Northeastern University
College of Computer and Information Science

Contact Us

  • Contact Us

Search

  • Explore CCIS
    • About the College
      • Dean’s Message
    • Undergraduate Programs
      • Advising
      • Degree Programs
      • Minor in Computer Science
      • Minor in Information Science
      • Tutoring
      • Scholarships
      • Student Awards
    • Graduate Programs
      • Degree Programs
      • Current Students
    • Co-op
    • People and Organizations
      • Faculty
      • Administrative Staff
      • Student Organizations
    • Contact Us
    • Research
      • Research Groups
      • Centers and Institutes
    • Technical Help
  • Prospective Students
  • Current Students
  • Alumni
  • Employers
Layout Image
  • About the College
    • Dean’s Message
    • CCIS Videos
  • Undergraduate Programs
    • Advising
    • Degree Programs
    • Minor in Computer Science
    • Minor in Information Science
    • Scholarships
      • Bradley E. Bailey Scholarship
      • Darwin Scholarship
      • Jane K. Wenzinger Scholarship Fund
      • Department of Defense Information Assurance Scholarship Program
      • NSF Federal Cyber Service: Scholarship for Service
    • Student Awards and Research
    • Tutoring
  • Graduate Programs
    • Degree Programs
      • Ph.D. in Computer Science
        • Admission Requirements
        • Academic Requirements
        • Time and Time Limitation
        • Transfer Credit
        • Approved Courses
        • Electives Outside the College
        • Specimen Curriculum
        • Academic Review Process
      • Ph.D. in Information Assurance
        • Admissions Requirements
        • Academic Requirements
        • Time and Time Limitation
        • Transfer Credit
        • Specimen Curriculum
        • Program Faculty
        • Contact Us
      • Ph.D. in Personal Health Informatics
      • M.S. in Computer Science
        • Admissions Requirements
        • Academic Requirements
        • Academic Probation
        • Time and Time Limitation
        • Transfer Credit
        • Approved Courses
        • Specimen Academic Schedule
        • Reading and Project Courses
        • Master’s Thesis
        • Request More Information
      • M.S. in Information Assurance
        • Admissions Requirements
        • Academic Requirements
        • Specimen Academic Schedule
        • Financial Aid and Scholarships
        • Faculty
        • Request More Information- MSIA
      • M.S. in Health Informatics
        • Program Overview
        • Master’s Degree
        • Certificates
        • Course Descriptions
        • Testimonials
        • Faculty
        • Careers
        • Student Profiles
        • Apply
        • Request More Information- MSHI
      • ALIGN
    • Apply
    • Scholarships
    • FAQ
    • Current Students
      • Course Descriptions
      • Course Schedules
      • Graduate Guidebook
      • Commencement
      • Forms
      • Travel Support
      • Wiki
      • Jobs
      • New Student Page
        • MyNeu Account
        • Course Registration
        • Health Insurance Requirements
        • ISSI Orientation
        • CCIS Orientation
        • CCIS Email Account
        • Paying Your Bill
        • Husky ID Cards
        • Online Learning
        • Housing
        • Parking
        • Public Transportation
  • Research
    • Research Groups
      • Algorithms and Theory
      • Artificial Intelligence
      • Data
      • Educational Research
      • Formal Methods
      • Game Design
      • Network Science
      • Personal Health Informatics
      • Programming Languages
      • Security
      • Software Engineering
      • Systems
    • Centers and Institutes
  • Co-op
    • Information for Students
      • FAQ
      • Information for New Students
      • Information for Upperclass Students
      • Information for GraduateĀ Students
      • Prospective
      • Forms
    • Information for Employers
    • Co-op Manual
      • Steps to Finding A Job
      • Taking a Course
      • Academic Standards
    • Research & Data
      • Assessment
    • Calendar
    • Surveys & Evaluations
      • Student Evaluation
      • Employer Evaluation
  • People and Organizations
    • Faculty
    • Administrative Staff
    • Student Organizations
  • News & Events
    • News Archive
    • Events
    • Distinguished Speakers Series
Research Groups

Programming Languages

  • Headshot of

    Amal Ahmed

  • Headshot of

    Eli Barzilay

  • Headshot of

    William D. Clinger

  • Headshot of

    Matthias Felleisen

  • Headshot of

    Olin Shivers

  • Headshot of

    Sam Tobin-Hochstadt

  • Headshot of

    David Van Horn

  • Headshot of

    Mitchell Wand

This distinguished group has led some of the most important advances in the deisgn, implementation and analysis of programming languages. Members of the research group ensure that programs have the robust languages they need to produce more reliable, manageable, secure and efficient programs.

They draw on extensive experience in implementing compilers, static analyses, optimizers and run-time systems to address the performance challenge of scripting languages. The group’s research focuses on modeling programming languages to predict how programs will function; creating efficient and reliable macros, logical relations, language-based security and security-preserving compilation; and developing techniques that allow programmers to adapt programming languages to the needs of specific programs.

The programming languages group is also interested in pedagogy and has special expertise in Scheme and its implementations. The group is active in language development and standardization efforts, and in pedagogic projects, including TeachScheme.

Team Achievements

  • Awarded a DARPA (Defense Advanced Research Projects Agency) grant as part of an effort to design new computer systems that are highly resistant to cyber attacks by developing bug-free, secure technology using new programming languages that enable programmers to write large, complex software
  • Received a National Science Foundation grant to pursue formal study of software contracts in presence of state
  • Created the PLT Scheme programming environment
  • Developed Larceny, a high-performance Scheme implementation for scientific applications
  • Participated in the invention of Hygiene, a technique for ensuring that macros don’t interfere with one another
  • Developed the Scheme Shell (SCSH), a widely used systems programming and scripting environment that runs on any generic Unix platform
  • Authored the “comint” family of interactive process-management modules for the emacs text editor
  • Pioneered the use of contracts to check the validity of data flowing into and out of software components and extended this idea to complex, intercommunicating programs and multi-language systems in which each component must guard itself against errors in other components
  • Created mathematical models of computer programs that allow deisgners to predict significant properties of their program and safely transform a program into a more efficient program
  • Pioneered the form of modeling known as higher-order flow analysis
Northeastern University
  • My NEU
  • Find Faculty & Staff
  • Find A – Z
  • Emergency Information
  • Search

360 Huntington Ave. Boston, Massachusetts 02115 • 1 (617) 373-2000

© 2013 Northeastern University

  • twitter
  • facebook
  • youtube