{"version":"https://jsonfeed.org/version/1.1","title":"Home on Computer Software Group","description":"Recent content in Home on Computer Software Group","home_page_url":"https://www.fos.kuis.kyoto-u.ac.jp/","feed_url":"https://www.fos.kuis.kyoto-u.ac.jp/en/index.json","language":"en-US","icon":"https://www.fos.kuis.kyoto-u.ac.jp/apple-touch-icon.png","favicon":"https://www.fos.kuis.kyoto-u.ac.jp/apple-touch-icon.png","authors":[{"name":"Atsushi Igarashi","url":"https://www.fos.kuis.kyoto-u.ac.jp/~igarashi/"}],"items":[{"title":"Publications","date_published":"2026-05-01T00:00:00Z","date_modified":"2026-05-01T00:00:00Z","id":"https://www.fos.kuis.kyoto-u.ac.jp/en/publications/","url":"https://www.fos.kuis.kyoto-u.ac.jp/en/publications/","content_html":"\u003cstyle\u003e\n   \n  .pub-group-year {\n    margin-top: 3rem;    \n    margin-bottom: 1rem;  \n    border-bottom: 2px solid #eee;  \n    padding-bottom: 0.5rem;\n  }\n\n   \n  .pub-item {\n    margin-bottom: .5rem;\n  }\n\u003c/style\u003e\n\n\n\n\n\n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n  \n    \n    \n  \n\n\n\n\n\n\n\n\n\n\u003cnav class=\"pub-nav\" style=\"margin-bottom: 2rem; font-size: 1.1rem;\"\u003e\n  [\n  \n    \n    \u003ca href=\"#2026\"\u003e2026\u003c/a\u003e\n     | \n  \n    \n    \u003ca href=\"#2025\"\u003e2025\u003c/a\u003e\n     | \n  \n    \n    \u003ca href=\"#2024\"\u003e2024\u003c/a\u003e\n     | \n  \n    \n    \u003ca href=\"#2023\"\u003e2023\u003c/a\u003e\n     | \n  \n    \n    \u003ca href=\"#2022\"\u003e2022\u003c/a\u003e\n     | \n  \n    \n    \u003ca href=\"#2021\"\u003e2021\u003c/a\u003e\n     | \n  \n    \n    \u003ca href=\"#2020\"\u003e2020\u003c/a\u003e\n     | \n  \n    \n    \u003ca href=\"#2019\"\u003e2019\u003c/a\u003e\n     | \n  \n    \n    \u003ca href=\"#2018\"\u003e2018\u003c/a\u003e\n     | \n  \n    \n    \u003ca href=\"#2017\"\u003e2017\u003c/a\u003e\n     | \n  \n    \n    \u003ca href=\"#2016\"\u003e2016\u003c/a\u003e\n     | \n  \n    \n    \u003ca href=\"#2015\"\u003e2015\u003c/a\u003e\n     | \n  \n    \n    \u003ca href=\"#2014\"\u003e2014\u003c/a\u003e\n     | \n  \n    \n    \u003ca href=\"#2013\"\u003e2013\u003c/a\u003e\n     | \n  \n    \n    \u003ca href=\"#2012\"\u003e2012\u003c/a\u003e\n     | \n  \n    \n    \u003ca href=\"#2011\"\u003e2011\u003c/a\u003e\n     | \n  \n    \n    \u003ca href=\"#2010\"\u003e2010\u003c/a\u003e\n     | \n  \n    \n    \u003ca href=\"#2009\"\u003e2009\u003c/a\u003e\n     | \n  \n    \n    \u003ca href=\"#2008\"\u003e2008\u003c/a\u003e\n     | \n  \n    \n    \u003ca href=\"#2007\"\u003e2007\u003c/a\u003e\n     | \n  \n    \n    \u003ca href=\"#2006\"\u003e2006\u003c/a\u003e\n     | \n  \n    \n    \u003ca href=\"#2005\"\u003e2005\u003c/a\u003e\n     | \n  \n    \n    \u003ca href=\"#2004\"\u003e2004\u003c/a\u003e\n     | \n  \n    \n    \u003ca href=\"#2003\"\u003e2003\u003c/a\u003e\n     | \n  \n    \n    \u003ca href=\"#2002\"\u003e2002\u003c/a\u003e\n     | \n  \n    \n    \u003ca href=\"#2001\"\u003e2001\u003c/a\u003e\n     | \n  \n    \n    \u003ca href=\"#2000\"\u003e2000\u003c/a\u003e\n     | \n  \n    \n    \u003ca href=\"#1999\"\u003e1999\u003c/a\u003e\n     | \n  \n    \n    \u003ca href=\"#1997\"\u003e1997\u003c/a\u003e\n    \n  \n  ]\n\u003c/nav\u003e\n\n\n\n  \n  \n\n  \u003ch3 id=\"2026\" class=\"pub-group-year\"\u003e2026\u003c/h2\u003e\n  \u003cdiv class=\"pub-list\"\u003e\n    \n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eCompile-Time Tensor Shape Checking via Staged Shape-Dependent Types\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eTakashi Suwa, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of ECOOP 2026\u003c/em\u003e, 2026\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eOwnership Refinement Types for Pointer Arithmetic and Nested Arrays\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eYusuke Fujiwara, Yusuke Matsushita, Kohei Suenaga, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of ECOOP 2026\u003c/em\u003e, 2026\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eContextual Metaprogramming for Session Types\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003ePedro Ângelo, Atsushi Igarashi, Yuito Murase, Vasco T. Vasconcelos\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProgramming Languages and Systems - 35th European Symposium on Programming, ESOP 2026, Held as Part of the International Joint Conferences on Theory and Practice of Software, ETAPS 2026, Turin, Italy, April 11-16, 2026, Proceedings, Part I.\u003c/em\u003e, 2026\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1007/978-3-032-22720-1_2\" target=\"_blank\" rel=\"noopener\"\u003e10.1007/978-3-032-22720-1_2\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eAn ML-style module system for cross-stage type abstraction in multi-stage programming\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eTakashi Suwa, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eScience of Computer Programming\u003c/em\u003e, 2026\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1016/j.scico.2025.103379\" target=\"_blank\" rel=\"noopener\"\u003e10.1016/j.scico.2025.103379\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eA Fast and Soft Pattern Matcher for Trillion-Scale Corpus\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eMasataka Yoneda, Masataka_Yoneda, Yusuke Matsushita, Go Kamoda, Kohei Suenaga, Takuya Akiba, Masaki Waga, Sho Yokoi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eICML 2026 (accepted)\u003c/em\u003e, 2026\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eEvaluating Hybrid Automata Learning Tools Based on Their Success in Formal Verification\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eNiklas Kochdumper, Chiao Hsieh, Hadi Dayekh, Amit Gurung, Hidekazu Segawa, Thao Dang, Masaki Waga, Kohei Suenaga\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eMED 2026 (Accepted)\u003c/em\u003e, 2026\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eSoftMatcha 2: 1 兆語規模コーパスの超高速かつ柔らかい検索\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e米田優峻, 鴨田豪, 松下祐介, 末永幸平, 秋葉拓哉, 和賀正樹, 横井祥\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e言語処理学会 第32回年次大会 発表論文集\u003c/em\u003e, 2026\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eIn-Situ Hardware Error Detection Using Specification-Derived Petri Net Models and Behavior-Derived State Sequences\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eTomonari Tanaka, Takumi Uezono, Kohei Suenaga, Masanori Hashimoto\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (Accepted)\u003c/em\u003e, 2026\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eActive Learning of Symbolic Mealy Automata\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eKengo Irie, Masaki Waga, Kohei Suenaga\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eICTAC 