PLDI is a premier forum for all areas of programming language research, including the design, implementation, theory, and efficient use of languages. PLDI seeks outstanding research that has broad appeal to the entire programming languages community.
A recently updated Practices of PLDI is now available for reference and comments.
PLDI will take place June 15-17 (workshops and tutorials will take place June 13-14).
The PLDI’16 technical papers are available (once the conference starts and for one month following) via 1-click download from the ACM Digital Library.
Wed 15 JunDisplayed time zone: Tijuana, Baja California change
10:30 - 12:00 | Verification IResearch Papers at Grand Ballroom San Rafael Chair(s): Işıl Dillig University of Texas, Austin | ||
10:30 30mTalk | Data-Driven Precondition Inference with Learned Features Research Papers Saswat Padhi University of California, Los Angeles, Rahul Sharma Stanford University, Todd Millstein University of California, Los Angeles Media Attached | ||
11:00 30mTalk | Cartesian Hoare Logic for Verifying k-Safety Properties Research Papers Media Attached | ||
11:30 30mTalk | Verifying Bit Manipulations of Floating-Point Research Papers Media Attached |
10:30 - 12:00 | Down to the Metal IResearch Papers at Grand Ballroom Santa Ynez Chair(s): Stephen McCamant University of Minnesota | ||
10:30 30mTalk | Into the depths of C: elaborating the de facto standards Research Papers Kayvan Memarian University of Cambridge, Justus Matthiesen University of Cambridge, James Lingard University of Cambridge (when this work was done), Kyndylan Nienhuis University of Cambridge, David Chisnall University of Cambridge, Robert N. M. Watson University of Cambridge, Peter Sewell University of Cambridge Link to publication Media Attached | ||
11:00 30mTalk | Living on the edge: Rapid-toggling probes with cross modification on x86 Research Papers Buddhika Chamith , Bo Joel Svensson Indiana University, Luke Dalessandro Indiana University, Ryan R. Newton Indiana University Pre-print Media Attached | ||
11:30 30mTalk | Polymorphic Type Inference for Machine Code Research Papers Pre-print Media Attached |
13:30 - 15:00 | Energy & PerformanceResearch Papers at Grand Ballroom San Rafael Chair(s): Manuel Hermenegildo IMDEA Software Institute and T.U. of Madrid (UPM) | ||
13:30 30mTalk | Effective Padding of Multi-Dimensional Arrays to Avoid Cache Conflict Misses Research Papers Changwan Hong , Wenlei Bao , Albert Cohen INRIA, Sriram Krishnamoorthy Pacific Northwest National Laboratories, Louis-Noël Pouchet Ohio State University, J. Ramanujam Louisiana State University, Fabrice Rastello INRIA, France, P. Sadayappan Ohio State University Media Attached | ||
14:00 30mTalk | GreenWeb: Language Extensions for Energy-Efficient Mobile Web Computing Research Papers Link to publication Media Attached | ||
14:30 30mTalk | Input Responsiveness: Using Canary Inputs to Dynamically Steer Approximation Research Papers Michael A. Laurenzano University of Michigan, Parker Hill , Mehrzad Samadi University of Michigan, Scott Mahlke University of Michigan, Jason Mars University of Michigan, Lingjia Tang University of Michigan Media Attached |
13:30 - 15:00 | Testing & DebuggingResearch Papers at Grand Ballroom Santa Ynez Chair(s): Benjamin Zorn Microsoft Research | ||
13:30 30mTalk | Coverage-Directed Differential Testing of JVM Implementations Research Papers Yuting Chen Shanghai Jiao Tong University, Ting Su East China Normal University, Chengnian Sun University of California at Davis, USA, Zhendong Su University of California, Davis, Jianjun Zhao Shanghai Jiao Tong University Media Attached | ||
14:00 30mTalk | Exposing Errors Related to Weak Memory in GPU Applications Research Papers Pre-print Media Attached | ||
14:30 30mTalk | Lightweight Computation Tree Tracing for Lazy Functional Languages Research Papers Media Attached |
15:30 - 17:00 | Parsing & CompilationResearch Papers at Grand Ballroom San Rafael Chair(s): Michelle Strout The University of Arizona | ||
15:30 30mTalk | Automatic Storage Optimization for Arrays [TOPLAS] Research Papers Somashekaracharya G Bhaskaracharya Indian Institute of Science and National Instruments, Uday Bondhugula Indian Institute of Science, Albert Cohen INRIA Media Attached | ||
16:00 30mTalk | Polyhedral AST generation is more than scanning polyhedra [TOPLAS] Research Papers Media Attached | ||
16:30 30mTalk | On the Complexity and Performance of Parsing with Derivatives Research Papers Michael D. Adams University of Utah, Celeste Hollenbeck University of Utah, Matthew Might University of Utah, USA Pre-print Media Attached |
