Travelled to:
1 × China
1 × Ireland
1 × Spain
11 × USA
Collaborated with:
M.Sridharan E.Yahav D.Grove M.Pistoia D.F.Bacon R.M.Rabbah E.Geay F.Qian P.Cheng S.Chandra R.Bodík K.Knobe V.Sarkar C.Radoi R.J.Flynn P.Centonze G.Naumovich C.Dubach O.Tripp O.Weisman N.Dor G.Ramalingam B.Alpern A.Cocchi D.Lieber M.Arnold M.Hind P.F.Sweeney J.S.Auerbach I.Burcea S.Shukla Ioana Baldini N.Mitchell Vinod Muthusamy R.Rabbah P.Suter O.Tardieu
Talks about:
implement (3) languag (3) analysi (3) compil (3) serverless (2) object (2) effici (2) effect (2) comput (2) valid (2)
Person: Stephen J. Fink
DBLP: Fink:Stephen_J=
Contributed to:
Wrote 17 papers:
- OOPSLA-2014-RadoiFRS #imperative #pipes and filters
- Translating imperative code to MapReduce (CR, SJF, RMR, MS), pp. 909–927.
- DAC-2012-AuerbachBBCFRS #compilation #runtime
- A compiler and runtime for heterogeneous computing (JSA, DFB, IB, PC, SJF, RMR, SS), pp. 271–276.
- PLDI-2012-DubachCRBF #architecture #compilation
- Compiling a high-level language for GPUs: (via language support for architectures and compilers) (CD, PC, RMR, DFB, SJF), pp. 1–12.
- PLDI-2009-ChandraFS #approach #named
- Snugglebug: a powerful approach to weakest preconditions (SC, SJF, MS), pp. 363–374.
- PLDI-2009-TrippPFSW #analysis #effectiveness #named #web
- TAJ: effective taint analysis of web applications (OT, MP, SJF, MS, OW), pp. 87–97.
- SAS-2009-SridharanF #analysis #complexity
- The Complexity of Andersen’s Analysis in Practice (MS, SJF), pp. 205–221.
- ICSE-2007-PistoiaFFY #enterprise #modelling #policy #security #validation
- When Role Models Have Flaws: Static Validation of Enterprise Security Policies (MP, SJF, RJF, EY), pp. 478–488.
- PLDI-2007-SridharanFB #slicing
- Thin slicing (MS, SJF, RB), pp. 112–122.
- ISSTA-2006-CentonzeNFP #consistency #data access #validation
- Role-Based access control consistency validation (PC, GN, SJF, MP), pp. 121–132.
- ISSTA-2006-FinkYDRG #alias #effectiveness #type system #verification
- Effective typestate verification in the presence of aliasing (SJF, EY, ND, GR, EG), pp. 133–144.
- PEPM-2006-GeayYF #assurance #quality
- Continuous code-quality assurance with SAFE (EG, EY, SJF), pp. 145–149.
- CGO-2003-FinkQ #adaptation #design #evaluation #implementation
- Design, Implementation and Evaluation of Adaptive Recompilation with On-Stack Replacement (SJF, FQ), pp. 241–252.
- ECOOP-2002-BaconFG #implementation #java
- Space- and Time-Efficient Implementation of the Java Object Model (DFB, SJF, DG), pp. 111–132.
- OOPSLA-2001-AlpernCFGL #harmful #implementation #interface #java #performance
- Efficient Implementation of Java Interfaces: Invokeinterface Considered Harmless (BA, AC, SJF, DG, DL), pp. 108–124.
- OOPSLA-2000-ArnoldFGHS #adaptation #optimisation #virtual machine
- Adaptive optimization in the Jalapeño JVM (MA, SJF, DG, MH, PFS), pp. 47–65.
- SAS-2000-FinkKS #analysis #array
- Unified Analysis of Array and Object References in Strongly Typed Languages (SJF, KK, VS), pp. 155–174.
- Onward-2017-BaldiniCFMMRST #composition
- The serverless trilemma: function composition for serverless computing (IB, PC, SJF, NM, VM, RR, PS, OT), pp. 89–103.