<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
	<channel>
		<title>ACM Transactions on Programming Languages and Systems (TOPLAS)</title>
		<link>http://dl.acm.org/citation.cfm?id=3470134</link>
		<description />
		<item>
			<title>ACM Transactions on Programming Languages and Systems (TOPLAS)</title>
			<link>http://dl.acm.org/citation.cfm?id=3470134</link>
			<description />
			<pubDate>Wed, 30 Jun 2021 00:00:00 GMT </pubDate>
			<author />
			<guid isPermaLink="false">3470134</guid>
		</item>
		<item>
			<title>Armed Cats: Formal Concurrency Modelling at Arm</title>
			<link>http://dl.acm.org/citation.cfm?id=3458926</link>
			<description><![CDATA[Jade Alglave, Will Deacon, Richard Grisenthwaite, Antoine Hacquard, Luc Maranget<br /><br />We report on the process for formal concurrency modelling at Arm. An initial formal consistency model of the Arm achitecture, written in the cat language, was published and upstreamed to the herd+diy tool suite in 2017. Since then, we have extended the original model with extra features, for example, mixed-size accesses, and produced two provably equivalent alternative formulations. In this article, we present a comprehensive review of work done at Arm on the consistency model. Along the way, we also show that our principle for handling mixed-size accesses applies to x86: We confirm this via vast experimental campaigns.]]></description>
			<pubDate>Fri, 23 Jul 2021 00:00:00 GMT </pubDate>
			<author />
			<guid isPermaLink="false">3458926</guid>
		</item>
		<item>
			<title>On Polymorphic Sessions and Functions: A Tale of Two (Fully Abstract) Encodings</title>
			<link>http://dl.acm.org/citation.cfm?id=3457884</link>
			<description><![CDATA[Bernardo Toninho, Nobuko Yoshida<br /><br />This work exploits the logical foundation of session types to determine what kind of type discipline for the &#x039B;-calculus can exactly capture, and is captured by, &#x039B;-calculus behaviours. Leveraging the proof theoretic content of the soundness and completeness of sequent calculus and natural deduction presentations of linear logic, we develop the first mutually inverse and fully abstract processes-as-functions and functions-as-processes encodings between a polymorphic session &#x03C0;-calculus and a linear formulation of System F.]]></description>
			<pubDate>Thu, 10 Jun 2021 00:00:00 GMT </pubDate>
			<author />
			<guid isPermaLink="false">3457884</guid>
		</item>
		<item>
			<title>Ranking and Repulsing Supermartingales for Reachability in Randomized Programs</title>
			<link>http://dl.acm.org/citation.cfm?id=3450967</link>
			<description><![CDATA[Toru Takisaka, Yuichiro Oyabu, Natsuki Urabe, Ichiro Hasuo<br /><br />Computing reachability probabilities is a fundamental problem in the analysis of randomized programs. This article aims at a comprehensive and comparative account of various martingale-based methods for over- and under-approximating reachability probabilities. Based on the existing works that stretch across different communities (formal verification, control theory, etc.), we offer a unifying account. In particular, we emphasize the role of order-theoretic fixed points&#x02014;a classic topic in computer science&#x02014;in the analysis of randomized programs. This leads us to two new martingale-based techniques, too. We also make an experimental comparison using our implementation of template-based synthesis algorithms for those martingales.]]></description>
			<pubDate>Tue, 08 Jun 2021 00:00:00 GMT </pubDate>
			<author />
			<guid isPermaLink="false">3450967</guid>
		</item>
		<item>
			<title>A Programming Language for Data Privacy with Accuracy Estimations</title>
			<link>http://dl.acm.org/citation.cfm?id=3452096</link>
			<description><![CDATA[Elisabet Lobo-Vesga, Alejandro Russo, Marco Gaboardi<br /><br />Differential privacy offers a formal framework for reasoning about the privacy and accuracy of computations on private data. It also offers a rich set of building blocks for constructing private data analyses. When carefully calibrated, these analyses simultaneously guarantee the privacy of the individuals contributing their data, and the accuracy of the data analysis results, inferring useful properties about the population. The compositional nature of differential privacy has motivated the design and implementation of several programming languages to ease the implementation of differentially private analyses. Even though these programming languages provide support for reasoning about privacy, most of them disregard reasoning about the accuracy of data analyses.]]></description>
			<pubDate>Tue, 08 Jun 2021 00:00:00 GMT </pubDate>
			<author />
			<guid isPermaLink="false">3452096</guid>
		</item>
	</channel>
</rss>