2025\u003c/em\u003e, 2026\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1007/978-3-032-11176-0_19\" target=\"_blank\" rel=\"noopener\"\u003e10.1007/978-3-032-11176-0_19\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eComponentwise Automata Learning for System Integration\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eHiroya Fujinami, Masaki Waga, Jie An, Kohei Suenaga, Nayuta Yanagisawa, Hiroki Iseri, Ichiro Hasuo\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eATVA 2025\u003c/em\u003e, 2026\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1007/978-3-032-08707-2_1\" target=\"_blank\" rel=\"noopener\"\u003e10.1007/978-3-032-08707-2_1\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eSoftMatcha 2: A Fast and Soft Pattern Matcher for Trillion-Scale Corpora\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eMasataka Yoneda, Yusuke Matsushita, Go Kamoda, Kohei Suenaga, Takuya Akiba, Masaki Waga, Sho Yokoi\u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.48550/ARXIV.2602.10908\" target=\"_blank\" rel=\"noopener\"\u003e10.48550/ARXIV.2602.10908\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eRapunSL: Untangling Quantum Computing with Separation, Linear Combination and Mixing\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eYusuke Matsushita, Kengo Hirata, Ryo Wakizaka, Emanuele D\u0026#39;Osualdo\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of the ACM on Programming Languages\u003c/em\u003e, 2026\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1145/3776648\" target=\"_blank\" rel=\"noopener\"\u003e10.1145/3776648\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n  \u003c/div\u003e\n\n  \n  \n\n  \u003ch3 id=\"2025\" class=\"pub-group-year\"\u003e2025\u003c/h2\u003e\n  \u003cdiv class=\"pub-list\"\u003e\n    \n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eMaking Rabbit Run for Security Verification of Networked Systems with Unbounded Loops\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eSewon Park, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of Formal Methods in Computer-Aided Design (FMCAD)\u003c/em\u003e, 2025\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003e動的型推論を備えた空間効率の良い漸進的型付け\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e大志万優生, 関山太朗, 五十嵐淳\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e日本ソフトウェア科学会第42回大会論文集\u003c/em\u003e, 2025\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eUnifying Function- and Argument-First Bidirectional Type Systems\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eTakuma Yoshioka and Taro Sekiyama and Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e日本ソフトウェア科学会第42回大会論文集\u003c/em\u003e, 2025\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eEfficient Black-Box Checking with Specification-Guided Abstraction\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eTsubasa Matsumoto, Kazuki Watanabe, Kohei Suenaga, Masaki Waga\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eACM Transactions on Embedded Computing Systems\u003c/em\u003e, 2025\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1145/3762659\" target=\"_blank\" rel=\"noopener\"\u003e10.1145/3762659\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eStatWhy: Formal Verification Tool for Statistical Hypothesis Testing Programs\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eYusuke Kawamoto, Kentaro Kobayashi, Kohei Suenaga\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eCAV 2025\u003c/em\u003e, 2025\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1007/978-3-031-98679-6_10\" target=\"_blank\" rel=\"noopener\"\u003e10.1007/978-3-031-98679-6_10\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eCertifying Lyapunov Stability of Black-Box Nonlinear Systems via Counterexample Guided Synthesis\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eChiao Hsieh, Masaki Waga, Kohei Suenaga\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eHSCC 2025 (To appear)\u003c/em\u003e, 2025\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eA Soft and Fast Pattern Matcher for Billion-Scale Corpus Searches\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eHiroyuki Deguchi, Go Kamoda, Yusuke Matsushita, Chihiro Taguchi, Kohei Suenaga, Masaki Waga, Sho Yokoi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eICLR 2025 (To appear)\u003c/em\u003e, 2025\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eHardware Error Detection with In-Situ Monitoring of Control Flow-Related Specifications\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eTomonari Tanaka, Takumi Uezono, Kohei Suenaga, Masanori Hashimoto\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of the 30th Asia and South Pacific Design Automation Conference\u003c/em\u003e, 2025\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1145/3658617.3697744\" target=\"_blank\" rel=\"noopener\"\u003e10.1145/3658617.3697744\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eCHLOE: Loop Transformation over Fully Homomorphic Encryption via Multi-Level Vectorization and Control-Path Reduction.\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eSong Bian, Zian Zhao, Ruiyu Shen, Zhou Zhang, Ran Mao, Dawei Li, Yizhong Liu, Masaki Waga, Kohei Suenaga, Zhenyu Guan, Jiafeng Hua, Yier Jin, Jianwei Liu\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eIEEE Symposium on Security and Privacy(SP)\u003c/em\u003e, 2025\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1109/SP61157.2025.00035\" target=\"_blank\" rel=\"noopener\"\u003e10.1109/SP61157.2025.00035\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eA Variety of Request-Response Specifications.\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eDaichi Aiba, Masaki Waga, Hiroya Fujinami, Koko Muroya, Shutaro Ouchi, Naoki Ueda, Yosuke Yokoyama, Yuta Wada, Ichiro Hasuo\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eICTAC\u003c/em\u003e, 2025\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1007/978-3-032-11176-0_15\" target=\"_blank\" rel=\"noopener\"\u003e10.1007/978-3-032-11176-0_15\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eHyper Pattern Matching.\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eMasaki Waga, Étienne André\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eRuntime Verification - 25th International Conference(RV)\u003c/em\u003e, 2025\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1007/978-3-032-05435-7_22\" target=\"_blank\" rel=\"noopener\"\u003e10.1007/978-3-032-05435-7_22\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eSoftMatcha: A Soft and Fast Pattern Matcher for Billion-Scale Corpus Searches.