh Rajan |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Interactively verifying absence of explicit information flows in Android apps Osbert Bastani, Saswat Anand, Alex Aiken |
Interactively verifying absence of explicit information flows in Android apps Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Stateless model checking of event-driven applications Casper Svenning Jensen, Anders Møller, Veselin Raychev, Dimitar Dimitrov, Martin T. Vechev |
Stateless model checking of event-driven applications Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Giga-scale exhaustive points-to analysis for Java in under a minute Jens Dietrich, Nicholas Hollingum, Bernhard Scholz |
Giga-scale exhaustive points-to analysis for Java in under a minute Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
RAIVE: runtime assessment of floating-point instability by vectorization Wen-Chuan Lee, Tao Bao, Yunhui Zheng, Xiangyu Zhang, Keval Vora, Rajiv Gupta |
RAIVE: runtime assessment of floating-point instability by vectorization Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Martin Aigner, Christoph M. Kirsch, Michael Lippautz, Ana Sokolova |
Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Scrap your boilerplate with object algebras Haoyuan Zhang, Zewei Chu, Bruno C. d. S. Oliveira, Tijs van der Storm |
Scrap your boilerplate with object algebras Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Synthesis of layout engines from relational constraints Thibaud Hottelier, Rastislav Bodík |
Synthesis of layout engines from relational constraints Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Performance problems you can fix: a dynamic analysis of memoization opportunities Luca Della Toffola, Michael Pradel, Thomas R. Gross |
Performance problems you can fix: a dynamic analysis of memoization opportunities Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
ShamDroid: gracefully degrading functionality in the presence of limited resource access Lucas Brutschy, Pietro Ferrara, Omer Tripp, Marco Pistoia |
ShamDroid: gracefully degrading functionality in the presence of limited resource access Details |
|
Author Comments:
N/A
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Finding deep compiler bugs via guided stochastic program mutation Vu Le, Chengnian Sun, Zhendong Su |
Finding deep compiler bugs via guided stochastic program mutation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Automated backward error analysis for numerical code Zhoulai Fu, Zhaojun Bai, Zhendong Su |
Automated backward error analysis for numerical code Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Valor: efficient, software-only region conflict exceptions Swarnendu Biswas, Minjia Zhang, Michael D. Bond, Brandon Lucia |
Valor: efficient, software-only region conflict exceptions Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Conditionally correct superoptimization Rahul Sharma, Eric Schkufza, Berkeley R. Churchill, Alex Aiken |
Conditionally correct superoptimization Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Cross-layer memory management for managed language applications Michael R. Jantz, Forrest J. Robinson, Prasad A. Kulkarni, Kshitij A. Doshi |
Cross-layer memory management for managed language applications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
FlashMeta: a framework for inductive program synthesis Oleksandr Polozov, Sumit Gulwani |
FlashMeta: a framework for inductive program synthesis Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
SATCheck: SAT-directed stateless model checking for SC and TSO Brian Demsky, Patrick Lam |
SATCheck: SAT-directed stateless model checking for SC and TSO Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Detecting redundant CSS rules in HTML5 applications: a tree rewriting approach Matthew Hague, Anthony Widjaja Lin, C.-H. Luke Ong |
Detecting redundant CSS rules in HTML5 applications: a tree rewriting approach Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Protocol-based verification of message-passing parallel programs Hugo A. López, Eduardo R. B. Marques, Francisco Martins, Nicholas Ng, César Santos, Vasco Thudichum Vasconcelos, Nobuko Yoshida |
Protocol-based verification of message-passing parallel programs Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Using C language extensions for developing embedded software: a case study Markus Voelter, Arie van Deursen, Bernd Kolb, Stephan Eberle |
Using C language extensions for developing embedded software: a case study Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|