From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Original-To: caml-list@yquem.inria.fr Delivered-To: caml-list@yquem.inria.fr Received: from mail2-relais-roc.national.inria.fr (mail2-relais-roc.national.inria.fr [192.134.164.83]) by yquem.inria.fr (Postfix) with ESMTP id A4151BBAF for ; Mon, 21 Dec 2009 07:19:10 +0100 (CET) X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: An4AACOiLkuD3AgEkWdsb2JhbACZAIJSAQEBAQkLCgcTBbcqgiYFggMEgWWLUA X-IronPort-AV: E=Sophos;i="4.47,430,1257116400"; d="scan'208";a="39098371" Received: from postfix.iai.uni-bonn.de ([131.220.8.4]) by mail2-smtp-roc.national.inria.fr with ESMTP; 21 Dec 2009 07:19:10 +0100 X-IAI-Env-From: : [131.220.9.162] Received: from [131.220.9.162] (extern01.iai.uni-bonn.de [131.220.9.162]) by postfix.iai.uni-bonn.de (Postfix) with ESMTP id 36EE35C827; Mon, 21 Dec 2009 07:19:08 +0100 (MET) (envelope-from jv@informatik.uni-bonn.de) (envelope-to VARIOUS) (24) (internal use: ta=1, tu=1, te=1, am=P, au=jv) Message-ID: <4B2F1363.6010008@informatik.uni-bonn.de> Date: Mon, 21 Dec 2009 07:19:15 +0100 From: =?ISO-8859-15?Q?Janis_Voigtl=E4nder?= User-Agent: Thunderbird 2.0.0.23 (Windows/20090812) MIME-Version: 1.0 To: haskell-cafe@haskell.org, theorem-provers@ai.mit.edu, lprolog@cs.umn.edu, ecoop-info@ecoop.org, rewriting@ens-lyon.fr, coq-club@pauillac.inria.fr, isabelle-users@cl.cam.ac.uk, prole@babel.ls.fi.upm.es, easst-members@cs.uni-potsdam.de, compulognet-parimp@dia.fi.upm.es, caml-list@inria.fr, dbworld@cs.wisc.edu, pept@kb.ecei.tohoku.ac.jp, security@fosad.org, epigram@durham.ac.uk, agda@lists.chalmers.se, mercury-ads@cs.mu.oz.au, prog-lang@diku.dk, comlab@comlab.ox.ac.uk, clp@comp.nus.edu.sg, kgs@logic.tuwien.ac.at, theory-logic@cs.cmu.edu, nwpt-info@lists.ioc.ee, gi-fg214@informatik.uni-kiel.de Subject: Early registration deadline - PEPM'10 Content-Type: text/plain; charset=ISO-8859-15; format=flowed Content-Transfer-Encoding: 8bit X-Spam: no; 0.00; sigplan:01 pepm:01 lennart:01 augustsson:01 thiemann:01 type-safe:01 bytecode:01 puebla:01 bytecode:01 johan:01 bounded:01 evelyne:01 pons:01 henglein:01 algebra:01 IMPORTANT DATES: * Early registration deadline: December 22, 2009 * Hotel registration deadline: December 28, 2009 =============================================================== CALL FOR PARTICIPATION ACM SIGPLAN 2010 Workshop on Partial Evaluation and Program Manipulation (PEPM'10) Madrid, January 18-19, 2010 (Affiliated with POPL'10) http://www.program-transformation.org/PEPM10 =============================================================== Abstracts of all papers and presentations are available from the above web site. INVITED TALKS: * Lennart Augustsson (Standard Chartered Bank, UK) Title: O, Partial Evaluator, Where Art Thou? * Jeremy G. Siek (University of Colorado at Boulder, USA) Title: General Purpose Languages Should be Metalanguages. CONTRIBUTED TALKS: * Nabil el Boustani and Jurriaan Hage. Corrective Hints for Type Incorrect Generic Java Programs. * Johannes Rudolph and Peter Thiemann. Mnemonics: Type-safe Bytecode Generation at Run Time. * Elvira Albert, Miguel Gomez-Zamalloa and German Puebla. PET: A Partial Evaluation-based Test Case Generation Tool for Java Bytecode. * Martin Hofmann. Igor II - an Analytical Inductive Functional Programming System. * José Pedro Magalhăes, Stefan Holdermans, Johan Jeuring and Andres Löh. Optimizing Generics Is Easy! * Michele Baggi, María Alpuente, Demis Ballis and Moreno Falaschi. A Fold/Unfold Transformation Framework for Rewrite Theories extended to CCT. * Hugh Anderson and Siau-Cheng Khoo. Regular Approximation and Bounded Domains for Size-Change Termination. * Évelyne Contejean, Pierre Courtieu, Julien Forest, Andrei Paskevich, Olivier Pons and Xavier Urbain. A3PAT, an Approach for Certified Automated Termination Proofs. * Fritz Henglein. Optimizing Relational Algebra Operations Using Generic Equivalence Discriminators and Lazy Products. * Adrian Riesco and Juan Rodriguez-Hortala. Programming with Singular and Plural Non-deterministic Functions. * Martin Hofmann and Emanuel Kitzelmann. I/O Guided Detection of List Catamorphisms. * Andrew Moss and Dan Page. Bridging the Gap Between Symbolic and Efficient AES Implementations. * Christopher Brown and Simon Thompson. Clone Detection and Elimination for Haskell. * Stefan Holdermans and Jurriaan Hage. Making "Stricterness" More Relevant. * Arun Lakhotia, Davidson Boccardo, Anshuman Singh and Aleardo Manacero Júnior. Context-Sensitive Analysis of Obfuscated x86 Executables. * Xin Li and Mizuhito Ogawa. Conditional Weighted Pushdown Systems and Applications. * Ivan Lazar Miljenovic. The SourceGraph Program. * Florian Haftmann. From Higher-Order Logic to Haskell: There and Back Again. SPECIAL FEATURE: * Andy Gill, Garrin Kimmell and Kevin Matlage. Capturing Functions and Catching Satellites.