\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eHiroyuki Deguchi 0002, Go Kamoda, Yusuke Matsushita 0002, Chihiro Taguchi, Kohei Suenaga, Masaki Waga, Sho Yokoi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eThe Thirteenth International Conference on Learning Representations(ICLR)\u003c/em\u003e, 2025\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eCyclic proofs and size-change termination.\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eMirai Ikebuchi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eTheor. Comput. Sci.\u003c/em\u003e, 2025\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1016/j.tcs.2025.115273\" target=\"_blank\" rel=\"noopener\"\u003e10.1016/j.tcs.2025.115273\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eNola: Later-Free Ghost State for Verifying Termination in Iris\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eYusuke Matsushita, Takeshi Tsukada\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of the ACM on Programming Languages\u003c/em\u003e, 2025\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1145/3729250\" target=\"_blank\" rel=\"noopener\"\u003e10.1145/3729250\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eSoftMatcha: A Soft and Fast Pattern Matcher for Billion-Scale Corpus Searches\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eHiroyuki Deguchi, Go Kamoda, Yusuke Matsushita, Chihiro Taguchi, Kohei Suenaga, Masaki Waga, Sho Yokoi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e13th International Conference on Learning Representations (ICLR 2025)\u003c/em\u003e, 2025\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n  \u003c/div\u003e\n\n  \n  \n\n  \u003ch3 id=\"2024\" class=\"pub-group-year\"\u003e2024\u003c/h2\u003e\n  \u003cdiv class=\"pub-list\"\u003e\n    \n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eType-Based Verification of Connectivity Constraints in Lattice Surgery\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eRyo Wakizaka, Yasunari Suzuki, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of the 22nd Asian Symposium on Programming Languages and Systems\u003c/em\u003e, 2024\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1007/978-981-97-8943-6_11\" target=\"_blank\" rel=\"noopener\"\u003e10.1007/978-981-97-8943-6_11\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eRabbit: A Language to Model and Verify Data Flow in Networked Systems\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eTerunobu Inaba, Yutaka Ishikawa, Atsushi Igarashi, Taro Sekiyama\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e2024 International Symposium on Networks, Computers and Communications (ISNCC)\u003c/em\u003e, 2024\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1109/isncc62547.2024.10758938\" target=\"_blank\" rel=\"noopener\"\u003e10.1109/isncc62547.2024.10758938\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eSpace-Efficient Polymorphic Gradual Typing, Mostly Parametric\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eAtsushi Igarashi, Shota Ozaki, Taro Sekiyama, Yudai Tanabe\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of the ACM on Programming Languages\u003c/em\u003e, 2024\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1145/3656441\" target=\"_blank\" rel=\"noopener\"\u003e10.1145/3656441\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eSignature restriction for polymorphic algebraic effects\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eTARO SEKIYAMA, TAKESHI TSUKADA, ATSUSHI IGARASHI\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eJournal of Functional Programming\u003c/em\u003e, 2024\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1017/s0956796824000054\" target=\"_blank\" rel=\"noopener\"\u003e10.1017/s0956796824000054\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eLinear Contextual Metaprogramming and Session Types\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003ePedro Ângelo, Atsushi Igarashi, Vasco T. Vasconcelos\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eElectronic Proceedings in Theoretical Computer Science\u003c/em\u003e, 2024\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.4204/eptcs.401.1\" target=\"_blank\" rel=\"noopener\"\u003e10.4204/eptcs.401.1\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003e命令型プログラムの安全性検証のための所有権主導変換\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e小林亮太, 中村烈士, 五十嵐淳, 末永幸平, 小林直樹\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e第26回プログラミングおよびプログラミング言語ワークショップ(PPL2024)論文集\u003c/em\u003e, 2024\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eiCon: Automated Verification of Inter-Transaction Properties in Tezos Smart Contracts with Unknowns\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eYuki Nishida, Kohei Suenaga, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of 2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)\u003c/em\u003e, 2024\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eOblivious Monitoring for Discrete-Time STL via Fully Homomorphic Encryption.\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eMasaki Waga, Kotaro Matsuoka, Takashi Suwa, Naoki Matsumoto, Ryotaro Banno, Song Bian 0001, Kohei Suenaga\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eRuntime Verification - 24th International Conference(RV)\u003c/em\u003e, 2024\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1007/978-3-031-74234-7_4\" target=\"_blank\" rel=\"noopener\"\u003e10.1007/978-3-031-74234-7_4\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eHEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation.\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eSong Bian, Zian Zhao, Zhou Zhang, Ran Mao, Kohei Suenaga, Yier Jin, Zhenyu Guan, Jianwei Liu\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e31st Annual Network and Distributed System Security Symposium(NDSS)\u003c/em\u003e, 2024\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003e制御フロー仕様から生成したペトリネットに基づくハードウェア誤動作検出手法\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e田中 知成, 上薗 巧, 末永 幸平, 橋本 昌宜\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eDAシンポジウム2024論文集\u003c/em\u003e, 2024\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eGoal-Aware RSS for Complex Scenarios via Program Logic\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eIchiro Hasuo, Clovis Eberhart, James Haydon, Jérémy Dubut, Rose Bohrer, Tsutomu Kobayashi, Sasinee Pruekprasert, Xiao-Yi Zhang, Erik André Pallas, Akihisa Yamada, Kohei Suenaga, Fuyuki Ishikawa, Kenji Kamijo, Yoshiyuki Shinya, Takamasa Suetomi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e2024 IEEE Intelligent Vehicles Symposium (IV)\u003c/em\u003e, 2024\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1109/iv55156.2024.10588754\" target=\"_blank\" rel=\"noopener\"\u003e10.1109/iv55156.2024.10588754\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eSound and relatively complete belief Hoare logic for statistical hypothesis testing programs.