15:30 - 17:00 | |||
15:30 30mTalk | Configuration Synthesis for Programmable Analog Devices with Arco Research Papers Sara Achour Massachusetts Institute of Technology, USA, Rahul Sarpeshkar MIT, Martin C. Rinard Massachusetts Institute of Technology, USA Media Attached | ||
16:00 30mTalk | From Datalog to Flix: A Declarative Language for Fixed Points on Lattices Research Papers Magnus Madsen University of Waterloo, Ming-Ho Yee University of Waterloo, Ondřej Lhoták University of Waterloo DOI Media Attached | ||
16:30 30mTalk | Latte: A Language, Compiler, and Runtime for Elegant and Efficient Deep Neural Networks Research Papers Leonard Truong UC Berkeley / Intel Labs, Raj Barik Intel Labs, Ehsan Totoni Intel Labs, Hai Liu Intel Labs, Chick Markley UC Berkeley, Armando Fox UC Berkeley, Tatiana Shpeisman Intel Labs Media Attached |
Thu 16 JunDisplayed time zone: Tijuana, Baja California change
10:30 - 12:00 | |||
10:30 30mTalk | Accepting Blame for Safe Tunneled Exceptions Research Papers Yizhou Zhang Cornell University, Guido Salvaneschi TU Darmstadt, Quinn Beightol Cornell, Barbara Liskov MIT, Andrew Myers Cornell University Link to publication DOI Media Attached | ||
11:00 30mTalk | Occurrence Typing Modulo Theories Research Papers Pre-print Media Attached | ||
11:30 30mTalk | Refinement Types for TypeScript Research Papers Panagiotis Vekris University of California, San Diego, Benjamin Cosman University of California, San Diego, Ranjit Jhala University of California, San Diego Media Attached |
10:30 - 12:00 | |||
10:30 30mTalk | Stratified Synthesis: Automatically Learning the x86-64 Instruction Set Research Papers Stefan Heule Stanford University, Eric Schkufza VMware Research Group, Rahul Sharma Stanford University, Alex Aiken Stanford University DOI Pre-print Media Attached | ||
11:00 30mTalk | Remix: Online Detection and Repair of Cache Contention for the JVM Research Papers Ariel Eizenberg University of Pennsylvania, Shiliang Hu Intel Corporation, Gilles Pokam Intel Corporation, Joseph Devietti University of Pennsylvania Media Attached | ||
11:30 30mTalk | Statistical Similarity of Binaries Research Papers Media Attached |
13:30 - 15:00 | Software-Defined NetworkingResearch Papers at Grand Ballroom San Rafael Chair(s): Todd Millstein University of California, Los Angeles | ||
13:30 30mTalk | Event-driven Network Programming Research Papers Jedidiah McClurg University of Colorado Boulder, Hossein Hojjat Cornell University, Nate Foster Cornell University, Pavol Cerny University of Colorado Boulder Pre-print Media Attached | ||
14:00 30mTalk | Temporal NetKAT Research Papers Ryan Beckett Princeton University, Michael Greenberg Pomona College, David Walker Princeton University Media Attached | ||
14:30 30mTalk | SDNRacer: Concurrency Analysis for Software-Defined Networks Research Papers Ahmed Elhassany ETH Zürich, Jeremie Miserez ETH Zürich, Pavol Bielik ETH Zurich, Switzerland, Laurent Vanbever ETH Zürich, Martin Vechev ETH Zurich Media Attached |
13:30 - 15:00 | |||
13:30 30mTalk | MapReduce Program Synthesis Research Papers Media Attached | ||
14:00 30mTalk | Programmatic and Direct Manipulation, Together at Last Research Papers Ravi Chugh University of Chicago, Brian Hempel University of Chicago, Mitchell Spradlin University of Chicago, Jacob Albers University of Chicago Pre-print Media Attached | ||
14:30 30mTalk | Fast Synthesis of Fast Collections Research Papers Calvin Loncaric University of Washington, Emina Torlak University of Washington, Michael D. Ernst University of Washington Media Attached |
15:30 - 17:00 | |||
15:30 30mTalk | Just-in-Time Static Type Checking for Dynamic Languages Research Papers Brianna M. Ren University of Maryland, College Park, Jeffrey S. Foster University of Maryland, College Park Media Attached | ||
16:00 30mTalk | Types from data: Making structured data first-class citizens in F# Research Papers Tomas Petricek University of Cambridge, UK, Don Syme Microsoft, Gustavo Guerra Microsoft Corporation, London Pre-print Media Attached | ||
16:30 30mTalk | Automatically Learning Shape Specifications Research Papers He Zhu Purdue University, Gustavo Petri LIAFA, Université Paris Diderot, Suresh Jagannathan Purdue University Media Attached |
15:30 - 17:00 | Verifying SystemsResearch Papers at Grand Ballroom Santa Ynez Chair(s): Santosh Nagarakatte Rutgers University | ||
15:30 30mTalk | Rehearsal: A Configuration Verification Tool for Puppet Research Papers Rian Shambaugh University of Massachusetts Amherst, Aaron Weiss University of Massachusetts Amherst, Arjun Guha University of Massachusetts, Amherst Pre-print Media Attached | ||
