PLDI is a premier forum for all areas of programming language research, including the design, implementation, theory, and efficient use of languages. PLDI seeks outstanding research that has broad appeal to the entire programming languages community.

A recently updated Practices of PLDI is now available for reference and comments.

PLDI will take place June 15-17 (workshops and tutorials will take place June 13-14).

The PLDI’16 technical papers are available (once the conference starts and for one month following) via 1-click download from the ACM Digital Library.

Dates
You're viewing the program in a time zone which is different from your device's time zone change time zone

Wed 15 Jun

Displayed time zone: Tijuana, Baja California change

10:30 - 12:00
Verification IResearch Papers at Grand Ballroom San Rafael
Chair(s): Işıl Dillig University of Texas, Austin
10:30
30m
Talk
Data-Driven Precondition Inference with Learned Features
Research Papers
Saswat Padhi University of California, Los Angeles, Rahul Sharma Stanford University, Todd Millstein University of California, Los Angeles
Media Attached
11:00
30m
Talk
Cartesian Hoare Logic for Verifying k-Safety Properties
Research Papers
Marcelo Sousa University of Oxford, Işıl Dillig University of Texas, Austin
Media Attached
11:30
30m
Talk
Verifying Bit Manipulations of Floating-Point
Research Papers
Wonyeol Lee Stanford University, Rahul Sharma Stanford University, Alex Aiken Stanford University
Media Attached
10:30 - 12:00
Down to the Metal IResearch Papers at Grand Ballroom Santa Ynez
Chair(s): Stephen McCamant University of Minnesota
10:30
30m
Talk
Into the depths of C: elaborating the de facto standards
Research Papers
Kayvan Memarian University of Cambridge, Justus Matthiesen University of Cambridge, James Lingard University of Cambridge (when this work was done), Kyndylan Nienhuis University of Cambridge, David Chisnall University of Cambridge, Robert N. M. Watson University of Cambridge, Peter Sewell University of Cambridge
Link to publication Media Attached
11:00
30m
Talk
Living on the edge: Rapid-toggling probes with cross modification on x86
Research Papers
Buddhika Chamith , Bo Joel Svensson Indiana University, Luke Dalessandro Indiana University, Ryan R. Newton Indiana University
Pre-print Media Attached
11:30
30m
Talk
Polymorphic Type Inference for Machine Code
Research Papers
Matt Noonan GrammaTech, Inc, Alexey Loginov GrammaTech, Inc, David Cok GrammaTech, Inc
Pre-print Media Attached
13:30 - 15:00
Energy & PerformanceResearch Papers at Grand Ballroom San Rafael
Chair(s): Manuel Hermenegildo IMDEA Software Institute and T.U. of Madrid (UPM)
13:30
30m
Talk
Effective Padding of Multi-Dimensional Arrays to Avoid Cache Conflict Misses
Research Papers
Changwan Hong , Wenlei Bao , Albert Cohen INRIA, Sriram Krishnamoorthy Pacific Northwest National Laboratories, Louis-Noël Pouchet Ohio State University, J. Ramanujam Louisiana State University, Fabrice Rastello INRIA, France, P. Sadayappan Ohio State University
Media Attached
14:00
30m
Talk
GreenWeb: Language Extensions for Energy-Efficient Mobile Web Computing
Research Papers
Link to publication Media Attached
14:30
30m
Talk
Input Responsiveness: Using Canary Inputs to Dynamically Steer Approximation
Research Papers
Michael A. Laurenzano University of Michigan, Parker Hill , Mehrzad Samadi University of Michigan, Scott Mahlke University of Michigan, Jason Mars University of Michigan, Lingjia Tang University of Michigan
Media Attached
13:30 - 15:00
Testing & DebuggingResearch Papers at Grand Ballroom Santa Ynez
Chair(s): Benjamin Zorn Microsoft Research
13:30
30m
Talk
Coverage-Directed Differential Testing of JVM Implementations
Research Papers
Yuting Chen Shanghai Jiao Tong University, Ting Su East China Normal University, Chengnian Sun University of California at Davis, USA, Zhendong Su University of California, Davis, Jianjun Zhao Shanghai Jiao Tong University
Media Attached
14:00
30m
Talk
Exposing Errors Related to Weak Memory in GPU Applications
Research Papers
Tyler Sorensen University College London, Alastair F. Donaldson Imperial College London
Pre-print Media Attached
14:30
30m
Talk
Lightweight Computation Tree Tracing for Lazy Functional Languages
Research Papers
Maarten Faddegon University of Kent, UK, Olaf Chitil University of Kent, UK
Media Attached
15:30 - 17:00
Parsing & CompilationResearch Papers at Grand Ballroom San Rafael
Chair(s): Michelle Strout The University of Arizona
15:30
30m
Talk
Automatic Storage Optimization for Arrays [TOPLAS]
Research Papers
Somashekaracharya G Bhaskaracharya Indian Institute of Science and National Instruments, Uday Bondhugula Indian Institute of Science, Albert Cohen INRIA
Media Attached
16:00
30m
Talk
Polyhedral AST generation is more than scanning polyhedra [TOPLAS]
Research Papers
Tobias Grosser ETH Zurich, Switzerland, Sven Verdoolaege , Albert Cohen INRIA
Media Attached
16:30
30m
Talk
On the Complexity and Performance of Parsing with Derivatives
Research Papers
Michael D. Adams University of Utah, Celeste Hollenbeck University of Utah, Matthew Might University of Utah, USA
Pre-print Media Attached
15:30 - 17:00
15:30
30m
Talk
Configuration Synthesis for Programmable Analog Devices with Arco
Research Papers
Sara Achour Massachusetts Institute of Technology, USA, Rahul Sarpeshkar MIT, Martin C. Rinard Massachusetts Institute of Technology, USA
Media Attached
16:00
30m
Talk
From Datalog to Flix: A Declarative Language for Fixed Points on Lattices
Research Papers
Magnus Madsen University of Waterloo, Ming-Ho Yee University of Waterloo, Ondřej Lhoták University of Waterloo
DOI Media Attached
16:30
30m
Talk
Latte: A Language, Compiler, and Runtime for Elegant and Efficient Deep Neural Networks
Research Papers
Leonard Truong UC Berkeley / Intel Labs, Raj Barik Intel Labs, Ehsan Totoni Intel Labs, Hai Liu Intel Labs, Chick Markley UC Berkeley, Armando Fox UC Berkeley, Tatiana Shpeisman Intel Labs
Media Attached