\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eYusuke Kawamoto 0001, Tetsuya Sato 0001, Kohei Suenaga\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eArtif. Intell.\u003c/em\u003e, 2024\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1016/j.artint.2023.104045\" target=\"_blank\" rel=\"noopener\"\u003e10.1016/j.artint.2023.104045\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eControl-data separation and logical condition propagation for efficient inference on probabilistic programs\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eIchiro Hasuo, Yuichiro Oyabu, Clovis Eberhart, Kohei Suenaga, Kenta Cho, Shin-ya Katsumata\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eJournal of Logical and Algebraic Methods in Programming\u003c/em\u003e, 2024\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1016/j.jlamp.2023.100922\" target=\"_blank\" rel=\"noopener\"\u003e10.1016/j.jlamp.2023.100922\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eHyper Parametric Timed CTL.\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eMasaki Waga, Étienne André\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems\u003c/em\u003e, 2024\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1109/TCAD.2024.3443704\" target=\"_blank\" rel=\"noopener\"\u003e10.1109/TCAD.2024.3443704\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eTemporal Logic Formalisation of ISO 34502 Critical Scenarios: Modular Construction with the RSS Safety Distance\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eJesse Reimann, Nico Mansion, James Haydon, Benjamin Bray, Agnishom Chattopadhyay, Sota Sato, Masaki Waga, Étienne André, Ichiro Hasuo, Naoki Ueda, Yosuke Yokoyama\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e39th ACM/SIGAPP Symposium On Applied Computing\u003c/em\u003e, 2024\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1145/3605098.3636014\" target=\"_blank\" rel=\"noopener\"\u003e10.1145/3605098.3636014\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eTemporal Logic Formalisation of ISO 34502 Critical Scenarios: Modular Construction with the RSS Safety Distance.\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eJesse Reimann, Nico Mansion, James Haydon, Benjamin Bray, Agnishom Chattopadhyay, Sota Sato 0001, Masaki Waga, Étienne André, Ichiro Hasuo, Naoki Ueda, Yosuke Yokoyama\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eCoRR\u003c/em\u003e, 2024\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.48550/arXiv.2403.18764\" target=\"_blank\" rel=\"noopener\"\u003e10.48550/arXiv.2403.18764\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eLearning Weighted Finite Automata over the Max-Plus Semiring and its Termination.\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eTakamasa Okudono, Masaki Waga, Taro Sekiyama, Ichiro Hasuo\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eCoRR\u003c/em\u003e, 2024\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.48550/arXiv.2407.09775\" target=\"_blank\" rel=\"noopener\"\u003e10.48550/arXiv.2407.09775\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eBi-Abduction in Separation Logic with Arrays and Lists for Program Analysis\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eKIMURA Daisuke, TATSUTA Makoto, AL AMEEN Mahmudul Faisal, IKEBUCHI Mirai, NAKAZAWA Koji\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eComputer Software\u003c/em\u003e, 2024\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.11309/jssst.41.1_50\" target=\"_blank\" rel=\"noopener\"\u003e10.11309/jssst.41.1_50\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n  \u003c/div\u003e\n\n  \n  \n\n  \u003ch3 id=\"2023\" class=\"pub-group-year\"\u003e2023\u003c/h2\u003e\n  \u003cdiv class=\"pub-list\"\u003e\n    \n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eRabbit: a modeling language for verifying cybersecurity in IoT system\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eTerunobu Inaba, Yutaka Ishikawa, Atsushi Igarashi, Taro Sekiyama\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e第145回情報処理学会プログラミング研究会資料\u003c/em\u003e, 2023\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eContextual Modal Type Theory with Polymorphic Contexts\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eYuito Murase, Yuichi Nishiwaki, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of European Symposium on Programming\u003c/em\u003e, 2023\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1007/978-3-031-30044-8_11\" target=\"_blank\" rel=\"noopener\"\u003e10.1007/978-3-031-30044-8_11\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eLLTZ: LLMV IR からスマートコントラクト記述言語 Michelson へのコンパイラ\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e臼澤嘉, 末永幸平, 古瀬淳, 五十嵐淳\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e第25回プログラミングおよびプログラミング言語ワークショップ(PPL2023)論文集\u003c/em\u003e, 2023\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eProbabilistic Black-Box Checking via Active MDP Learning\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eJunya Shijubo, Masaki Waga, Kohei Suenaga\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eACM Transactions on Embedded Computing Systems\u003c/em\u003e, 2023\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1145/3609127\" target=\"_blank\" rel=\"noopener\"\u003e10.1145/3609127\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eFormalizing Statistical Causality via Modal Logic\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eYusuke Kawamoto, Tetsuya Sato, Kohei Suenaga\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eJELIA 2023\u003c/em\u003e, 2023\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.48550/arXiv.2210.16751\" target=\"_blank\" rel=\"noopener\"\u003e10.48550/arXiv.2210.16751\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eFeature Attributionを用いたdlshogiの指し手の解釈可能性向上手法\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e廣瀬 雄一, 和賀 正樹, 末永 幸平\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e研究報告ゲーム情報学（GI）\u003c/em\u003e, 2023\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eLLTZ: LLVM IR からスマートコントラクト記述言語 Michelson へのコンパイラ\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e臼澤嘉, 末永幸平, 古瀬淳, 五十嵐淳\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e第25回プログラミングおよびプログラミング言語ワークショップ (PPL 2023) 論文集\u003c/em\u003e, 2023\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eLearning Nonlinear Hybrid Automata from Input-Output Time-Series Data.\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eAmit Gurung, Masaki Waga, Kohei Suenaga\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eATVA (1)\u003c/em\u003e, 2023\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1007/978-3-031-45329-8_2\" target=\"_blank\" rel=\"noopener\"\u003e10.1007/978-3-031-45329-8_2\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eActive Learning of Deterministic Timed Automata with Myhill-Nerode Style Characterization.