16:00 30mTalk | Toward Compositional Verification of Interruptible OS Kernels and Device Drivers Research Papers Hao Chen Yale University, Xiongnan (Newman) Wu Yale University, Zhong Shao Yale University, Joshua Lockerman Yale University, Ronghui Gu Yale University Pre-print Media Attached | ||
16:30 30mTalk | Verified Peephole Optimizations for CompCert Research Papers Eric Mullen University of Washington, Daryl Zuniga University of Washington, Zachary Tatlock University of Washington, Seattle, Dan Grossman University of Washington, USA Pre-print Media Attached |
17:00 - 18:00 | Parallelism IResearch Papers at Grand Ballroom San Rafael Chair(s): Tony Hosking Australian National University, Data61, and Purdue University | ||
17:00 30mTalk | Higher-Order and Tuple-Based Massively-Parallel Prefix Sums Research Papers Sepideh Maleki Texas State University, Annie Yang Texas State University, Martin Burtscher Texas State University Pre-print Media Attached | ||
17:30 30mTalk | A Distributed OpenCL Framework using Redundant Computation and Data Replication Research Papers Junghyun Kim Seoul National University, Gangwon Jo Seoul National University, Jaehoon Jung Seoul National University, Jungwon Kim Oak Ridge National Laboratory, Jaejin Lee Seoul National University Media Attached |
17:00 - 18:00 | |||
17:00 30mTalk | Synthesizing Transformations on Hierarchically Structured Data Research Papers Navid Yaghmazadeh University of Texas, Austin, Christian Klinger University of Texas, Austin, Işıl Dillig University of Texas, Austin, Swarat Chaudhuri Rice University Media Attached | ||
17:30 30mTalk | Program Synthesis from Polymorphic Refinement Types Research Papers Media Attached |
Fri 17 JunDisplayed time zone: Tijuana, Baja California change
09:00 - 10:00 | |||
09:00 30mTalk | Cardinalities and Universal Quantifiers for Verifying Parameterized Systems Research Papers Nikolaj Bjørner Microsoft Research, Klaus Gleissenthall Technische Universität München, Andrey Rybalchenko Microsoft Research Media Attached | ||
09:30 30mTalk | Ivy: Safety Verification by Interactive Generalization Research Papers Oded Padon Tel Aviv University, Kenneth L. McMillan Microsoft Research, Aurojit Panda , Mooly Sagiv Tel Aviv University, Sharon Shoham Media Attached |
09:00 - 10:00 | |||
09:00 30mTalk | Idle Time Garbage Collection Scheduling Research Papers Ulan Degenbaev Google, Jochen Eisinger Google, Manfred Ernst Google, Ross McIlroy Google, Hannes Payer Google Media Attached | ||
09:30 30mTalk | Assessing the Limits of Program-Specific Garbage Collection Performance Research Papers Nicholas Jacek UMass Amherst, Meng-Chieh Chiu UMass Amherst, Benjamin Marlin UMass Amherst, Eliot Moss University of Massachusetts Amherst Media Attached |
10:30 - 12:00 | |||
10:30 30mTalk | Transactional Data Structure Libraries Research Papers Alexander Spiegelman Technion - Israel institute of technology, Guy Golan-Gueta Yahoo Labs, Idit Keidar Technion - Israel institute of technology Media Attached | ||
11:00 30mTalk | FlexVec: Auto-Vectorization for Irregular Loops Research Papers Media Attached | ||
11:30 30mTalk | Verified Lifting of Stencil Computations Research Papers Shoaib Kamil MIT CSAIL, USA, Alvin Cheung University of Washington, Shachar Itzhaky MIT CSAIL, Armando Solar-Lezama MIT Media Attached |
10:30 - 12:00 | |||
10:30 30mTalk | Precise, Dynamic Information Flow for Database-Backed Applications Research Papers Jean Yang Carnegie Mellon University, Travis Hance Dropbox, Thomas H. Austin , Armando Solar-Lezama MIT, Cormac Flanagan UC Santa Cruz, Stephen Chong Harvard University Link to publication Media Attached | ||
11:00 30mTalk | End-to-End Verification of Information-Flow Security for C and Assembly Programs Research Papers Pre-print Media Attached | ||
11:30 30mTalk | A Design and Verification Methodology for Secure Isolated Regions Research Papers Rohit Sinha University of California, Berkeley, Manuel Costa Microsoft Research, Akash Lal Microsoft Research India, Nuno P. Lopes Microsoft Research, Sriram Rajamani Microsoft Research, Sanjit Seshia UC Berkeley, Kapil Vaswani Microsoft Research Media Attached |
Accepted Papers
Call for Contributions
PLDI is a premier forum for all areas of programming language research, including the design, implementation, theory, and efficient use of languages. PLDI seeks outstanding research that has broad appeal and spans the breadth of programming languages.
