| 30 | -- | 0 | Kathryn S. McKinley, Keshav Pingali. Editorial: A changing of the guard |
| 31 | -- | 0 | Kohei Honda, Nobuko Yoshida. A uniform type structure for secure information flow |
| 32 | -- | 0 | Christian Grothoff, Jens Palsberg, Jan Vitek. Encapsulating objects with confined types |
| 33 | -- | 0 | Thomas A. Henzinger, Christoph M. Kirsch. The embedded machine: Predictable, portable real-time code |
| 34 | -- | 0 | William Thies, Frédéric Vivien, Saman P. Amarasinghe. A step towards unifying schedule and storage optimization |
| 35 | -- | 0 | Christian S. Collberg, Clark D. Thomborson, Gregg M. Townsend. Dynamic graph-based software fingerprinting |
| 36 | -- | 0 | Atsushi Ohori. A proof theory for machine code |
| 37 | -- | 0 | Kevin Casey, M. Anton Ertl, David Gregg. Optimizing indirect branch prediction accuracy in virtual machine interpreters |
| 38 | -- | 0 | Bageshri Karkare, Uday P. Khedker. An improved bound for call strings based interprocedural analysis of bit vector frameworks |
| 39 | -- | 0 | Sunae Seo, Hongseok Yang, Kwangkeun Yi, Taisook Han. Goal-directed weakening of abstract interpretation results |