\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eMasaki Waga\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eComputer Aided Verification - 35th International Conference, Part I\u003c/em\u003e, 2023\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1007/978-3-031-37706-8_1\" target=\"_blank\" rel=\"noopener\"\u003e10.1007/978-3-031-37706-8_1\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eARCH-COMP23 Category Report: Falsification.\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eClaudio Menghi, Paolo Arcaini, Walstan Baptista, Gidon Ernst, Georgios Fainekos, Federico Formica, Sauvik Gon, Tanmay Khandait, Atanu Kundu 0002, Giulia Pedrielli, Jarkko Peltomäki, Ivan Porres, Rajarshi Ray 0001, Masaki Waga, Zhenya Zhang\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eARCH\u003c/em\u003e, 2023\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.29007/6nqs\" target=\"_blank\" rel=\"noopener\"\u003e10.29007/6nqs\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eProbabilistic Black-Box Checking via Active MDP Learning.\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eJunya Shijubo, Masaki Waga, Kohei Suenaga\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eCoRR\u003c/em\u003e, 2023\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.48550/arXiv.2308.07930\" target=\"_blank\" rel=\"noopener\"\u003e10.48550/arXiv.2308.07930\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eParametric Timed Pattern Matching.\u0026#34;\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eMasaki Waga, Étienne André, Ichiro Hasuo\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eACM Transactions on Software Engineering and Methodology\u003c/em\u003e, 2023\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1145/3517194\" target=\"_blank\" rel=\"noopener\"\u003e10.1145/3517194\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n  \u003c/div\u003e\n\n  \n  \n\n  \u003ch3 id=\"2022\" class=\"pub-group-year\"\u003e2022\u003c/h2\u003e\n  \u003cdiv class=\"pub-list\"\u003e\n    \n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eSCameleer: スマートコントラクト記述言語SCamlのための自動検証器\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e服部 佑哉, 西田 雄気, 古瀬 淳, 末永 幸平, 五十嵐 淳\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e日本ソフトウェア科学会第39回大会論文集\u003c/em\u003e, 2022\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eスマートコントラクト検証器Helmholtzのためのエラー原因提示手法\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e小野 雄登, 西田 雄気, 古瀬 淳, 末永 幸平, 五十嵐 淳\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e日本ソフトウェア科学会第39回大会論文集\u003c/em\u003e, 2022\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003e暗黙に相互運用可能なレコードとハッシュテーブルのための型推論とコンパイル手法\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e梅木 孝輔, 関山 太朗, 五十嵐 淳\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e日本ソフトウェア科学会第39回大会論文集\u003c/em\u003e, 2022\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eHelmholtz: A Verifier for Tezos Smart Contracts Based on Refinement Types\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eYuki Nishida, Hiromasa Saito, Ran Chen, Akira Kawata, Jun Furuse, Kohei Suenaga, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eNew Generation Computing\u003c/em\u003e, 2022\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1007/s00354-022-00167-1\" target=\"_blank\" rel=\"noopener\"\u003e10.1007/s00354-022-00167-1\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eZT-IoT: ゼロトラストIoTのためのシステムソフトウェア構築に向けて\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e竹房 あつ子, 五十嵐 淳, 関山 太朗, 松井 俊浩, 小野 泰司, 福田 健介, 蓮尾 一郎, 合田 憲人, 石川 裕\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e第154回情報処理学会システムソフトウェアとオペレーティング・システム研究会資料\u003c/em\u003e, 2022\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eStage-Aware Equality Types for a Dependently-Typed Multi-Stage Calculus\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eShuntaro Katsuda, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e第24回プログラミングおよびプログラミング言語ワークショップ(PPL2022)論文集\u003c/em\u003e, 2022\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eType-based Qubit Allocation for a First-Order Quantum Programming Language\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eRyo Wakizawa, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e第24回プログラミングおよびプログラミング言語ワークショップ(PPL2022)論文集\u003c/em\u003e, 2022\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eBOREx: Bayesian-Optimization-Based Refinement of Saliency Map for Image- and Video-Classification Models.\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eAtsushi Kikuchi, Kotaro Uchida, Masaki Waga, Kohei Suenaga\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eACCV (7)\u003c/em\u003e, 2022\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1007/978-3-031-26293-7_17\" target=\"_blank\" rel=\"noopener\"\u003e10.1007/978-3-031-26293-7_17\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eOblivious Online Monitoring for Safety LTL Specification via Fully Homomorphic Encryption.\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eRyotaro Banno, Kotaro Matsuoka, Naoki Matsumoto, Song Bian, Masaki Waga, Kohei Suenaga\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eCAV 2022\u003c/em\u003e, 2022\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1007/978-3-031-13185-1_22\" target=\"_blank\" rel=\"noopener\"\u003e10.1007/978-3-031-13185-1_22\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eThe Lattice-Theoretic Essence of Property Directed Reachability Analysis.\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eMayuko Kori, Natsuki Urabe, Shin-ya Katsumata, Kohei Suenaga, Ichiro Hasuo\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eCAV 2022\u003c/em\u003e, 2022\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1007/978-3-031-13185-1_12\" target=\"_blank\" rel=\"noopener\"\u003e10.1007/978-3-031-13185-1_12\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eARCH-COMP 2022 Category Report: Falsification with Ubounded Resources\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eGidon Ernst, Paolo Arcaini, Georgios Fainekos, Federico Formica, Jun Inoue, Tanmay Khandait, Mohammad Mahdi Mahboob, Claudio Menghi, Giulia Pedrielli, Masaki Waga, Yoriyuki Yamagata, Zhenya Zhang\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eEPiC Series in Computing\u003c/em\u003e, 2022\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.29007/fhnk\" target=\"_blank\" rel=\"noopener\"\u003e10.29007/fhnk\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eDynamic Shielding for Reinforcement Learning in Black-Box Environments.