SAPLING 2015
November 20, 2015
SIT Lecture Theatre (Room 123), Building J12, The University of Sydney
Program
Talk slots are twenty minutes including questions.
09:25 Welcome
09:30-10:50 Session 1
Nicholas Hollingum, University of Sydney, Towards a Scalable Framework for Context-Free Language Reachability abstract slides
Gary Miller, UTS, The Prospects for Programming-Experience Design: On the Beauty of Language abstract slides
Scott Buckley, Macquarie, Web browsers as compilers abstract slides
Pongsak Suvanpong and Anthony Sloane, Macquarie, Evaluating Kiama Abstract State Machines for a Java Implementation abstract slides
10:50-11:10 Break
11:10-12:30 Session 2
Raghavendra K. R., Oracle Labs Brisbane, Issues in applying points-to analysis for large-scale Java library codebases abstract slides
James Noble, VUW, Delegation isn’t quite Inheritance: Objects, Classes and Initialisation in Grace abstract slides
Kunshan Wang, ANU, Draining the Swamp: Micro Virtual Machines as Solid Foundation for Language Development abstract
John Zhang, ANU, MuPy: A First Language Client for Mu Micro Virtual Machine abstract slides
12:30-14:00 Lunch
14:00-15:20 Session 3
G. Gange et al., Melbourne, Program analysis and machine arithmetic abstract
Pavle Subotic, UCL, Horn Clauses for Communicating Timed Systems abstract
David J. Pearce, VUW, Can we Verify C with Whiley? abstract slides
Yutaka Nagashima, NICTA, Try hard! Proof automation, efficient-proof-script reconstruction, and proof-planning in Isabelle using monads abstract slides
15:20-15:40 Break
15:40-17:00 Session 4
Francois Gauthier, Oracle Labs Brisbane, Static taint analysis of web applications: Haven't we solved this problem yet? abstract slides
Amos Robinson, Ambiata, Icicle: Write Once, Run Once abstract slides
Hayes et al., Queensland, Understanding Concurrent Programs using Rely-Guarantee Thinking abstract slides
Yi Lu, Paddy Krishnan, Raghavendra K. R., Oracle Labs, Brisbane, From Access Control to Information Flow: Security Model and Static Analysis for Detecting Java Security Vulnerabilities abstract slides
17:00 Wrap up