| Title/Authors | Title | Research Artifacts 
										[?]  A research
											artifact is any by-product of a research project that is not
											directly included in the published research paper. In Computer
											Science research this is often source code and data sets, but
											it could also be media, documentation, inputs to proof
											assistants, shell-scripts to run experiments, etc. 
									 | Details | 
|---|
| Selective control-flow abstraction via jumping Sam Blackshear, Bor-Yuh Evan Chang, Manu Sridharan | Selective control-flow abstraction via jumpingDetails | 
										Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
										or similarly named committee.  This is one such paper that passed review.
									Artifact evaluation badge awarded | Author Comments:
									 Discussion Comments:
										0
									 
										Sharing:
										Research produced artifacts
									 
										Verification:
										Authors have
										verified
										information
									 | 
| Optimizing hash-array mapped tries for fast and lean immutable JVM collections Michael J. Steindorfer, Jurgen J. Vinju | Optimizing hash-array mapped tries for fast and lean immutable JVM collectionsDetails | 
 
										Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
										or similarly named committee.  This is one such paper that passed review.
									Artifact evaluation badge awarded | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Learning a strategy for adapting a program analysis via bayesian optimisation Hakjoo Oh, Hongseok Yang, Kwangkeun Yi | Learning a strategy for adapting a program analysis via bayesian optimisationDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Remote-scope promotion: clarified, rectified, and verified John Wickerson, Mark Batty, Bradford M. Beckmann, Alastair F. Donaldson | Remote-scope promotion: clarified, rectified, and verifiedDetails | 
										Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
										or similarly named committee.  This is one such paper that passed review.
									Artifact evaluation badge awarded | Author Comments:
									 Discussion Comments:
										0
									 
										Sharing:
										Research produced artifacts
									 
										Verification:
										Authors have
										verified
										information
									 | 
| Ravichandhran Madhavan, Mikaël Mayer, Sumit Gulwani, Viktor Kuncak | Details | 
 
										Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
										or similarly named committee.  This is one such paper that passed review.
									Artifact evaluation badge awarded | Author Comments:
										(Open-source code available with MIT license)
									 Discussion Comments:
										0
									 
										Sharing:
										Research produced artifacts
									 
										Verification:
										Authors have
										verified
										information
									 | 
| Runtime pointer disambiguation Péricles Alves, Fabian Gruber, Johannes Doerfert, Alexandros Lamprineas, Tobias Grosser, Fabrice Rastello, Fernando Magno Quintão Pereira | Runtime pointer disambiguationDetails | 
										Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
										or similarly named committee.  This is one such paper that passed review.
									Artifact evaluation badge awarded | Author Comments:
									 Discussion Comments:
										0
									 
										Sharing:
										Research produced artifacts
									 
										Verification:
										Authors have
										verified
										information
									 | 
| Vectorization of apply to reduce interpretation overhead of R Haichuan Wang, David A. Padua, Peng Wu | Vectorization of apply to reduce interpretation overhead of RDetails | 
 
										Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
										or similarly named committee.  This is one such paper that passed review.
									Artifact evaluation badge awarded | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Scalable race detection for Android applications Pavol Bielik, Veselin Raychev, Martin T. Vechev | Scalable race detection for Android applicationsDetails | 
										Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
										or similarly named committee.  This is one such paper that passed review.
									Artifact evaluation badge awarded | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Disjointness domains for fine-grained aliasing Stephan Brandauer, Dave Clarke, Tobias Wrigstad | Disjointness domains for fine-grained aliasingDetails | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | |
| Use at your own risk: the Java unsafe API in the wild Luis Mastrangelo, Luca Ponzanelli, Andrea Mocci, Michele Lanza, Matthias Hauswirth, Nathaniel Nystrom | Use at your own risk: the Java unsafe API in the wildDetails | 
 
										Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
										or similarly named committee.  This is one such paper that passed review.
									Artifact evaluation badge awarded | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Galois transformers and modular abstract interpreters: reusable metatheory for program analysis David Darais, Matthew Might, David Van Horn | Galois transformers and modular abstract interpreters: reusable metatheory for program analysisDetails | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | |
| Automating ad hoc data representation transformations Vlad Ureche, Aggelos Biboudis, Yannis Smaragdakis, Martin Odersky | Automating ad hoc data representation transformationsDetails | 
 
										Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
										or similarly named committee.  This is one such paper that passed review.
									Artifact evaluation badge awarded | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Accurate profiling in the presence of dynamic compilation Yudi Zheng, Lubomír Bulej, Walter Binder | Accurate profiling in the presence of dynamic compilationDetails | 
 
										Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
										or similarly named committee.  This is one such paper that passed review.
									Artifact evaluation badge awarded | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| A sound and optimal incremental build system with dynamic dependencies Sebastian Erdweg, Moritz Lichter, Manuel Weiel | A sound and optimal incremental build system with dynamic dependenciesDetails | 
 
										Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
										or similarly named committee.  This is one such paper that passed review.
									Artifact evaluation badge awarded | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Customizable gradual polymorphic effects for Scala Matías Toro, Éric Tanter | Customizable gradual polymorphic effects for ScalaDetails | 
 
										Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
										or similarly named committee.  This is one such paper that passed review.
									Artifact evaluation badge awarded | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| How scale affects structure in Java programs Cristina V. Lopes, Joel Ossher | How scale affects structure in Java programsDetails | 
 
										Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
										or similarly named committee.  This is one such paper that passed review.
									Artifact evaluation badge awarded | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Automatic memory reclamation for lock-free data structures Nachshon Cohen, Erez Petrank | Automatic memory reclamation for lock-free data structuresDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| John Bender, Mohsen Lesani, Jens Palsberg | Details | 
 
										Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
										or similarly named committee.  This is one such paper that passed review.
									Artifact evaluation badge awarded | Author Comments:
									 Discussion Comments:
										0
									 
										Sharing:
										Research produced artifacts
									 
										Verification:
										Authors have
										verified
										information
									 | 
| Reasoning about the POSIX file system: local update and global pathnames Gian Ntzik, Philippa Gardner | Reasoning about the POSIX file system: local update and global pathnamesDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| EXPLORER : query- and demand-driven exploration of interprocedural control flow properties Yu Feng, Xinyu Wang, Isil Dillig, Calvin Lin | EXPLORER : query- and demand-driven exploration of interprocedural control flow propertiesDetails | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | |
| Approximate computation with outlier detection in Topaz Sara Achour, Martin C. Rinard | Approximate computation with outlier detection in TopazDetails | 
 
										Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
										or similarly named committee.  This is one such paper that passed review.
									Artifact evaluation badge awarded | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Checks and balances: constraint solving without surprises in object-constraint programming languages Tim Felgentreff, Todd D. Millstein, Alan Borning, Robert Hirschfeld | Checks and balances: constraint solving without surprises in object-constraint programming languagesDetails | 
 
										Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
										or similarly named committee.  This is one such paper that passed review.
									Artifact evaluation badge awarded | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Stefan Marr, Stéphane Ducasse | Details | 
 
										Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
										or similarly named committee.  This is one such paper that passed review.
									Artifact evaluation badge awarded | Author Comments:
									 Discussion Comments:
										0
									 
										Sharing:
										Research produced artifacts
									 
										Verification:
										Authors have
										verified
										information
									 | 
| Partial evaluation of machine code Venkatesh Srinivasan, Thomas W. Reps | Partial evaluation of machine codeDetails |  | Author Comments:
									 Discussion Comments:
										0
									 
										Sharing:
										Research produced no artifacts
									 
										Verification:
										Authors have
										verified
										information
									 | 
| Static analysis of event-driven Node.js JavaScript applications Magnus Madsen, Frank Tip, Ondrej Lhoták | Static analysis of event-driven Node.js JavaScript applicationsDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| The chemical approach to typestate-oriented programming Silvia Crafa, Luca Padovani | The chemical approach to typestate-oriented programmingDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Versatile yet lightweight record-and-replay for Android Yongjian Hu, Tanzirul Azim, Iulian Neamtiu | Versatile yet lightweight record-and-replay for AndroidDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| AutoMO: automatic inference of memory order parameters for C/C++11 Peizhao Ou, Brian Demsky | AutoMO: automatic inference of memory order parameters for C/C++11Details | 
										Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
										or similarly named committee.  This is one such paper that passed review.
									Artifact evaluation badge awarded | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Synthesizing Java expressions from free-form queries Tihomir Gvero, Viktor Kuncak | Synthesizing Java expressions from free-form queriesDetails | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | |
| Programming with enumerable sets of structures Ivan Kuraj, Viktor Kuncak, Daniel Jackson | Programming with enumerable sets of structuresDetails | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | |
| A co-contextual formulation of type rules and its application to incremental type checking Sebastian Erdweg, Oliver Bracevac, Edlira Kuci, Matthias Krebs, Mira Mezini | A co-contextual formulation of type rules and its application to incremental type checkingDetails | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | |
| Probability type inference for flexible approximate programming Brett Boston, Adrian Sampson, Dan Grossman, Luis Ceze | Probability type inference for flexible approximate programmingDetails | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | |
| Incremental computation with names Matthew A. Hammer, Joshua Dunfield, Kyle Headley, Nicholas Labich, Jeffrey S. Foster, Michael W. Hicks, David Van Horn | Incremental computation with namesDetails | 
 
										Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
										or similarly named committee.  This is one such paper that passed review.
									Artifact evaluation badge awarded | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Ganesha Upadhyaya, Hridesh Rajan | Details | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | |
| Interactively verifying absence of explicit information flows in Android apps Osbert Bastani, Saswat Anand, Alex Aiken | Interactively verifying absence of explicit information flows in Android appsDetails | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | |
| Stateless model checking of event-driven applications Casper Svenning Jensen, Anders Møller, Veselin Raychev, Dimitar Dimitrov, Martin T. Vechev | Stateless model checking of event-driven applicationsDetails | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | |
| Giga-scale exhaustive points-to analysis for Java in under a minute Jens Dietrich, Nicholas Hollingum, Bernhard Scholz | Giga-scale exhaustive points-to analysis for Java in under a minuteDetails | 
 
										Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
										or similarly named committee.  This is one such paper that passed review.
									Artifact evaluation badge awarded | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| RAIVE: runtime assessment of floating-point instability by vectorization Wen-Chuan Lee, Tao Bao, Yunhui Zheng, Xiangyu Zhang, Keval Vora, Rajiv Gupta | RAIVE: runtime assessment of floating-point instability by vectorizationDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Martin Aigner, Christoph M. Kirsch, Michael Lippautz, Ana Sokolova | Details | 
										Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
										or similarly named committee.  This is one such paper that passed review.
									Artifact evaluation badge awarded | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Scrap your boilerplate with object algebras Haoyuan Zhang, Zewei Chu, Bruno C. d. S. Oliveira, Tijs van der Storm | Scrap your boilerplate with object algebrasDetails | 
 
										Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
										or similarly named committee.  This is one such paper that passed review.
									Artifact evaluation badge awarded | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Synthesis of layout engines from relational constraints Thibaud Hottelier, Rastislav Bodík | Synthesis of layout engines from relational constraintsDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Performance problems you can fix: a dynamic analysis of memoization opportunities Luca Della Toffola, Michael Pradel, Thomas R. Gross | Performance problems you can fix: a dynamic analysis of memoization opportunitiesDetails | 
 
										Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
										or similarly named committee.  This is one such paper that passed review.
									Artifact evaluation badge awarded | Author Comments:
									 Discussion Comments:
										0
									 
										Sharing:
										Research produced artifacts
									 
										Verification:
										Authors have
										verified
										information
									 | 
| ShamDroid: gracefully degrading functionality in the presence of limited resource access Lucas Brutschy, Pietro Ferrara, Omer Tripp, Marco Pistoia | ShamDroid: gracefully degrading functionality in the presence of limited resource accessDetails |  | Author Comments:
										N/A
									 Discussion Comments:
										0
									 
										Sharing:
										Not able to share produced artifacts
									 
										Verification:
										Authors have
										verified
										information
									 | 
| Finding deep compiler bugs via guided stochastic program mutation Vu Le, Chengnian Sun, Zhendong Su | Finding deep compiler bugs via guided stochastic program mutationDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Automated backward error analysis for numerical code Zhoulai Fu, Zhaojun Bai, Zhendong Su | Automated backward error analysis for numerical codeDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Valor: efficient, software-only region conflict exceptions Swarnendu Biswas, Minjia Zhang, Michael D. Bond, Brandon Lucia | Valor: efficient, software-only region conflict exceptionsDetails | 
 
										Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
										or similarly named committee.  This is one such paper that passed review.
									Artifact evaluation badge awarded | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Conditionally correct superoptimization Rahul Sharma, Eric Schkufza, Berkeley R. Churchill, Alex Aiken | Conditionally correct superoptimizationDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Cross-layer memory management for managed language applications Michael R. Jantz, Forrest J. Robinson, Prasad A. Kulkarni, Kshitij A. Doshi | Cross-layer memory management for managed language applicationsDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| FlashMeta: a framework for inductive program synthesis Oleksandr Polozov, Sumit Gulwani | FlashMeta: a framework for inductive program synthesisDetails | Author Comments:
									 Discussion Comments:
										0
									 
										Sharing:
										Research produced artifacts
									 
										Verification:
										Authors have
										verified
										information
									 | |
| SATCheck: SAT-directed stateless model checking for SC and TSO Brian Demsky, Patrick Lam | SATCheck: SAT-directed stateless model checking for SC and TSODetails | 
 
										Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
										or similarly named committee.  This is one such paper that passed review.
									Artifact evaluation badge awarded | Author Comments:
									 Discussion Comments:
										0
									 
										Sharing:
										Research produced artifacts
									 
										Verification:
										Authors have
										verified
										information
									 | 
| Detecting redundant CSS rules in HTML5 applications: a tree rewriting approach Matthew Hague, Anthony Widjaja Lin, C.-H. Luke Ong | Detecting redundant CSS rules in HTML5 applications: a tree rewriting approachDetails | 
 
										Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
										or similarly named committee.  This is one such paper that passed review.
									Artifact evaluation badge awarded | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Protocol-based verification of message-passing parallel programs Hugo A. López, Eduardo R. B. Marques, Francisco Martins, Nicholas Ng, César Santos, Vasco Thudichum Vasconcelos, Nobuko Yoshida | Protocol-based verification of message-passing parallel programsDetails | 
 
										Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
										or similarly named committee.  This is one such paper that passed review.
									Artifact evaluation badge awarded | Author Comments:
									 Discussion Comments:
										0
									 
										Sharing:
										Research produced artifacts
									 
										Verification:
										Authors have
										verified
										information
									 | 
| Using C language extensions for developing embedded software: a case study Markus Voelter, Arie van Deursen, Bernd Kolb, Stephan Eberle | Using C language extensions for developing embedded software: a case studyDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 |