Submissions
Please note that formatting requirements for PLDI’16 may be different from previous years. Details can be found in the Instructions for Authors. The submission site is https://pldi16.hotcrp.com.
To enable double-blind reviewing, author names and their affiliations must be omitted from submissions, and references to related work by the authors should be in the third person (e.g., not “We build on our previous work …” but rather “We build on the work of …”). However, nothing should be done in the name of anonymity that weakens the submission or makes the job of reviewing the paper more difficult (e.g., important background references should not be omitted or anonymized). If you have questions about the logistics for the double-blind reviewing process, please look at the double-blind reviewing FAQ (or click on tab above).
Papers must describe unpublished work that is not currently submitted for publication elsewhere as described by SIGPLAN’s Republication Policy. Submitters should also be aware of ACM’s Policy and Procedures on Plagiarism.
Evaluation Criteria
The program committee and the external review committee will evaluate the technical contribution of each submission as well as its general accessibility to the PLDI audience. Papers will be judged on significance, originality, and clarity. The paper must be organized so that it is easily understood by an audience with varied expertise. The paper should clearly identify what has been accomplished, why it is significant, and how it relates to previous work.
Artifact Evaluation Process
Authors of accepted papers will be invited to formally submit these supporting materials to the Artifact Evaluation process. The Artifact Evaluation process is run by a separate committee whose task is to assess how the artifacts support the work described in the papers. This submission is voluntary and will not influence the final decision regarding the papers. Papers that go through the Artifact Evaluation process successfully will receive a seal of approval printed on the papers themselves. Additional information will be available on the PLDI AEC web page closer to the submission deadline.
Publication
Authors of accepted papers will be required to sign an ACM copyright release.
AUTHORS TAKE NOTE: The official publication date is the date the proceedings are made available in the ACM Digital Library. This date may be up to two weeks prior to the first day of your conference. The official publication date affects the deadline for any patent filings related to published work. (For those rare conferences whose proceedings are published in the ACM Digital Library after the conference is over, the official publication date remains the first day of the conference.)
Proceedings
PLDI 2016- Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation
Full Citation in the ACM Digital LibraryDown to the Metal I (Grand Ballroom Santa Ynez - Wednesday 10:30-12:00, Session Chair: Stephen McCamant)
Into the depths of C: elaborating the de facto standards
Living on the edge: rapid-toggling probes with cross-modification on x86
Polymorphic type inference for machine code
Verification I (Grand Ballroom San Rafael - Wednesday 10:30-12:00, Session Chair: Isil Dillig)
Data-driven precondition inference with learned features
Cartesian hoare logic for verifying k-safety properties
Verifying bit-manipulations of floating-point
Testing and Debugging (Grand Ballroom Santa Ynez - Wednesday 13:30-15:00, Session Chair: Ben Zorn)
Coverage-directed differential testing of JVM implementations
Exposing errors related to weak memory in GPU applications
Lightweight computation tree tracing for lazy functional languages
Energy and Performance (Grand Ballroom San Rafael - Wednesday 13:30-15:00, Session Chair: Manuel Hermenegildo)
Effective padding of multidimensional arrays to avoid cache conflict misses
GreenWeb: language extensions for energy-efficient mobile web computing
Input responsiveness: using canary inputs to dynamically steer approximation
New Languages (Grand Ballroom Santa Ynez - Wednesday 15:30-17:00, Session Chair: Michael Carbin)
Configuration synthesis for programmable analog devices with Arco
From Datalog to flix: a declarative language for fixed points on lattices
Latte: a language, compiler, and runtime for elegant and efficient deep neural networks
Parsing and Compilation (Grand Ballroom San Rafael - Wednesday 15:30-17:00, Session Chair: Michelle Mills Strout)
Automatic Storage Optimization for Arrays [TOPLAS]
Polyhedral AST Generation is More Than Scanning Polyhedra [TOPLAS]
On the complexity and performance of parsing with derivatives
Down to the Metal II (Grand Ballroom Santa Ynez - Thursday 10:30-12:00, Session Chair: Hans-J. Boehm)
Stratified synthesis: automatically learning the x86-64 instruction set