Thu 16 Jun

Displayed time zone: Tijuana, Baja California change

10:30 - 12:00
Types IResearch Papers at Grand Ballroom San Rafael
Chair(s): David Walker Princeton University
10:30
30m
Talk
Accepting Blame for Safe Tunneled Exceptions
Research Papers
Yizhou Zhang Cornell University, Guido Salvaneschi TU Darmstadt, Quinn Beightol Cornell, Barbara Liskov MIT, Andrew Myers Cornell University
Link to publication DOI Media Attached
11:00
30m
Talk
Occurrence Typing Modulo Theories
Research Papers
Andrew Kent Indiana University, David Kempe II , Sam Tobin-Hochstadt Indiana University
Pre-print Media Attached
11:30
30m
Talk
Refinement Types for TypeScript
Research Papers
Panagiotis Vekris University of California, San Diego, Benjamin Cosman University of California, San Diego, Ranjit Jhala University of California, San Diego
Media Attached
10:30 - 12:00
Down to the Metal IIResearch Papers at Grand Ballroom Santa Ynez
Chair(s): Hans-J. Boehm Google
10:30
30m
Talk
Stratified Synthesis: Automatically Learning the x86-64 Instruction Set
Research Papers
Stefan Heule Stanford University, Eric Schkufza VMware Research Group, Rahul Sharma Stanford University, Alex Aiken Stanford University
DOI Pre-print Media Attached
11:00
30m
Talk
Remix: Online Detection and Repair of Cache Contention for the JVM
Research Papers
Ariel Eizenberg University of Pennsylvania, Shiliang Hu Intel Corporation, Gilles Pokam Intel Corporation, Joseph Devietti University of Pennsylvania
Media Attached
11:30
30m
Talk
Statistical Similarity of Binaries
Research Papers
Yaniv David Technion, Nimrod Partush Technion, Eran Yahav Technion
Media Attached
13:30 - 15:00
Software-Defined NetworkingResearch Papers at Grand Ballroom San Rafael
Chair(s): Todd Millstein University of California, Los Angeles
13:30
30m
Talk
Event-driven Network Programming
Research Papers
Jedidiah McClurg University of Colorado Boulder, Hossein Hojjat Cornell University, Nate Foster Cornell University, Pavol Cerny University of Colorado Boulder
Pre-print Media Attached
14:00
30m
Talk
Temporal NetKAT
Research Papers
Ryan Beckett Princeton University, Michael Greenberg Pomona College, David Walker Princeton University
Media Attached
14:30
30m
Talk
SDNRacer: Concurrency Analysis for Software-Defined Networks
Research Papers
Ahmed Elhassany ETH Zürich, Jeremie Miserez ETH Zürich, Pavol Bielik ETH Zurich, Switzerland, Laurent Vanbever ETH Zürich, Martin Vechev ETH Zurich
Media Attached
13:30 - 15:00
Synthesis IResearch Papers at Grand Ballroom Santa Ynez
Chair(s): Eran Yahav Technion
13:30
30m
Talk
MapReduce Program Synthesis
Research Papers
Calvin Smith University of Wisconsin - Madison, Aws Albarghouthi University of Wisconsin–Madison
Media Attached
14:00
30m
Talk
Programmatic and Direct Manipulation, Together at Last
Research Papers
Ravi Chugh University of Chicago, Brian Hempel University of Chicago, Mitchell Spradlin University of Chicago, Jacob Albers University of Chicago
Pre-print Media Attached
14:30
30m
Talk
Fast Synthesis of Fast Collections
Research Papers
Calvin Loncaric University of Washington, Emina Torlak University of Washington, Michael D. Ernst University of Washington
Media Attached
15:30 - 17:00
Types IIResearch Papers at Grand Ballroom San Rafael
Chair(s): Jean Yang Carnegie Mellon University
15:30
30m
Talk
Just-in-Time Static Type Checking for Dynamic Languages
Research Papers
Brianna M. Ren University of Maryland, College Park, Jeffrey S. Foster University of Maryland, College Park
Media Attached
16:00
30m
Talk
Types from data: Making structured data first-class citizens in F#
Research Papers
Tomas Petricek University of Cambridge, UK, Don Syme Microsoft, Gustavo Guerra Microsoft Corporation, London
Pre-print Media Attached
16:30
30m
Talk
Automatically Learning Shape Specifications
Research Papers
He Zhu Purdue University, Gustavo Petri LIAFA, Université Paris Diderot, Suresh Jagannathan Purdue University
Media Attached
15:30 - 17:00
Verifying SystemsResearch Papers at Grand Ballroom Santa Ynez
Chair(s): Santosh Nagarakatte Rutgers University
15:30
30m
Talk
Rehearsal: A Configuration Verification Tool for Puppet
Research Papers
Rian Shambaugh University of Massachusetts Amherst, Aaron Weiss University of Massachusetts Amherst, Arjun Guha University of Massachusetts, Amherst
Pre-print Media Attached
16:00
30m
Talk
Toward Compositional Verification of Interruptible OS Kernels and Device Drivers
Research Papers
Hao Chen Yale University, Xiongnan (Newman) Wu Yale University, Zhong Shao Yale University, Joshua Lockerman Yale University, Ronghui Gu Yale University
Pre-print Media Attached
16:30
30m
Talk
Verified Peephole Optimizations for CompCert
Research Papers
Eric Mullen University of Washington, Daryl Zuniga University of Washington, Zachary Tatlock University of Washington, Seattle, Dan Grossman University of Washington, USA
Pre-print Media Attached
17:00 - 18:00
Parallelism IResearch Papers at Grand Ballroom San Rafael
Chair(s): Tony Hosking Australian National University, Data61, and Purdue University
17:00
30m
Talk
Higher-Order and Tuple-Based Massively-Parallel Prefix Sums
Research Papers
Sepideh Maleki Texas State University, Annie Yang Texas State University, Martin Burtscher Texas State University
Pre-print Media Attached
17:30
30m
Talk
A Distributed OpenCL Framework using Redundant Computation and Data Replication
Research Papers
Junghyun Kim Seoul National University, Gangwon Jo Seoul National University, Jaehoon Jung Seoul National University, Jungwon Kim Oak Ridge National Laboratory, Jaejin Lee Seoul National University
Media Attached
17:00 - 18:00
Synthesis IIResearch Papers at Grand Ballroom Santa Ynez
Chair(s): Martin Vechev ETH Zurich
17:00
30m
Talk
Synthesizing Transformations on Hierarchically Structured Data
Research Papers
Navid Yaghmazadeh University of Texas, Austin, Christian Klinger University of Texas, Austin, Işıl Dillig University of Texas, Austin, Swarat Chaudhuri Rice University
Media Attached
17:30
30m
Talk
Program Synthesis from Polymorphic Refinement Types
Research Papers
Nadia Polikarpova MIT CSAIL, USA, Ivan Kuraj MIT CSAIL, USA, Armando Solar-Lezama MIT
Media Attached

