Cited By
View all- Elsman M(2024)Double-Ended Bit-Stealing for Algebraic Data TypesProceedings of the ACM on Programming Languages10.1145/36746288:ICFP(88-120)Online publication date: 15-Aug-2024
- Niu WAgrawal GRen BTsafrir DMUSUVATHI MGupta RAbu-Ghazaleh N(2024)SoD2: Statically Optimizing Dynamic Deep Neural Network ExecutionProceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 110.1145/3617232.3624869(386-400)Online publication date: 27-Apr-2024
- Boruch-Gruszecki AWaśko RXu YParreaux L(2022)A case for DOT: theoretical foundations for objects with pattern matching and GADT-style reasoningProceedings of the ACM on Programming Languages10.1145/35633426:OOPSLA2(1526-1555)Online publication date: 31-Oct-2022
- Show More Cited By