Remix: online detection and repair of cache contention for the JVM
Statistical similarity of binaries
Types I (Grand Ballroom San Rafael - Thursday 10:30-12:00, Session Chair: David Walker)
Accepting blame for safe tunneled exceptions
Occurrence typing modulo theories
Refinement types for TypeScript
Synthesis I (Grand Ballroom Santa Ynez - Thursday 13:30-15:00, Session Chair: Eran Yahav)
MapReduce program synthesis
Programmatic and direct manipulation, together at last
Fast synthesis of fast collections
Software-Defined Networking (Grand Ballroom San Rafael - Thursday 13:30-15:00, Session Chair: Todd Millstein)
Event-driven network programming
Temporal NetKAT
SDNRacer: concurrency analysis for software-defined networks
Verifying Systems (Grand Ballroom Santa Ynez - Thursday 15:30-17:00, Session Chair: Santosh Nagarakatte)
Rehearsal: a configuration verification tool for puppet
Toward compositional verification of interruptible OS kernels and device drivers
Verified peephole optimizations for CompCert
Types II (Grand Ballroom San Rafael - Thursday 15:30-17:00, Session Chair: Jean Yang)
Just-in-time static type checking for dynamic languages
Types from data: making structured data first-class citizens in F#
Automatically learning shape specifications
Synthesis II (Grand Ballroom Santa Ynez - Thursday 17:00-18:00, Session Chair: Martin Vechev)
Synthesizing transformations on hierarchically structured data
Program synthesis from polymorphic refinement types
Parallelism I (Grand Ballroom San Rafael - Friday 17:00-18:00, Session Chair: Tony Hosking)
Higher-order and tuple-based massively-parallel prefix sums
A distributed OpenCL framework using redundant computation and data replication
Memory Management (Grand Ballroom Santa Ynez - Friday 09:00-10:30, Session Chair: Sam Guyer)
Idle time garbage collection scheduling
Assessing the limits of program-specific garbage collection performance
Verification II (Grand Ballroom San Rafael - Friday 09:00-10:30, Armando Solar-Lezama)
Cardinalities and universal quantifiers for verifying parameterized systems
Ivy: safety verification by interactive generalization
Security (Grand Ballroom Santa Ynez - Friday 10:30-12:00, Session Chair: Andrew Myers)
Precise, dynamic information flow for database-backed applications
End-to-end verification of information-flow security for C and assembly programs
A design and verification methodology for secure isolated regions
Parallelism II (Grand Ballroom San Rafael - Friday 10:30-12:00, Session Chair: Albert Cohen)
Transactional data structure libraries
FlexVec: auto-vectorization for irregular loops
Verified lifting of stencil computations
Camera-Ready Instructions
Authors of accepted papers will have received an author kit from the publisher. Here are the key highlights:
- Paper must be submitted in printable PDF format.
- Please use this style to format your paper, with the
pldi-cameraready
option: PLDI 2016 style file - Text must be in a minimum 10pt font (not 9pt).
- Papers can be 15 pages long in US letter format, all inclusive. Authors may purchase two additional pages @ $100/page.
- Each reference must specify all authors (no et al.).
- Authors of all accepted papers will be required to give a lightning presentation (about 90 s) and a poster in addition to the regular conference talk.
- Proceedings may appear in the ACM digital library as early as May 30, 2016.
FAQ on Double-Blind Reviewing
General
- Q: Why are you using double-blind reviewing?
- A: Studies have shown that a reviewer's attitude toward a submission may be affected, even unconsciously, by the identity of the author. We want reviewers to be able to approach each submission without such involuntary reactions as "Barnaby; he writes a good paper" or "Who are these people? I have never heard of them." For this reason, we ask that authors to omit their names from their submissions, and that they avoid revealing their identity through citation. Note that many systems and security conferences use double-blind reviewing and have done so for years (e.g., SIGCOMM, OSDI, IEEE Security and Privacy, SIGMOD). PLDI has done it for several years now. A key principle to keep in mind is that we intend this process to be cooperative, not adversarial. If a reviewer does discover an author's identity though a subtle clue or oversight the author will not be penalized.
- Q: Do you really think blinding actually works? I suspect reviewers can often guess who the authors are anyway.
- A: Authorship can be guessed correctly sometimes, but imperfect blinding is better than no blinding at all, we believe.
- Q: Couldn't blind submission create an injustice where a paper is inappropriately rejected based upon supposedly-prior work which was actually by the same authors and not previously published?