Fri 17 Jun

Displayed time zone: Tijuana, Baja California change

09:00 - 10:00
09:00
30m
Talk
Cardinalities and Universal Quantifiers for Verifying Parameterized Systems
Research Papers
Nikolaj Bjørner Microsoft Research, Klaus Gleissenthall Technische Universität München, Andrey Rybalchenko Microsoft Research
Media Attached
09:30
30m
Talk
Ivy: Safety Verification by Interactive Generalization
Research Papers
Oded Padon Tel Aviv University, Kenneth L. McMillan Microsoft Research, Aurojit Panda , Mooly Sagiv Tel Aviv University, Sharon Shoham
Media Attached
09:00 - 10:00
Memory ManagementResearch Papers at Grand Ballroom Santa Ynez
Chair(s): Sam Guyer Tufts University
09:00
30m
Talk
Idle Time Garbage Collection Scheduling
Research Papers
Media Attached
09:30
30m
Talk
Assessing the Limits of Program-Specific Garbage Collection Performance
Research Papers
Nicholas Jacek UMass Amherst, Meng-Chieh Chiu UMass Amherst, Benjamin Marlin UMass Amherst, Eliot Moss University of Massachusetts Amherst
Media Attached
10:30 - 12:00
Parallelism IIResearch Papers at Grand Ballroom San Rafael
Chair(s): Albert Cohen INRIA
10:30
30m
Talk
Transactional Data Structure Libraries
Research Papers
Alexander Spiegelman Technion - Israel institute of technology, Guy Golan-Gueta Yahoo Labs, Idit Keidar Technion - Israel institute of technology
Media Attached
11:00
30m
Talk
FlexVec: Auto-Vectorization for Irregular Loops
Research Papers
Sara Baghsorkhi Intel Labs, Nalini Vasudevan Google, Youfeng Wu Intel Corporation
Media Attached
11:30
30m
Talk
Verified Lifting of Stencil Computations
Research Papers
Shoaib Kamil MIT CSAIL, USA, Alvin Cheung University of Washington, Shachar Itzhaky MIT CSAIL, Armando Solar-Lezama MIT
Media Attached
10:30 - 12:00
SecurityResearch Papers at Grand Ballroom Santa Ynez
Chair(s): Andrew Myers Cornell University
10:30
30m
Talk
Precise, Dynamic Information Flow for Database-Backed Applications
Research Papers
Jean Yang Carnegie Mellon University, Travis Hance Dropbox, Thomas H. Austin , Armando Solar-Lezama MIT, Cormac Flanagan UC Santa Cruz, Stephen Chong Harvard University
Link to publication Media Attached
11:00
30m
Talk
End-to-End Verification of Information-Flow Security for C and Assembly Programs
Research Papers
David Costanzo Yale University, Zhong Shao Yale University, Ronghui Gu Yale University
Pre-print Media Attached
11:30
30m
Talk
A Design and Verification Methodology for Secure Isolated Regions
Research Papers
Rohit Sinha University of California, Berkeley, Manuel Costa Microsoft Research, Akash Lal Microsoft Research India, Nuno P. Lopes Microsoft Research, Sriram Rajamani Microsoft Research, Sanjit Seshia UC Berkeley, Kapil Vaswani Microsoft Research
Media Attached

