Automatic Differentiation (AD) has become a dominant technique in ML. AD...
The Go programming language offers strong protection from memory corrupt...
Automatic code generation has recently attracted large attention and is
...
Modeling sequential and parallel composition of effectful computations h...
Local-first software manages and processes private data locally while st...
Recent studies have revealed that 87
cryptographic APIs have a misuse w...
Programming languages like P4 enable specifying the behavior of network ...
Decentralized applications (dApps) consist of smart contracts that run o...
Context: Cryptographic APIs are often misused in real-world applications...
Background: Previous studies have shown that up to 99.59
using crypto A...
Modern software typically performs more than one functionality. These
fu...
APIs are the primary mechanism for developers to gain access to external...
The Go programming language aims to provide memory and thread safety thr...
Current approaches combining multiple static analyses deriving different...
Network programmability will be required to handle future increased netw...
Contact tracing apps running on mobile devices promise to reduce the man...
String obfuscation is an established technique used by proprietary,
clos...
In disruption-tolerant networking (DTN), data is transmitted in a
store-...
Currently, nearly four billion people live in urban areas. Since this tr...
The pivotal role that event correlation technology plays in todays
appli...
The P4 programming language offers high-level, declarative abstractions ...
Multiparty session types (MST) are a well-established type theory that
d...
Application Programming Interfaces (APIs) often have usage constraints, ...
Application Programming Interfaces (APIs) often have usage constraints, ...
Various studies have empirically shown that the majority of Java and And...
This paper addresses compositional and incremental type checking for
obj...