- A: Reviewers are held accountable for their positions and are required to identify any supposed prior work that they believe undermines the novelty of the paper. Any assertion that 'this has been done before' must be supported with concrete information which can be checked by the PC Chair and by authors vial the author response mechanism. The author response mechanism exists in part to hold reviewers accountable for their positions; authors can and should correct any such misapprehension.
For authors
- Q: What exactly do I have to do to anonymize my paper?
- A: Use common sense. Your job is not to make your identity undiscoverable but simply to make it possible for our reviewers to evaluate your submission without having to know who you are. The specific guidelines stated in the call for papers are simple: omit authors' names from your title page, and when you cite your own work, refer to it in the third person. For example, if your name is Smith and you have worked on amphibious type systems, instead of saying "We extend our earlier work on statically typed toads [Smith 2004]," you might say "We extend Smith's [2004] earlier work on statically typed toads." Also, be sure not to include any acknowledgements that would give away your identity. In general, you should aim to reduce the risk of accidental unblinding. For example, if your paper is the first to describe a system with a well-known name or codename, or you use a personally-identifiable naming convention for your work, you must use a different name for your submission (which you may indicate has been changed for the purposes of double-blind reviewing). You should also avoid revealing the institution affiliation of authors or at which the work was performed.
- Q: I would like to provide supplementary material for consideration, e.g., the code of my implementation or proofs of theorems. How do I do this?
- A: (see the next question also) On the submission site there will be an option to submit supplementary material along with your main paper. This supplementary material should also be anonymized. Reviewers are under no obligation to look at this material. The submission itself is the object of review and so it should strive to convince the reader of at least the plausibility of reported results; supplemental material only serves to confirm, in more detail, the idea argued in the paper. Of course, reviewers are free to change their review upon viewing supplemental material (or for any other reason). For those authors who wish to supplement, we encourage them to mention the supplement in the body of the paper. E.g., "The proof of Lemma 1 is included in the supplemental material submitted with this paper."
- Q: My submission is based on code available in a public repository. How do I deal with this?
- A: Making your code publicly available is not incompatible with the double blind process. You should do the following. First, cite the code in your paper, but remove the actual URL and, instead say "link to repository removed for double blind review" or similar. Second, if when writing your author response, you believe reviewer access to your code would help, say so in your author response (without providing the URL), and send the URL to the Program Chair. Third, you are strongly encouraged to submit your work to the Artifact Evaluation track.
- Q: I am building on my own past work on the WizWoz system. Do I need to rename this system in my paper for purposes of anonymity, so as to remove the implied connection between my authorship of past work on this system and my present submission?
- A: Not necessarily. The core question is really whether the system is one that, once identified, automatically identifies the author(s) and/or the institution. If the system is widely available and open-sourced, and especially if it has a substantial body of contributors and has been out for a while, then these conditions may not hold (e.g., LLVM or HotSpot), because there would be considerable doubt about authorship. By contrast, a paper on a modification to a proprietary system (e.g., Visual C++, or a research project that has not open-sourced its code) implicitly reveals the identity of the authors or their institution. If naming your system essentially reveals your identity (or institution), then you must anonymize it. In your submission, point out that the system name has been anonymized. If you have any doubts, please contact the PC Chair.
- Q: I am submitting a paper that extends my own work that previously appeared at a workshop. Should I anonymize any reference to that prior work?
- A: No. But we recommend you do not use the same title for your PLDI submission, so that it is clearly distinguished from the prior paper. In general, there is rarely a good reason to anonymize a citation. One possibility is for work that is tightly related to the present submission and is also under review. But such works may often be non-anonymous. When in doubt, contact the PC Chair.
- Q: Am I allowed to post my (non-blinded) paper on my web page? Can I advertise the unblinded version of my paper on mailing lists or send it to colleagues? May I give a talk about my work while it is under review?
- A: As far as the authors' publicity actions are concerned, a paper under double-blind review is largely the same as a paper under regular (single-blind) review. Double-blind reviewing should not hinder the usual communication of results. That said, we do ask that you not attempt to deliberately subvert the double-blind reviewing process by announcing the names of the authors of your paper to the potential reviewers of your paper. It is difficult to define exactly what counts as "subversion" here, but some blatant examples include: sending individual e-mail to members of the PC or ERC about your work (unless they are conflicted out anyway), posting mail to a major mailing list (e.g. TYPES) announcing your paper, or posting about it on social media. On the other hand, it is perfectly fine, for example, to visit other institutions and give talks about your work, to present your submitted work during job interviews, to present your work at professional meetings (e.g. Dagstuhl), or to post your work on your web page. PC/ERC members will not be asked to recuse themselves from reviewing your paper unless they feel you have gone out of your way to advertise your authorship information to them. If you're not sure about what constitutes "going out of your way", please consult directly with the Program Chair.