\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eMasaki Waga, Ezequiel Castellano, Sasinee Pruekprasert, Stefan Klikovits, Toru Takisaka, Ichiro Hasuo\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eInternational Symposium on Automated Technology for Verification and Analysis\u003c/em\u003e, 2022\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1007/978-3-031-19992-9_2\" target=\"_blank\" rel=\"noopener\"\u003e10.1007/978-3-031-19992-9_2\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eExemplifying parametric timed specifications over signals with bounded behavior.\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eÉtienne André, Masaki Waga, Natsuki Urabe, Ichiro Hasuo\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eNASA Formal Methods Symposium\u003c/em\u003e, 2022\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1007/978-3-031-06773-0_25\" target=\"_blank\" rel=\"noopener\"\u003e10.1007/978-3-031-06773-0_25\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eData for \u0026#34;Exemplifying parametric timed specifications over signals with bounded behavior\u0026#34;.\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eÉtienne André, Masaki Waga, Natsuki Urabe, Ichiro Hasuo\u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.5281/zenodo.6382893\" target=\"_blank\" rel=\"noopener\"\u003e10.5281/zenodo.6382893\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eModel-Bounded Monitoring of Hybrid Systems.\u0026#34;\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eMasaki Waga, Étienne André, Ichiro Hasuo\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eACM Transactions on Cyber-Physical Systems\u003c/em\u003e, 2022\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1145/3529095\" target=\"_blank\" rel=\"noopener\"\u003e10.1145/3529095\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n  \u003c/div\u003e\n\n  \n  \n\n  \u003ch3 id=\"2021\" class=\"pub-group-year\"\u003e2021\u003c/h2\u003e\n  \u003cdiv class=\"pub-list\"\u003e\n    \n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eIs Space-Efficient Polymorphic Gradual Typing Possible?\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eShota Ozaki, Taro Sekiyama, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eInformal Proceedings of Scheme and Functional Programming Workshop\u003c/em\u003e, 2021\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eHELMHOLTZ: A Verifier for Tezos Smart Contracts Based on Refinement Types.\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eYuki Nishida, Hiromasa Saito, Ran Chen, Akira Kawata, Jun Furuse, Kohei Suenaga, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eCoRR\u003c/em\u003e, 2021\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eVerification of a Merkle Patricia Tree Library Using F.\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eSota Sato, Ryotaro Banno, Jun Furuse, Kohei Suenaga, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eCoRR\u003c/em\u003e, 2021\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003e完全準同型暗号を用いた秘匿LTLオンラインモニタリング\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e伴野 良太郎, 松岡 航太郎, 松本 直樹, Bian Song, 和賀 正樹, 末永 幸平\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eコンピュータセキュリティシンポジウム 2021 (CSS 2021)\u003c/em\u003e, 2021\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eFormalizing Statistical Beliefs in Hypothesis Testing Using Program Logic.\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eYusuke Kawamoto, Tetsuya Sato, Kohei Suenaga\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of the 18th International Conference on Principles of Knowledge Representation and Reasoning(KR)\u003c/em\u003e, 2021\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.24963/kr.2021/39\" target=\"_blank\" rel=\"noopener\"\u003e10.24963/kr.2021/39\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eEfficient Black-Box Checking via Model Checking with Strengthened Specifications\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eJunya Shijubo, Masaki Waga, Kohei Suenaga\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eRuntime Verification - 21st International Conference(RV)\u003c/em\u003e, 2021\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1007/978-3-030-88494-9_6\" target=\"_blank\" rel=\"noopener\"\u003e10.1007/978-3-030-88494-9_6\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eEnhancing Loop-Invariant Synthesis via Reinforcement Learning.\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eTakeshi Tsukada, Hiroshi Unno 0001, Taro Sekiyama, Kohei Suenaga\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eCoRR\u003c/em\u003e, 2021\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eVerification of a Merkle Patricia Tree Library Using F*\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eSota Sato, Ryotaro Banno, Jun Furuse, Kohei Suenaga, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eCoRR\u003c/em\u003e, 2021\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eARCH-COMP 2021 Category Report: Falsification with Validation of Results.\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eGidon Ernst, Paolo Arcaini, Ismail Bennani, Aniruddh Chandratre, Alexandre Donzé, Georgios Fainekos, Goran Frehse, Khouloud Gaaloul, Jun Inoue 0001, Tanmay Khandait, Logan Mathesen, Claudio Menghi, Giulia Pedrielli, Marc Pouzet, Masaki Waga, Shakiba Yaghoubi, Yoriyuki Yamagata, Zhenya Zhang\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eARCH@ADHS\u003c/em\u003e, 2021\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.29007/xwl1\" target=\"_blank\" rel=\"noopener\"\u003e10.29007/xwl1\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eHybrid System Falsification for Multiple-Constraint Parameter Synthesis: a Gas Turbine Case Study.\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eSota Sato, Atsuyoshi Saimen, Masaki Waga, Kenji Takao, Ichiro Hasuo\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e24th International Symposium on Formal Methods\u003c/em\u003e, 2021\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1007/978-3-030-90870-6_17\" target=\"_blank\" rel=\"noopener\"\u003e10.1007/978-3-030-90870-6_17\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eConstrained Optimization for Falsification and Conjunctive Synthesis.\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eSota Sato, Masaki Waga, Ichiro Hasuo\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e6th IFAC Conference on Analysis and Design of Hybrid Systems\u003c/em\u003e, 2021\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1016/j.ifacol.2021.08.501\" target=\"_blank\" rel=\"noopener\"\u003e10.1016/j.ifacol.2021.08.501\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eModel-Bounded Monitoring of Hybrid Systems.