Accepted Papers

Title
Accepting Blame for Safe Tunneled Exceptions
Research Papers
Link to publication DOI Media Attached
A Design and Verification Methodology for Secure Isolated Regions
Research Papers
Media Attached
A Distributed OpenCL Framework using Redundant Computation and Data Replication
Research Papers
Media Attached
Assessing the Limits of Program-Specific Garbage Collection Performance
Research Papers
Media Attached
Automatically Learning Shape Specifications
Research Papers
Media Attached
Automatic Storage Optimization for Arrays [TOPLAS]
Research Papers
Media Attached
Cardinalities and Universal Quantifiers for Verifying Parameterized Systems
Research Papers
Media Attached
Cartesian Hoare Logic for Verifying k-Safety Properties
Research Papers
Media Attached
Configuration Synthesis for Programmable Analog Devices with Arco
Research Papers
Media Attached
Coverage-Directed Differential Testing of JVM Implementations
Research Papers
Media Attached
Data-Driven Precondition Inference with Learned Features
Research Papers
Media Attached
Effective Padding of Multi-Dimensional Arrays to Avoid Cache Conflict Misses
Research Papers
Media Attached
End-to-End Verification of Information-Flow Security for C and Assembly Programs
Research Papers
Pre-print Media Attached
Event-driven Network Programming
Research Papers
Pre-print Media Attached
Exposing Errors Related to Weak Memory in GPU Applications
Research Papers
Pre-print Media Attached
Fast Synthesis of Fast Collections
Research Papers
Media Attached
FlexVec: Auto-Vectorization for Irregular Loops
Research Papers
Media Attached
From Datalog to Flix: A Declarative Language for Fixed Points on Lattices
Research Papers
DOI Media Attached
GreenWeb: Language Extensions for Energy-Efficient Mobile Web Computing
Research Papers
Link to publication Media Attached
Higher-Order and Tuple-Based Massively-Parallel Prefix Sums
Research Papers
Pre-print Media Attached
Idle Time Garbage Collection Scheduling
Research Papers
Media Attached
Input Responsiveness: Using Canary Inputs to Dynamically Steer Approximation
Research Papers
Media Attached
Into the depths of C: elaborating the de facto standards
Research Papers
Link to publication Media Attached
Ivy: Safety Verification by Interactive Generalization
Research Papers
Media Attached
Just-in-Time Static Type Checking for Dynamic Languages
Research Papers
Media Attached
Latte: A Language, Compiler, and Runtime for Elegant and Efficient Deep Neural Networks
Research Papers
Media Attached
Lightweight Computation Tree Tracing for Lazy Functional Languages
Research Papers
Media Attached
Living on the edge: Rapid-toggling probes with cross modification on x86
Research Papers
Pre-print Media Attached
MapReduce Program Synthesis
Research Papers
Media Attached
Occurrence Typing Modulo Theories
Research Papers
Pre-print Media Attached
On the Complexity and Performance of Parsing with Derivatives
Research Papers
Pre-print Media Attached
Polyhedral AST generation is more than scanning polyhedra [TOPLAS]
Research Papers
Media Attached
Polymorphic Type Inference for Machine Code
Research Papers
Pre-print Media Attached
Precise, Dynamic Information Flow for Database-Backed Applications
Research Papers
Link to publication Media Attached
Programmatic and Direct Manipulation, Together at Last
Research Papers
Pre-print Media Attached
Program Synthesis from Polymorphic Refinement Types
Research Papers
Media Attached
Refinement Types for TypeScript
Research Papers
Media Attached
Rehearsal: A Configuration Verification Tool for Puppet
Research Papers
Pre-print Media Attached
Remix: Online Detection and Repair of Cache Contention for the JVM
Research Papers
Media Attached
SDNRacer: Concurrency Analysis for Software-Defined Networks
Research Papers
Media Attached
Statistical Similarity of Binaries
Research Papers
Media Attached
Stratified Synthesis: Automatically Learning the x86-64 Instruction Set
Research Papers
DOI Pre-print Media Attached
Synthesizing Transformations on Hierarchically Structured Data
Research Papers
Media Attached
Temporal NetKAT
Research Papers
Media Attached
Toward Compositional Verification of Interruptible OS Kernels and Device Drivers
Research Papers
Pre-print Media Attached
Transactional Data Structure Libraries
Research Papers
Media Attached
Types from data: Making structured data first-class citizens in F#
Research Papers
Pre-print Media Attached
Verified Lifting of Stencil Computations
Research Papers
Media Attached
Verified Peephole Optimizations for CompCert
Research Papers
Pre-print Media Attached
Verifying Bit Manipulations of Floating-Point
Research Papers
Media Attached

Call for Contributions

PLDI is a premier forum for all areas of programming language research, including the design, implementation, theory, and efficient use of languages. PLDI seeks outstanding research that has broad appeal and spans the breadth of programming languages.

Submissions

Please note that formatting requirements for PLDI’16 may be different from previous years. Details can be found in the Instructions for Authors. The submission site is https://pldi16.hotcrp.com.

To enable double-blind reviewing, author names and their affiliations must be omitted from submissions, and references to related work by the authors should be in the third person (e.g., not “We build on our previous work …” but rather “We build on the work of …”). However, nothing should be done in the name of anonymity that weakens the submission or makes the job of reviewing the paper more difficult (e.g., important background references should not be omitted or anonymized). If you have questions about the logistics for the double-blind reviewing process, please look at the double-blind reviewing FAQ (or click on tab above).

Papers must describe unpublished work that is not currently submitted for publication elsewhere as described by SIGPLAN’s Republication Policy. Submitters should also be aware of ACM’s Policy and Procedures on Plagiarism.

Evaluation Criteria

The program committee and the external review committee will evaluate the technical contribution of each submission as well as its general accessibility to the PLDI audience. Papers will be judged on significance, originality, and clarity. The paper must be organized so that it is easily understood by an audience with varied expertise. The paper should clearly identify what has been accomplished, why it is significant, and how it relates to previous work.

Artifact Evaluation Process

Authors of accepted papers will be invited to formally submit these supporting materials to the Artifact Evaluation process. The Artifact Evaluation process is run by a separate committee whose task is to assess how the artifacts support the work described in the papers. This submission is voluntary and will not influence the final decision regarding the papers. Papers that go through the Artifact Evaluation process successfully will receive a seal of approval printed on the papers themselves. Additional information will be available on the PLDI AEC web page closer to the submission deadline.

Publication

Authors of accepted papers will be required to sign an ACM copyright release.

AUTHORS TAKE NOTE: The official publication date is the date the proceedings are made available in the ACM Digital Library. This date may be up to two weeks prior to the first day of your conference. The official publication date affects the deadline for any patent filings related to published work. (For those rare conferences whose proceedings are published in the ACM Digital Library after the conference is over, the official publication date remains the first day of the conference.)

PLDI 2016- Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation

Full Citation in the ACM Digital Library

PLDI Keynote Presentation: Dr. Ben Zorn, Microsoft Research: Programming Languages and Technical Disruption

Down to the Metal I (Grand Ballroom Santa Ynez - Wednesday 10:30-12:00, Session Chair: Stephen McCamant)

Into the depths of C: elaborating the de facto standards

  • Kayvan Memarian
  • Justus Matthiesen
  • James Lingard
  • Kyndylan Nienhuis
  • David Chisnall
  • Robert N. M. Watson
  • Peter Sewell

Living on the edge: rapid-toggling probes with cross-modification on x86

  • Buddhika Chamith
  • Bo Joel Svensson
  • Luke Dalessandro
  • Ryan R. Newton

Polymorphic type inference for machine code

  • Matt Noonan
  • Alexey Loginov
  • David Cok

Verification I (Grand Ballroom San Rafael - Wednesday 10:30-12:00, Session Chair: Isil Dillig)

Data-driven precondition inference with learned features

  • Saswat Padhi
  • Rahul Sharma
  • Todd Millstein

Cartesian hoare logic for verifying k-safety properties

  • Marcelo Sousa
  • Isil Dillig

Verifying bit-manipulations of floating-point

  • Wonyeol Lee
  • Rahul Sharma
  • Alex Aiken

Testing and Debugging (Grand Ballroom Santa Ynez - Wednesday 13:30-15:00, Session Chair: Ben Zorn)

