Abstract is missing.
- Classes, Jim, But Not as We Know Them - Type Classes in Haskell: What, Why, and WhitherSimon L. Peyton Jones. 1 [doi]
- Coinductive Type Systems for Object-Oriented LanguagesDavide Ancona, Giovanni Lagorio. 2-26 [doi]
- Checking Framework Interactions with RelationshipsCiera Jaspan, Jonathan Aldrich. 27-51 [doi]
- COPE - Automating Coupled Evolution of Metamodels and ModelsMarkus Herrmannsdörfer, Sebastian Benz, Elmar Jürgens. 52-76 [doi]
- Making Sense of Large HeapsNick Mitchell, Edith Schonberg, Gary Sevitsky. 77-97 [doi]
- Scaling CFL-Reachability-Based Points-To Analysis Using Context-Sensitive Must-Not-Alias AnalysisGuoqing Xu, Atanas Rountev, Manu Sridharan. 98-122 [doi]
- NePaLTM: Design and Implementation of Nested Parallelism for Transactional Memory SystemsHaris Volos, Adam Welc, Ali-Reza Adl-Tabatabai, Tatiana Shpeisman, Xinmin Tian, Ravi Narayanaswamy. 123-147 [doi]
- Implicit Dynamic Frames: Combining Dynamic Frames and Separation LogicJan Smans, Bart Jacobs 0002, Frank Piessens. 148-172 [doi]
- Fine-Grained Access Control with Object-Sensitive RolesJeffrey Fischer, Daniel Marino, Rupak Majumdar, Todd D. Millstein. 173-194 [doi]
- Practical API Protocol Checking with Access PermissionsKevin Bierhoff, Nels E. Beckman, Jonathan Aldrich. 195-219 [doi]
- Adding State and Visibility Control to Traits Using Lexical NestingTom Van Cutsem, Alexandre Bergel, stéphane-ducasse, Wolfgang De Meuter. 220-243 [doi]
- Featherweight Jigsaw: A Minimal Core Calculus for Modular Composition of ClassesGiovanni Lagorio, Marco Servetto, Elena Zucca. 244-268 [doi]
- Modular Visitor ComponentsBruno C. d. S. Oliveira. 269-293 [doi]
- Debugging Method NamesEinar W. Høst, Bjarte M. Østvold. 294-317 [doi]
- MAPO: Mining and Recommending API Usage PatternsHao Zhong, Tao Xie, Lu Zhang, Jian Pei, Hong Mei. 318-343 [doi]
- Supporting Framework Use via Automatically Extracted Concept-Implementation TemplatesAbbas Heydarnoori, Krzysztof Czarnecki, Thiago T. Bartolomei. 344-368 [doi]
- Stepping Stones over the Refactoring RubiconMax Schäfer, Mathieu Verbaere, Torbjörn Ekman, Oege de Moor. 369-393 [doi]
- Program MetamorphosisChristoph Reichenbach, Devin Coughlin, Amer Diwan. 394-418 [doi]
- From Public to Private to Absent: Refactoring Java Programs under Constrained AccessibilityFriedrich Steimann, Andreas Thies. 419-443 [doi]
- Java on 1000 Cores: Tales of Hardware/Software Co-designCliff Click. 444 [doi]
- Loci: Simple Thread-Locality for JavaTobias Wrigstad, Filip Pizlo, Fadi Meawad, Lei Zhao, Jan Vitek. 445-469 [doi]
- Failboxes: Provably Safe Exception HandlingBart Jacobs 0002, Frank Piessens. 470-494 [doi]
- Are We Ready for a Safer Construction Environment?Joseph Gil, Tali Shragai. 495-519 [doi]
- Type-Based Object Immutability with Flexible InitializationChristian Haack, Erik Poll. 520-545 [doi]
- Security Monitor Inlining for Multithreaded JavaMads Dam, Bart Jacobs 0002, Andreas Lundblad, Frank Piessens. 546-569 [doi]
- EventJava: An Extension of Java for Event CorrelationPatrick Th. Eugster, K. R. Jayaram. 570-594 [doi]
- Remote Batch Invocation for Compositional Object ServicesAli Ibrahim, Yang Jiao, Eli Tilevich, William R. Cook. 595-617 [doi]
- Introduction to: The Myths of Object-OrientationJan Vitek. 618 [doi]
- The Myths of Object-OrientationJames Noble. 619-629 [doi]