- Q: Will the fact that PLDI is double-blind have an impact on handling conflicts-of interest?
- A: Using DBR does not change the principle that reviewers should not review papers with which they have a conflict of interest, even if they do not immediately know who the authors are. Quoting (with slight alteration) from the ACM SIGPLAN review policies document:
A conflict of interest is defined as a situation in which the reviewer can be viewed as being able to benefit personally in the process of reviewing a paper. For example, if a reviewer is considering a paper written by a member of his own group, a current student, his advisor, or a group that he is seen as being in close competition with, then the outcome of the review process can have direct benefit to the reviewer's own status. If a conflict of interest exists, the potential reviewer should decline to review the paper.
For reviewers
- Q: What should I do if I if I learn the authors' identity? What should I do if a prospective PLDI author contacts me and asks to visit my institution?
- A: If at any point you feel that the authors' actions are largely aimed at ensuring that potential reviewers know their identity, you should contact the Program Chair. Otherwise you should not treat double-blind reviewing differently from regular blind reviewing. In particular, you should refrain from seeking out information on the authors' identity, but if you discover it accidentally this will not automatically disqualify you as a reviewer. Use your best judgment.
- Q: The authors have provided a URL to supplemental material. I would like to see the material but I worry they will snoop my IP address and learn my identity. What should I do?
- A: Contact the Program Chair, who will download the material on your behalf and make it available to you.
- Q: If I am assigned a paper for which I feel I am not an expert, how do I seek an outside review?
- A: PC and ERC members should do their own reviews, not delegate them to someone else. If doing so is problematic for some papers, e.g., you don't feel completely qualified, then consider the following options. First, submit a review for your paper that is as careful as possible, outlining areas where you think your knowledge is lacking. Assuming we have sufficient expert reviews, that could be the end of it: non-expert reviews are valuable too, since conference attendees are by-and-large not experts for any given paper. Second, the review form provides a mechanism for suggesting additional expert reviewers to the PC Chair, who may contact them if additional expertise is needed. Please do NOT contact outside reviewers yourself. As a last resort, if you feel like your review would be extremely uninformed and you'd rather not even submit a first cut, contact the PC Chair, and another reviewer will be assigned.
- Q: How do we handle potential conflicts of interest since I cannot see the author names?
- A: The conference review system will ask that you identify conflicts of interest when you get an account on the submission system. Please see the related question applied to authors to decide how to identify conflicts. Feel free to also identify additional authors whose papers you feel you could not review fairly for reasons other than those given (e.g., strong personal friendship).
These guidelines were originally created by Michael Hicks for POPL 2012, slightly modified for PLDI 2012 by Frank Tip. They were shortened by Keshav Pingali for PLDI 2014, and modified slightly by Steve Blackburn for PLDI 2015.
Instructions for Authors
Instructions for Submission to PLDI’16
This document provides instructions for submitting papers to PLDI. In an effort to respect the efforts of reviewers and in the interest of fairness to all prospective authors, we request that all submissions to PLDI follow the formatting and submission rules detailed below. Submissions that violate these instructions may not be reviewed, at the discretion of the program chair, in order to maintain a review process that is fair to all potential authors.
The committee will make every effort to judge each submitted paper on its own merits. There will be no target acceptance rate. We expect to accept a wide range of papers with appropriate expectations for evaluation — while papers that build on significant past work with strong evaluations are valuable, papers that open new areas with less rigorous evaluation are equally welcome and especially encouraged. In either case, what is important is that the paper’s claims are no stronger than what is supported by the evaluation. Given the wide range of topics covered by PLDI, every effort will be made to find expert reviewers.
All questions regarding paper formatting and submission should be directed to the program chair.
The paper submission site is here.
Highlights
- Paper must be submitted in printable PDF format.
- Text must be in a minimum 10pt font (not 9pt).
- Submissions are double blind (see the FAQ on double blind reviewing or click on the FAQ tab above)
- Papers must be at most 11 pages in US letter format, not including references.
- No additional appendices (beyond 11 pages) are allowed in the paper submission, but may be included as supplemental material (see the FAQ for Double-Blind).
- There is no page limit for references.
- Each reference must specify all authors (no et al.).
- Proceedings may appear in the ACM digital library as early as May 30, 2016.
- Note that unlike last year, there will not be lightning presentations or posters for all papers.
Submission Preparation Instructions
Conflicts
You should specify the names and institutions that represent actual conflicts of interest. These include PhD advisors, PhD advisees, the institutions of any of the authors, any institutions or researchers with a financial conflict of interest, close friends or relatives, and any recent co-authors of papers or grant proposals (in the last 2 years). No other conflicts may be declared. The listing of spurious conflicts (especially of potential reviewers without actual conflicts, as described above) will lead to rejection of paper(s) without review.
