SAPLING 2015
November 20, 2015
SIT Lecture Theatre (Room 123), Building J12, The University of Sydney
Program
Talk slots are twenty minutes including questions.
| 09:25 | Welcome |
| 09:30-10:50 | Session 1
|
Nicholas Hollingum, University of Sydney, Towards a Scalable Framework for Context-Free Language Reachability abstract slides
| |
Gary Miller, UTS, The Prospects for Programming-Experience Design: On the Beauty of Language abstract slides
| |
Scott Buckley, Macquarie, Web browsers as compilers abstract slides
| |
Pongsak Suvanpong and Anthony Sloane, Macquarie, Evaluating Kiama Abstract State Machines for a Java Implementation abstract slides
|
|
| 10:50-11:10 | Break |
| 11:10-12:30 | Session 2
|
Raghavendra K. R., Oracle Labs Brisbane, Issues in applying points-to analysis for large-scale Java library codebases abstract slides
| |
James Noble, VUW, Delegation isn’t quite Inheritance: Objects, Classes and Initialisation in Grace abstract slides
| |
Kunshan Wang, ANU, Draining the Swamp: Micro Virtual Machines as Solid Foundation for Language Development abstract
| |
John Zhang, ANU, MuPy: A First Language Client for Mu Micro Virtual Machine abstract slides
|
|
| 12:30-14:00 | Lunch
|
| 14:00-15:20 | Session 3
|
G. Gange et al., Melbourne, Program analysis and machine arithmetic abstract
| |
Pavle Subotic, UCL, Horn Clauses for Communicating Timed Systems abstract
| |
David J. Pearce, VUW, Can we Verify C with Whiley? abstract slides
| |
Yutaka Nagashima, NICTA, Try hard! Proof automation, efficient-proof-script reconstruction, and proof-planning in Isabelle using monads abstract slides
|
|
| 15:20-15:40 | Break
|
| 15:40-17:00 | Session 4
|
Francois Gauthier, Oracle Labs Brisbane, Static taint analysis of web applications: Haven't we solved this problem yet? abstract slides
| |
Amos Robinson, Ambiata, Icicle: Write Once, Run Once abstract slides
| |
Hayes et al., Queensland, Understanding Concurrent Programs using Rely-Guarantee Thinking abstract slides
| |
Yi Lu, Paddy Krishnan, Raghavendra K. R., Oracle Labs, Brisbane, From Access Control to Information Flow: Security Model and Static Analysis for Detecting Java Security Vulnerabilities abstract slides
|
|
| 17:00 | Wrap up
|