Towards automatic resource bound analysis for OCaml

J Hoffmann, A Das, SC Weng - Proceedings of the 44th ACM SIGPLAN …, 2017 - dl.acm.org
This article presents a resource analysis system for OCaml programs. The system
automatically derives worst-case resource bounds for higher-order polymorphic programs …

Bounded expectations: resource analysis for probabilistic programs

VC Ngo, Q Carbonneaux, J Hoffmann - ACM SIGPLAN Notices, 2018 - dl.acm.org
This paper presents a new static analysis for deriving upper bounds on the expected
resource consumption of probabilistic programs. The analysis is fully automatic and derives …

Relational cost analysis

E Çiçek, G Barthe, M Gaboardi, D Garg… - ACM SIGPLAN …, 2017 - dl.acm.org
Establishing quantitative bounds on the execution cost of programs is essential in many
areas of computer science such as complexity analysis, compiler optimizations, security and …

A cost-aware logical framework

Y Niu, J Sterling, H Grodin, R Harper - Proceedings of the ACM on …, 2022 - dl.acm.org
We present calf, ac ost-a ware l ogical f ramework for studying quantitative aspects of
functional programs. Taking inspiration from recent work that reconstructs traditional aspects …

Resource-guided program synthesis

T Knoth, D Wang, N Polikarpova… - Proceedings of the 40th …, 2019 - dl.acm.org
This article presents resource-guided synthesis, a technique for synthesizing recursive
programs that satisfy both a functional specification and a symbolic resource bound. The …

TiML: a functional language for practical complexity analysis with invariants

P Wang, D Wang, A Chlipala - Proceedings of the ACM on Programming …, 2017 - dl.acm.org
We present TiML (Timed ML), an ML-like functional language with time-complexity
annotations in types. It uses indexed types to express sizes of data structures and upper …

Verifying and synthesizing constant-resource implementations with types

M Dehesa-Azuara, M Fredrikson… - 2017 IEEE Symposium …, 2017 - ieeexplore.ieee.org
Side channel attacks have been used to extract critical data such as encryption keys and
confidential user data in a variety of adversarial settings. In practice, this threat is addressed …

A unifying type-theory for higher-order (amortized) cost analysis

V Rajani, M Gaboardi, D Garg, J Hoffmann - Proceedings of the ACM on …, 2021 - dl.acm.org
This paper presents λ-amor, a new type-theoretic framework for amortized cost analysis of
higher-order functional programs and shows that existing type systems for cost analysis can …

Raising expectations: automating expected cost analysis with types

D Wang, DM Kahn, J Hoffmann - Proceedings of the ACM on …, 2020 - dl.acm.org
This article presents a type-based analysis for deriving upper bounds on the expected
execution cost of probabilistic programs. The analysis is naturally compositional, parametric …

Work analysis with resource-aware session types

A Das, J Hoffmann, F Pfenning - Proceedings of the 33rd Annual ACM …, 2018 - dl.acm.org
While there exist several successful techniques for supporting programmers in deriving
static resource bounds for sequential code, analyzing the resource usage of message …