Submission Formatting
Papers must be submitted in PDF format and follow the standard two-column ACM proceedings style in 10-point font and be at most 11 pages, exclusive of the bibliography. The bibliography is excluded from the page count to encourage good citation practices and discourage illegible bibliographies. Citations can be either in numeric style or author-year style. Numeric citations always stand as a parenthetical note (e.g., “[42]”), while author-year citations may stand either as a noun phrase (e.g., “Church (1935)”), or as a parenthetical note (e.g., “(Church, 1935)”).
If you are using LaTeX to typeset your paper, then we strongly suggest that you use this temporary LaTeX class file (with the ‘pldi’ class option) and template. If you are using Microsoft Word, you may wish to use this template, which is closely based on Friedrich Steimann’s SIGPLAN template.
Content
Double Blind
Reviewing will be double blind; therefore, please do not include any author names or links to author’s website, etc. on any submitted documents except in the space provided on the online submission form. Please take time to read the PLDI FAQ on Double Blind Reviewing, which gives a more comprehensive and authoritative account than this short paragraph. If you are improving upon your prior work, refer to your prior work in the third person and include a full citation for the work in the bibliography. For example, if you happened to be Collins and McCarthy, building on your own prior work, you might say something like: “While prior work [Backus et al. 1960; Collins 1960; McCarthy 1960] did X, Y, and Z, this paper additionally does W, and is therefore much better.” Do NOT omit or anonymize references for blind review.
In general, you should aim to reduce the risk of accidental unblinding. For example, if your paper describes a system with a well-known name or codename, or you use a personally-identifiable naming convention for your work, you must use a different name for your submission (which you may indicate has been changed for the purposes of double-blind reviewing). You should also avoid revealing the institution where the work was performed.
Figures and Tables
Ensure that the figures and tables are legible. Please also ensure that you refer to your figures in the main text. Many reviewers print the papers in gray-scale. Therefore, if you use colors for your figures, ensure that the different colors are highly distinguishable in gray-scale.
References
There is no length limit for references. Each reference must explicitly list all authors of the paper. Papers not meeting this requirement will be rejected. Authors of NSF proposals should be familiar with this requirement. Knowing all authors of related work will help find the best reviewers. Authors are encouraged (but not required) to include DOIs in their references. Hyperlinked DOIs make the referenced work much more accessible to the reader and greatly assist automatic document analysis.
Paper Submission Instructions
Declaring Authors
Enter all authors of the paper into the online paper submission tool upfront. Addition/removal of authors once the paper is accepted will have to be approved by the program chair, since it potentially undermines the goal of eliminating conflicts for reviewer assignment.
Concurrent Submissions and Workshops
By submitting a manuscript to PLDI, authors guarantee that they are adhering to the SIGPLAN Republication Policy. Please ensure that you are familiar with it. Violation of any of these conditions will lead to rejection.
As always, if you are in doubt, it is best to contact the program chair.
Finally, we also note that the ACM Plagiarism Policy covers a range of ethical issues concerning the misrepresentation of other works or one’s own work.
Early Access in the Digital Library
The PLDI proceedings may be available on the ACM Digital Library as early as May 30, 2016. Authors must consider any implications of this early disclosure of their work before submitting their papers.
Acknowledgements
This document is based heavily on ones prepared for previous conferences and we thank their program chairs; in particular, Sandhya Dwarkadas (ASPLOS’15), Sarita Adve (ASPLOS’14), Steve Keckler (ISCA’14), Christos Kozyrakis (Micro’13), Margaret Martonosi (ISCA’13), Onur Mutlu (Micro’12), Michael L. Scott (ASPLOS’12), and Steve Blackburn (PLDI’15).
References
J. W. Backus, F. L. Bauer, J. Green, C. Katz, J. McCarthy, A. J. Perlis, H. Rutishauser, K. Samelson, B. Vauquois, J. H. Wegstein, A. van Wijngaarden, and M. Woodger. Report on the algorithmic language ALGOL 60. Commun. ACM, 3(5):299– 314, May 1960. ISSN 0001-0782. doi: 10.1145/367236.367262.
G. E. Collins. A method for overlapping and erasure of lists. Commun. ACM, 3(12):655–657, December 1960. doi: 10.1145/367487.367501.
L. Lamport. LaTeX: A Document Preparation System. Addison- Wesley, Reading, Massachusetts, 2nd edition, 1994.
J. McCarthy. Recursive functions of symbolic expressions and their computation by machine, part I. Commun. ACM, 3(4): 184–195, April 1960. doi: 10.1145/367177.367199.