Coverage-directed differential testing of JVM implementations

  • Yuting Chen
  • Ting Su
  • Chengnian Sun
  • Zhendong Su
  • Jianjun Zhao

Exposing errors related to weak memory in GPU applications

  • Tyler Sorensen
  • Alastair F. Donaldson

Lightweight computation tree tracing for lazy functional languages

  • Maarten Faddegon
  • Olaf Chitil

Energy and Performance (Grand Ballroom San Rafael - Wednesday 13:30-15:00, Session Chair: Manuel Hermenegildo)

Effective padding of multidimensional arrays to avoid cache conflict misses

  • Changwan Hong
  • Wenlei Bao
  • Albert Cohen
  • Sriram Krishnamoorthy
  • Louis-Noël Pouchet
  • Fabrice Rastello
  • J. Ramanujam
  • P. Sadayappan

GreenWeb: language extensions for energy-efficient mobile web computing

  • Yuhao Zhu
  • Vijay Janapa Reddi

Input responsiveness: using canary inputs to dynamically steer approximation

  • Michael A. Laurenzano
  • Parker Hill
  • Mehrzad Samadi
  • Scott Mahlke
  • Jason Mars
  • Lingjia Tang

New Languages (Grand Ballroom Santa Ynez - Wednesday 15:30-17:00, Session Chair: Michael Carbin)

Configuration synthesis for programmable analog devices with Arco

  • Sara Achour
  • Rahul Sarpeshkar
  • Martin C. Rinard

From Datalog to flix: a declarative language for fixed points on lattices

  • Magnus Madsen
  • Ming-Ho Yee
  • Ondřej Lhoták

Latte: a language, compiler, and runtime for elegant and efficient deep neural networks

  • Leonard Truong
  • Rajkishore Barik
  • Ehsan Totoni
  • Hai Liu
  • Chick Markley
  • Armando Fox
  • Tatiana Shpeisman

Parsing and Compilation (Grand Ballroom San Rafael - Wednesday 15:30-17:00, Session Chair: Michelle Mills Strout)

Automatic Storage Optimization for Arrays [TOPLAS]

  • Somashekaracharya G Bhaskaracharya
  • Uday Bondhugula
  • Albert Cohen

Polyhedral AST Generation is More Than Scanning Polyhedra [TOPLAS]

  • Tobias Grosser
  • Sven Verdoolaege
  • Albert Cohen

On the complexity and performance of parsing with derivatives

  • Michael D. Adams
  • Celeste Hollenbeck
  • Matthew Might

Down to the Metal II (Grand Ballroom Santa Ynez - Thursday 10:30-12:00, Session Chair: Hans-J. Boehm)

Stratified synthesis: automatically learning the x86-64 instruction set

  • Stefan Heule
  • Eric Schkufza
  • Rahul Sharma
  • Alex Aiken

Remix: online detection and repair of cache contention for the JVM

  • Ariel Eizenberg
  • Shiliang Hu
  • Gilles Pokam
  • Joseph Devietti

Statistical similarity of binaries

  • Yaniv David
  • Nimrod Partush
  • Eran Yahav

Types I (Grand Ballroom San Rafael - Thursday 10:30-12:00, Session Chair: David Walker)

Accepting blame for safe tunneled exceptions

  • Yizhou Zhang
  • Guido Salvaneschi
  • Quinn Beightol
  • Barbara Liskov
  • Andrew C. Myers

Occurrence typing modulo theories

  • Andrew M. Kent
  • David Kempe
  • Sam Tobin-Hochstadt

Refinement types for TypeScript

  • Panagiotis Vekris
  • Benjamin Cosman
  • Ranjit Jhala

Synthesis I (Grand Ballroom Santa Ynez - Thursday 13:30-15:00, Session Chair: Eran Yahav)

MapReduce program synthesis

  • Calvin Smith
  • Aws Albarghouthi

Programmatic and direct manipulation, together at last

  • Ravi Chugh
  • Brian Hempel
  • Mitchell Spradlin
  • Jacob Albers

Fast synthesis of fast collections

  • Calvin Loncaric
  • Emina Torlak
  • Michael D. Ernst

Software-Defined Networking (Grand Ballroom San Rafael - Thursday 13:30-15:00, Session Chair: Todd Millstein)

Event-driven network programming

  • Jedidiah McClurg
  • Hossein Hojjat
  • Nate Foster
  • Pavol Černý

Temporal NetKAT

  • Ryan Beckett
  • Michael Greenberg
  • David Walker

SDNRacer: concurrency analysis for software-defined networks

  • Ahmed El-Hassany
  • Jeremie Miserez
  • Pavol Bielik
  • Laurent Vanbever
  • Martin Vechev

Verifying Systems (Grand Ballroom Santa Ynez - Thursday 15:30-17:00, Session Chair: Santosh Nagarakatte)

Rehearsal: a configuration verification tool for puppet

  • Rian Shambaugh
  • Aaron Weiss
  • Arjun Guha

Toward compositional verification of interruptible OS kernels and device drivers

  • Hao Chen
  • Xiongnan (Newman) Wu
  • Zhong Shao
  • Joshua Lockerman
  • Ronghui Gu

Verified peephole optimizations for CompCert

  • Eric Mullen
  • Daryl Zuniga
  • Zachary Tatlock
  • Dan Grossman

Types II (Grand Ballroom San Rafael - Thursday 15:30-17:00, Session Chair: Jean Yang)

Just-in-time static type checking for dynamic languages

  • Brianna M. Ren
  • Jeffrey S. Foster

Types from data: making structured data first-class citizens in F#

  • Tomas Petricek
  • Gustavo Guerra
  • Don Syme

Automatically learning shape specifications

  • He Zhu
  • Gustavo Petri
  • Suresh Jagannathan

Synthesis II (Grand Ballroom Santa Ynez - Thursday 17:00-18:00, Session Chair: Martin Vechev)

