Skip to main content

Showing 1–4 of 4 results for author: Adams, M D

.
  1. arXiv:2101.06759  [pdf, other

    cs.PL

    Proceedings of the 2020 Scheme and Functional Programming Workshop

    Authors: Baptiste Saleil, Michael D. Adams

    Abstract: This report aggregates the papers presented at the twenty-first annual Scheme and Functional Programming Workshop, hosted on August 28th, 2020, online and co-located with the twenty-fifth International Conference on Functional Programming. The Scheme and Functional Programming Workshop is held every year to provide an opportunity for researchers and practitioners using Scheme and related functiona… ▽ More

    Submitted 17 January, 2021; originally announced January 2021.

    Comments: 85 pages; 30 figures; workshop website at https://icfp20.sigplan.org/home/scheme-2020

    Report number: CSE-TR-001-21 ACM Class: D.3.m

  2. On the Complexity and Performance of Parsing with Derivatives

    Authors: Michael D. Adams, Celeste Hollenbeck, Matthew Might

    Abstract: Current algorithms for context-free parsing inflict a trade-off between ease of understanding, ease of implementation, theoretical complexity, and practical performance. No algorithm achieves all of these properties simultaneously. Might et al. (2011) introduced parsing with derivatives, which handles arbitrary context-free grammars while being both easy to understand and simple to implement. De… ▽ More

    Submitted 16 April, 2016; originally announced April 2016.

    Comments: 13 pages; 12 figures; implementation at http://bitbucket.org/ucombinator/parsing-with-derivatives/ ; published in PLDI '16, Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation, June 13 - 17, 2016, Santa Barbara, CA, USA

    ACM Class: D.3.4

  3. Pushdown Control-Flow Analysis for Free

    Authors: Thomas Gilray, Steven Lyde, Michael D. Adams, Matthew Might, David Van Horn

    Abstract: Traditional control-flow analysis (CFA) for higher-order languages, whether implemented by constraint-solving or abstract interpretation, introduces spurious connections between callers and callees. Two distinct invocations of a function will necessarily pollute one another's return-flow. Recently, three distinct approaches have been published which provide perfect call-stack precision in a comput… ▽ More

    Submitted 21 March, 2016; v1 submitted 11 July, 2015; originally announced July 2015.

    Comments: in Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2016

    ACM Class: D.3.4

  4. arXiv:1311.0257  [pdf, other

    cs.CR

    Application of Cybernetics and Control Theory for a New Paradigm in Cybersecurity

    Authors: Michael D. Adams, Seth D. Hitefield, Bruce Hoy, Michael C. Fowler, T. Charles Clancy

    Abstract: A significant limitation of current cyber security research and techniques is its reactive and applied nature. This leads to a continuous 'cyber cycle' of attackers scanning networks, developing exploits and attacking systems, with defenders detecting attacks, analyzing exploits and patching systems. This reactive nature leaves sensitive systems highly vulnerable to attack due to un-patched system… ▽ More

    Submitted 1 November, 2013; originally announced November 2013.

    Comments: 12 pages, 7 figures