\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eMasaki Waga, Étienne André, Ichiro Hasuo\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e12th ACM/IEEE International Conference on Cyber-Physical Systems\u003c/em\u003e, 2021\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1145/3450267.3450531\" target=\"_blank\" rel=\"noopener\"\u003e10.1145/3450267.3450531\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n  \u003c/div\u003e\n\n  \n  \n\n  \u003ch3 id=\"2020\" class=\"pub-group-year\"\u003e2020\u003c/h2\u003e\n  \u003cdiv class=\"pub-list\"\u003e\n    \n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eSpace-Efficient Gradual Typing in Coercion-Passing Style.\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eYuya Tsuda, Atsushi Igarashi, Tomoya Tabuchi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e34th European Conference on Object-Oriented Programming, ECOOP 2020\u003c/em\u003e, 2020\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.4230/LIPIcs.ECOOP.2020.8\" target=\"_blank\" rel=\"noopener\"\u003e10.4230/LIPIcs.ECOOP.2020.8\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003e量子ビット連結性制約検査のための依存型システム\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e脇坂 遼, 五十嵐 淳\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e日本ソフトウェア科学会第37回大会論文集\u003c/em\u003e, 2020\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eConSORT: Context- and Flow-Sensitive Ownership Refinement Types for Imperative Programs\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eJohn Toman, Ren Siqi, Kohei Suenaga, Atsushi Igarashi, Naoki Kobayashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProgramming Languages and Systems\u003c/em\u003e, 2020\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1007/978-3-030-44914-8_25\" target=\"_blank\" rel=\"noopener\"\u003e10.1007/978-3-030-44914-8_25\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eスタック領域上での時間的メモリ安全性を保証する静的解析手法\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e矢杉 和義, 五十嵐 淳\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e第22回プログラミングおよびプログラミング言語ワークショップ(PPL2020)論文集\u003c/em\u003e, 2020\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eスマートコントラクトのための Effectively Callback-Free 性の型に基づく静的検証\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e齋藤 大聖, 西田 雄気, 五十嵐 淳, 末永 幸平\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e第22回プログラミングおよびプログラミング言語ワークショップ(PPL2020)論文集\u003c/em\u003e, 2020\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eF* を用いた Merkle Patricia Tree ライブラリの形式検証\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e佐藤 聡太, 古瀬 淳, 末永 幸平, 五十嵐 淳\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e第22回プログラミングおよびプログラミング言語ワークショップ(PPL2020)論文集\u003c/em\u003e, 2020\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eCompilation of Coordinated Choice.\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eYuki Nishida 0001, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eCoRR\u003c/em\u003e, 2020\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eSignature restriction for polymorphic algebraic effects.\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eTaro Sekiyama, Takeshi Tsukada, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProc. ACM Program. Lang.\u003c/em\u003e, 2020\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1145/3408999\" target=\"_blank\" rel=\"noopener\"\u003e10.1145/3408999\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eSpace-Efficient Gradual Typing in Coercion-Passing Style\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eYuya Tsuda, Atsushi Igarashi, Tomoya Tabuchi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eInformal Proceedings of the 1st International Workshop on Gradual Typing (WGT2020)\u003c/em\u003e, 2020\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eGradual Typing for Extensibility by Rows\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eTaro Sekiyama, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eInformal Proceedings of the 1st International Workshop on Gradual Typing (WGT2020)\u003c/em\u003e, 2020\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eVisualizing Color-Wise Saliency of Black-Box Image Classification Models.\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eYuhki Hatakeyama, Hiroki Sakuma, Yoshinori Konishi, Kohei Suenaga\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of ACCV 2020\u003c/em\u003e, 2020\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1007/978-3-030-69535-4_12\" target=\"_blank\" rel=\"noopener\"\u003e10.1007/978-3-030-69535-4_12\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eGeneralized Property-Directed Reachability for Hybrid Systems\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eKohei Suenaga, Takuya Ishizawa\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eVerification, Model Checking, and Abstract Interpretation - 21st International Conference(VMCAI)\u003c/em\u003e, 2020\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1007/978-3-030-39322-9_14\" target=\"_blank\" rel=\"noopener\"\u003e10.1007/978-3-030-39322-9_14\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eA Contract Corpus for Recognizing Rights and Obligations.\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eRuka Funaki, Yusuke Nagata, Kohei Suenaga, Shinsuke Mori\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of The 12th Language Resources and Evaluation Conference(LREC)\u003c/em\u003e, 2020\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n  \u003c/div\u003e\n\n  \n  \n\n  \u003ch3 id=\"2019\" class=\"pub-group-year\"\u003e2019\u003c/h2\u003e\n  \u003cdiv class=\"pub-list\"\u003e\n    \n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eA Dependently Typed Multi-stage Calculus.\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eAkira Kawata, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProgramming Languages and Systems - 17th Asian Symposium, APLAS 2019, Nusa Dua, Bali, Indonesia, December 1-4, 2019, Proceedings\u003c/em\u003e, 2019\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1007/978-3-030-34175-6_4\" target=\"_blank\" rel=\"noopener\"\u003e10.1007/978-3-030-34175-6_4\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eManifest Contracts with Intersection Types.\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eYuki Nishida, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProgramming Languages and Systems - 17th Asian Symposium, APLAS 2019, Nusa Dua, Bali, Indonesia, December 1-4, 2019, Proceedings\u003c/em\u003e, 2019\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1007/978-3-030-34175-6_3\" target=\"_blank\" rel=\"noopener\"\u003e10.1007/978-3-030-34175-6_3\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eTemporal Verification of Programs via First-Order Fixpoint Logic.