Synthesizing transformations on hierarchically structured data

  • Navid Yaghmazadeh
  • Christian Klinger
  • Isil Dillig
  • Swarat Chaudhuri

Program synthesis from polymorphic refinement types

  • Nadia Polikarpova
  • Ivan Kuraj
  • Armando Solar-Lezama

Parallelism I (Grand Ballroom San Rafael - Friday 17:00-18:00, Session Chair: Tony Hosking)

Higher-order and tuple-based massively-parallel prefix sums

  • Sepideh Maleki
  • Annie Yang
  • Martin Burtscher

A distributed OpenCL framework using redundant computation and data replication

  • Junghyun Kim
  • Gangwon Jo
  • Jaehoon Jung
  • Jungwon Kim
  • Jaejin Lee

Memory Management (Grand Ballroom Santa Ynez - Friday 09:00-10:30, Session Chair: Sam Guyer)

Idle time garbage collection scheduling

  • Ulan Degenbaev
  • Jochen Eisinger
  • Manfred Ernst
  • Ross McIlroy
  • Hannes Payer

Assessing the limits of program-specific garbage collection performance

  • Nicholas Jacek
  • Meng-Chieh Chiu
  • Benjamin Marlin
  • Eliot Moss

Verification II (Grand Ballroom San Rafael - Friday 09:00-10:30, Armando Solar-Lezama)

Cardinalities and universal quantifiers for verifying parameterized systems

  • Klaus v. Gleissenthall
  • Nikolaj Bjørner
  • Andrey Rybalchenko

Ivy: safety verification by interactive generalization

  • Oded Padon
  • Kenneth L. McMillan
  • Aurojit Panda
  • Mooly Sagiv
  • Sharon Shoham

Security (Grand Ballroom Santa Ynez - Friday 10:30-12:00, Session Chair: Andrew Myers)

Precise, dynamic information flow for database-backed applications

  • Jean Yang
  • Travis Hance
  • Thomas H. Austin
  • Armando Solar-Lezama
  • Cormac Flanagan
  • Stephen Chong

End-to-end verification of information-flow security for C and assembly programs

  • David Costanzo
  • Zhong Shao
  • Ronghui Gu

A design and verification methodology for secure isolated regions

  • Rohit Sinha
  • Manuel Costa
  • Akash Lal
  • Nuno P. Lopes
  • Sriram Rajamani
  • Sanjit A. Seshia
  • Kapil Vaswani

Parallelism II (Grand Ballroom San Rafael - Friday 10:30-12:00, Session Chair: Albert Cohen)

Transactional data structure libraries

  • Alexander Spiegelman
  • Guy Golan-Gueta
  • Idit Keidar

FlexVec: auto-vectorization for irregular loops

  • Sara S. Baghsorkhi
  • Nalini Vasudevan
  • Youfeng Wu

Verified lifting of stencil computations

  • Shoaib Kamil
  • Alvin Cheung
  • Shachar Itzhaky
  • Armando Solar-Lezama

Authors of accepted papers will have received an author kit from the publisher. Here are the key highlights:

  • Paper must be submitted in printable PDF format.
  • Please use this style to format your paper, with the pldi-cameraready option: PLDI 2016 style file
  • Text must be in a minimum 10pt font (not 9pt).
  • Papers can be 15 pages long in US letter format, all inclusive. Authors may purchase two additional pages @ $100/page.
  • Each reference must specify all authors (no et al.).
  • Authors of all accepted papers will be required to give a lightning presentation (about 90 s) and a poster in addition to the regular conference talk.
  • Proceedings may appear in the ACM digital library as early as May 30, 2016.

General

Q: Why are you using double-blind reviewing?
A: Studies have shown that a reviewer's attitude toward a submission may be affected, even unconsciously, by the identity of the author. We want reviewers to be able to approach each submission without such involuntary reactions as "Barnaby; he writes a good paper" or "Who are these people? I have never heard of them." For this reason, we ask that authors to omit their names from their submissions, and that they avoid revealing their identity through citation. Note that many systems and security conferences use double-blind reviewing and have done so for years (e.g., SIGCOMM, OSDI, IEEE Security and Privacy, SIGMOD). PLDI has done it for several years now. A key principle to keep in mind is that we intend this process to be cooperative, not adversarial. If a reviewer does discover an author's identity though a subtle clue or oversight the author will not be penalized.

Q: Do you really think blinding actually works? I suspect reviewers can often guess who the authors are anyway.
A: Authorship can be guessed correctly sometimes, but imperfect blinding is better than no blinding at all, we believe.

Q: Couldn't blind submission create an injustice where a paper is inappropriately rejected based upon supposedly-prior work which was actually by the same authors and not previously published?
A: Reviewers are held accountable for their positions and are required to identify any supposed prior work that they believe undermines the novelty of the paper. Any assertion that 'this has been done before' must be supported with concrete information which can be checked by the PC Chair and by authors vial the author response mechanism. The author response mechanism exists in part to hold reviewers accountable for their positions; authors can and should correct any such misapprehension.

For authors

Q: What exactly do I have to do to anonymize my paper?
A: Use common sense. Your job is not to make your identity undiscoverable but simply to make it possible for our reviewers to evaluate your submission without having to know who you are. The specific guidelines stated in the call for papers are simple: omit authors' names from your title page, and when you cite your own work, refer to it in the third person. For example, if your name is Smith and you have worked on amphibious type systems, instead of saying "We extend our earlier work on statically typed toads [Smith 2004]," you might say "We extend Smith's [2004] earlier work on statically typed toads." Also, be sure not to include any acknowledgements that would give away your identity. In general, you should aim to reduce the risk of accidental unblinding. For example, if your paper is the first to describe a system with a well-known name or codename, or you use a personally-identifiable naming convention for your work, you must use a different name for your submission (which you may indicate has been changed for the purposes of double-blind reviewing). You should also avoid revealing the institution affiliation of authors or at which the work was performed.

Q: I would like to provide supplementary material for consideration, e.g., the code of my implementation or proofs of theorems. How do I do this?
A: (see the next question also) On the submission site there will be an option to submit supplementary material along with your main paper. This supplementary material should also be anonymized. Reviewers are under no obligation to look at this material. The submission itself is the object of review and so it should strive to convince the reader of at least the plausibility of reported results; supplemental material only serves to confirm, in more detail, the idea argued in the paper. Of course, reviewers are free to change their review upon viewing supplemental material (or for any other reason). For those authors who wish to supplement, we encourage them to mention the supplement in the body of the paper. E.g., "The proof of Lemma 1 is included in the supplemental material submitted with this paper."

