| || I received my Masters from Northeastern in 2005 and joined PRL later that year under Karl Lieberherr. I'm interested in most things PL, but am currently looking at merging ideas from generic functional programming with those of Object-Oriented data structure traversals. |
| || I have a family and a house and an hourglass on my desk. I will
gladly tackle questions on functional programming, debugging, annotation, and
macros. The rest of the questions you should ask someone else.|
| || I received my PhD in January, 2009. My thesis research proposed two changes to Java that remove the need for its "null" value by providing safer alternatives. Specifically, Java programs use null in two primary ways: to indicate that a field is uninitialized, and as a rough encoding of the ML OPTION type. My changes include a new object initialization mechanism that guarantees that all fields are initialized before their use and a safer two-way disjoint union to represent OPTION.|
| || Born in Houston, TX, left, went back to go to Rice University. Interested in PL and compilers. I read during the summer and play table tennis during the winter. I'm still looking for someone up here who has heard of disc golf.|
| || B.S., M.S., and doctoral work in Computer Science at Georgia Tech from 1999 through 2007. I came to Northeastern in 2007 with advisor Pete Manolios. My broad interests include tools and techniques for development of correct systems. Specifically, I have made contributions to explicit-state model checkers including Spin, Murphi, and Java Pathfinder. I have also written a development environment for the ACL2 theorem prover called ACL2s (for "ACL2 Sedan").|
| || |
I am a fifth-year Ph.D. student. My background is mostly in compiler technology, e.g. dataflow analysis and register allocation.
I currently work with Will Clinger on garbage collection of large heaps with hard asymptotic bounds on space and soft bounds on pause times.
I am also a Larceny developer; I have contributed to the development of Common Larceny, the Larceny x86 code generator, and the Larceny runtime.
| || I have spent five of my favorite years in PRL, where I studied the theory of programming languages. My advisor was Mitch Wand with whom I worked on reasoning about higher-order and imperative programs.|
| || I joined Northeastern in 2001, and I worked with Prof. Lieberherr. Interests ... I used to have a list of them written on a piece of paper on my desk, but I cannot find it right now!|
| || I came to Northeastern in 2004, and after my first year here, I
took leave for industrial work in the area of network security.
I then returned to the PRL in 2007. My research is focused on
extending contract systems like the one in Racket to cover
features like first-class modules, first-class classes, and values
like vectors and objects that contain mutable state. I've
also done work on appropriate type systems for language
features like Scheme's variable-arity map and apply.|
| I joined the PRL in 2005 and worked with Riccardo
Pucella. I graduated in 2012 and currently work as a
postdoctoral fellow at Harvard.|
Pengcheng Wu PhD student in computer science, worked on programming languages and software engineering, especially on Object/Aspect-oriented Software Development technologies.