Q: My submission is based on code available in a public repository. How do I deal with this?
A: Making your code publicly available is not incompatible with the double blind process. You should do the following. First, cite the code in your paper, but remove the actual URL and, instead say "link to repository removed for double blind review" or similar. Second, if when writing your author response, you believe reviewer access to your code would help, say so in your author response (without providing the URL), and send the URL to the Program Chair. Third, you are strongly encouraged to submit your work to the Artifact Evaluation track.

Q: I am building on my own past work on the WizWoz system. Do I need to rename this system in my paper for purposes of anonymity, so as to remove the implied connection between my authorship of past work on this system and my present submission?
A: Not necessarily. The core question is really whether the system is one that, once identified, automatically identifies the author(s) and/or the institution. If the system is widely available and open-sourced, and especially if it has a substantial body of contributors and has been out for a while, then these conditions may not hold (e.g., LLVM or HotSpot), because there would be considerable doubt about authorship. By contrast, a paper on a modification to a proprietary system (e.g., Visual C++, or a research project that has not open-sourced its code) implicitly reveals the identity of the authors or their institution. If naming your system essentially reveals your identity (or institution), then you must anonymize it. In your submission, point out that the system name has been anonymized. If you have any doubts, please contact the PC Chair.

Q: I am submitting a paper that extends my own work that previously appeared at a workshop. Should I anonymize any reference to that prior work?
A: No. But we recommend you do not use the same title for your PLDI submission, so that it is clearly distinguished from the prior paper. In general, there is rarely a good reason to anonymize a citation. One possibility is for work that is tightly related to the present submission and is also under review. But such works may often be non-anonymous. When in doubt, contact the PC Chair.

Q: Am I allowed to post my (non-blinded) paper on my web page? Can I advertise the unblinded version of my paper on mailing lists or send it to colleagues? May I give a talk about my work while it is under review?
A: As far as the authors' publicity actions are concerned, a paper under double-blind review is largely the same as a paper under regular (single-blind) review. Double-blind reviewing should not hinder the usual communication of results.

That said, we do ask that you not attempt to deliberately subvert the double-blind reviewing process by announcing the names of the authors of your paper to the potential reviewers of your paper. It is difficult to define exactly what counts as "subversion" here, but some blatant examples include: sending individual e-mail to members of the PC or ERC about your work (unless they are conflicted out anyway), posting mail to a major mailing list (e.g. TYPES) announcing your paper, or posting about it on social media. On the other hand, it is perfectly fine, for example, to visit other institutions and give talks about your work, to present your submitted work during job interviews, to present your work at professional meetings (e.g. Dagstuhl), or to post your work on your web page. PC/ERC members will not be asked to recuse themselves from reviewing your paper unless they feel you have gone out of your way to advertise your authorship information to them. If you're not sure about what constitutes "going out of your way", please consult directly with the Program Chair.

Q: Will the fact that PLDI is double-blind have an impact on handling conflicts-of interest?
A: Using DBR does not change the principle that reviewers should not review papers with which they have a conflict of interest, even if they do not immediately know who the authors are. Quoting (with slight alteration) from the ACM SIGPLAN review policies document:
A conflict of interest is defined as a situation in which the reviewer can be viewed as being able to benefit personally in the process of reviewing a paper. For example, if a reviewer is considering a paper written by a member of his own group, a current student, his advisor, or a group that he is seen as being in close competition with, then the outcome of the review process can have direct benefit to the reviewer's own status. If a conflict of interest exists, the potential reviewer should decline to review the paper.

For reviewers

Q: What should I do if I if I learn the authors' identity? What should I do if a prospective PLDI author contacts me and asks to visit my institution?
A: If at any point you feel that the authors' actions are largely aimed at ensuring that potential reviewers know their identity, you should contact the Program Chair. Otherwise you should not treat double-blind reviewing differently from regular blind reviewing. In particular, you should refrain from seeking out information on the authors' identity, but if you discover it accidentally this will not automatically disqualify you as a reviewer. Use your best judgment.

Q: The authors have provided a URL to supplemental material. I would like to see the material but I worry they will snoop my IP address and learn my identity. What should I do?
A: Contact the Program Chair, who will download the material on your behalf and make it available to you.

Q: If I am assigned a paper for which I feel I am not an expert, how do I seek an outside review?
A: PC and ERC members should do their own reviews, not delegate them to someone else. If doing so is problematic for some papers, e.g., you don't feel completely qualified, then consider the following options. First, submit a review for your paper that is as careful as possible, outlining areas where you think your knowledge is lacking. Assuming we have sufficient expert reviews, that could be the end of it: non-expert reviews are valuable too, since conference attendees are by-and-large not experts for any given paper. Second, the review form provides a mechanism for suggesting additional expert reviewers to the PC Chair, who may contact them if additional expertise is needed. Please do NOT contact outside reviewers yourself. As a last resort, if you feel like your review would be extremely uninformed and you'd rather not even submit a first cut, contact the PC Chair, and another reviewer will be assigned.

Q: How do we handle potential conflicts of interest since I cannot see the author names?
A: The conference review system will ask that you identify conflicts of interest when you get an account on the submission system. Please see the related question applied to authors to decide how to identify conflicts. Feel free to also identify additional authors whose papers you feel you could not review fairly for reasons other than those given (e.g., strong personal friendship).


These guidelines were originally created by Michael Hicks for POPL 2012, slightly modified for PLDI 2012 by Frank Tip. They were shortened by Keshav Pingali for PLDI 2014, and modified slightly by Steve Blackburn for PLDI 2015.

Instructions for Submission to PLDI’16

This document provides instructions for submitting papers to PLDI. In an effort to respect the efforts of reviewers and in the interest of fairness to all prospective authors, we request that all submissions to PLDI follow the formatting and submission rules detailed below. Submissions that violate these instructions may not be reviewed, at the discretion of the program chair, in order to maintain a review process that is fair to all potential authors.

The committee will make every effort to judge each submitted paper on its own merits. There will be no target acceptance rate. We expect to accept a wide range of papers with appropriate expectations for evaluation — while papers that build on significant past work with strong evaluations are valuable, papers that open new areas with less rigorous evaluation are equally welcome and especially encouraged. In either case, what is important is that the paper’s claims are no stronger than what is supported by the evaluation. Given the wide range of topics covered by PLDI, every effort will be made to find expert reviewers.

All questions regarding paper formatting and submission should be directed to the program chair.

The paper submission site is here.

Highlights

  • Paper must be submitted in printable PDF format.
  • Text must be in a minimum 10pt font (not 9pt).
  • Submissions are double blind (see the FAQ on double blind reviewing or click on the FAQ tab above)
  • Papers must be at most 11 pages in US letter format, not including references.
  • No additional appendices (beyond 11 pages) are allowed in the paper submission, but may be included as supplemental material (see the FAQ for Double-Blind).
  • There is no page limit for references.
  • Each reference must specify all authors (no et al.).
  • Proceedings may appear in the ACM digital library as early as May 30, 2016.
  • Note that unlike last year, there will not be lightning presentations or posters for all papers.

Submission Preparation Instructions

Conflicts

You should specify the names and institutions that represent actual conflicts of interest. These include PhD advisors, PhD advisees, the institutions of any of the authors, any institutions or researchers with a financial conflict of interest, close friends or relatives, and any recent co-authors of papers or grant proposals (in the last 2 years). No other conflicts may be declared. The listing of spurious conflicts (especially of potential reviewers without actual conflicts, as described above) will lead to rejection of paper(s) without review.

Submission Formatting

Papers must be submitted in PDF format and follow the standard two-column ACM proceedings style in 10-point font and be at most 11 pages, exclusive of the bibliography. The bibliography is excluded from the page count to encourage good citation practices and discourage illegible bibliographies. Citations can be either in numeric style or author-year style. Numeric citations always stand as a parenthetical note (e.g., “[42]”), while author-year citations may stand either as a noun phrase (e.g., “Church (1935)”), or as a parenthetical note (e.g., “(Church, 1935)”).

If you are using LaTeX to typeset your paper, then we strongly suggest that you use this temporary LaTeX class file (with the ‘pldi’ class option) and template. If you are using Microsoft Word, you may wish to use this template, which is closely based on Friedrich Steimann’s SIGPLAN template.

Content

Double Blind

Reviewing will be double blind; therefore, please do not include any author names or links to author’s website, etc. on any submitted documents except in the space provided on the online submission form. Please take time to read the PLDI FAQ on Double Blind Reviewing, which gives a more comprehensive and authoritative account than this short paragraph. If you are improving upon your prior work, refer to your prior work in the third person and include a full citation for the work in the bibliography. For example, if you happened to be Collins and McCarthy, building on your own prior work, you might say something like: “While prior work [Backus et al. 1960; Collins 1960; McCarthy 1960] did X, Y, and Z, this paper additionally does W, and is therefore much better.” Do NOT omit or anonymize references for blind review.

In general, you should aim to reduce the risk of accidental unblinding. For example, if your paper describes a system with a well-known name or codename, or you use a personally-identifiable naming convention for your work, you must use a different name for your submission (which you may indicate has been changed for the purposes of double-blind reviewing). You should also avoid revealing the institution where the work was performed.

Figures and Tables

Ensure that the figures and tables are legible. Please also ensure that you refer to your figures in the main text. Many reviewers print the papers in gray-scale. Therefore, if you use colors for your figures, ensure that the different colors are highly distinguishable in gray-scale.

References

There is no length limit for references. Each reference must explicitly list all authors of the paper. Papers not meeting this requirement will be rejected. Authors of NSF proposals should be familiar with this requirement. Knowing all authors of related work will help find the best reviewers. Authors are encouraged (but not required) to include DOIs in their references. Hyperlinked DOIs make the referenced work much more accessible to the reader and greatly assist automatic document analysis.

Paper Submission Instructions

Declaring Authors

Enter all authors of the paper into the online paper submission tool upfront. Addition/removal of authors once the paper is accepted will have to be approved by the program chair, since it potentially undermines the goal of eliminating conflicts for reviewer assignment.

Concurrent Submissions and Workshops

By submitting a manuscript to PLDI, authors guarantee that they are adhering to the SIGPLAN Republication Policy. Please ensure that you are familiar with it. Violation of any of these conditions will lead to rejection.

As always, if you are in doubt, it is best to contact the program chair.

Finally, we also note that the ACM Plagiarism Policy covers a range of ethical issues concerning the misrepresentation of other works or one’s own work.

Early Access in the Digital Library

The PLDI proceedings may be available on the ACM Digital Library as early as May 30, 2016. Authors must consider any implications of this early disclosure of their work before submitting their papers.

Acknowledgements

This document is based heavily on ones prepared for previous conferences and we thank their program chairs; in particular, Sandhya Dwarkadas (ASPLOS’15), Sarita Adve (ASPLOS’14), Steve Keckler (ISCA’14), Christos Kozyrakis (Micro’13), Margaret Martonosi (ISCA’13), Onur Mutlu (Micro’12), Michael L. Scott (ASPLOS’12), and Steve Blackburn (PLDI’15).

References

J. W. Backus, F. L. Bauer, J. Green, C. Katz, J. McCarthy, A. J. Perlis, H. Rutishauser, K. Samelson, B. Vauquois, J. H. Wegstein, A. van Wijngaarden, and M. Woodger. Report on the algorithmic language ALGOL 60. Commun. ACM, 3(5):299– 314, May 1960. ISSN 0001-0782. doi: 10.1145/367236.367262.

G. E. Collins. A method for overlapping and erasure of lists. Commun. ACM, 3(12):655–657, December 1960. doi: 10.1145/367487.367501.

L. Lamport. LaTeX: A Document Preparation System. Addison- Wesley, Reading, Massachusetts, 2nd edition, 1994.

J. McCarthy. Recursive functions of symbolic expressions and their computation by machine, part I. Commun. ACM, 3(4): 184–195, April 1960. doi: 10.1145/367177.367199.