\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eNaoki Kobayashi, Takeshi Nishikawa, Atsushi Igarashi, Hiroshi Unno\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eStatic Analysis - 26th International Symposium, SAS 2019, Porto, Portugal, October 8-11, 2019, Proceedings\u003c/em\u003e, 2019\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1007/978-3-030-32304-2_20\" target=\"_blank\" rel=\"noopener\"\u003e10.1007/978-3-030-32304-2_20\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eA Type System for First-Class Layers with Inheritance, Subtyping, and Swapping\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eHiroaki Inoue, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eScience of Computer Programming\u003c/em\u003e, 2019\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eHandling Polymorphic Algebraic Effects\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eTaro Sekiyama, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of European Symposium on Programming (ESOP2019)\u003c/em\u003e, 2019\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003e空間効率の良いコアーション計算のためのコアーション渡し形式\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e津田優也, 五十嵐淳\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e第21回プログラミングおよびプログラミング言語ワークショップ(PPL2019)論文集\u003c/em\u003e, 2019\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eGradual session types\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eATSUSHI IGARASHI, PETER THIEMANN, YUYA TSUDA, VASCO T. VASCONCELOS, PHILIP WADLER\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eJournal of Functional Programming\u003c/em\u003e, 2019\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1017/s0956796819000169\" target=\"_blank\" rel=\"noopener\"\u003e10.1017/s0956796819000169\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eDynamic Type Inference for Gradual Hindley-Milner Typing\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eYusuke Miyazaki, Taro Sekiyama, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of the ACM on Programming Languages\u003c/em\u003e, 2019\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eワーカの重要度を考慮した並列実行フレームワークの障害耐性評価手法の検討\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e西牟禮 亮,八杉 昌宏,平石 拓,馬谷 誠二\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e2019年並列／分散／協調処理に関する『北見』サマー・ワークショップ (SWoPP2019)\u003c/em\u003e, 2019\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003e汎用送受信に対応したHOPEコンパイラの研究\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e橋本 孝太,八杉 昌宏,平石 拓,馬谷 誠二\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e2019年並列／分散／協調処理に関する『北見』サマー・ワークショップ (SWoPP2019)\u003c/em\u003e, 2019\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eJVM上の動的言語のための抽象解釈の実装\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e馬谷 誠二\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e第60回プログラミング・シンポジウム\u003c/em\u003e, 2019\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eExtending a Work-Stealing Framework with Priorities and Weights\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eR. Nakashima, H. Yoritaka, M. Yasugi, T. Hiraishi, S. Umatani\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e2019 IEEE/ACM 9th Workshop on Irregular Applications: Architectures and Algorithms (IA3)\u003c/em\u003e, 2019\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1109/IA349570.2019.00008\" target=\"_blank\" rel=\"noopener\"\u003e10.1109/IA349570.2019.00008\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eHOPE: A Parallel Execution Model Based on Hierarchical Omission\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eMasahiro Yasugi, Daisuke Muraoka, Tasuku Hiraishi, Seiji Umatani, and Kento Emoto\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of the 48th International Conference on Parallel Processing ({ICPP} 2019)\u003c/em\u003e, 2019\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1145/3337821.3337899\" target=\"_blank\" rel=\"noopener\"\u003e10.1145/3337821.3337899\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n  \u003c/div\u003e\n\n  \n  \n\n  \u003ch3 id=\"2018\" class=\"pub-group-year\"\u003e2018\u003c/h2\u003e\n  \u003cdiv class=\"pub-list\"\u003e\n    \n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eNondetermnistic Manifest Contracts\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eYuki Nishida, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of theInternational Symposium on Principles and Practice of Declarative Programming\u003c/em\u003e, 2018\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1145/3236950.3236964\" target=\"_blank\" rel=\"noopener\"\u003e10.1145/3236950.3236964\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eContextWorkflow: A Monadic DSL for Compensable and Interruptible Executions\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eHiroaki Inoue, Tomoyuki Aotani, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of the 32nd European Conference on Object-Oriented Programming\u003c/em\u003e, 2018\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eMethod Safety Mechanism for Asynchronous Layer Deactivation\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eTetsuo Kamina, Tomoyuki Aotani, Hidehiko Masuhara, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eScience of Computer Programming\u003c/em\u003e, 2018\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1016/j.scico.2018.01.006\" target=\"_blank\" rel=\"noopener\"\u003e10.1016/j.scico.2018.01.006\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eAutomated Verification of Functional Correctness of Race-Free GPU Programs\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eKensuke Kojima, Akifumi Imanishi, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eJournal of Automated Reasoning\u003c/em\u003e, 2018\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1007/978-3-319-48869-1_7\" target=\"_blank\" rel=\"noopener\"\u003e10.1007/978-3-319-48869-1_7\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eReasoning about Polymorphic Manifest Contracts.\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eTaro Sekiyama, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eCoRR\u003c/em\u003e, 2018\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eA Guess-and-Assume Approach to Loop Fusion for Program Verification\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eAkifumi Imanishi, Kohei Suenaga, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of the ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation\u003c/em\u003e, 2018\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1145/3162070\" target=\"_blank\" rel=\"noopener\"\u003e10.1145/3162070\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eAutomated Proof Synthesis for the Minimal Propositional Logic with Deep Neural Networks\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eTaro Sekiyama, Kohei Suenaga\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eAPLAS 2018\u003c/em\u003e, 2018\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1007/978-3-030-02768-1_17\" target=\"_blank\" rel=\"noopener\"\u003e10.1007/978-3-030-02768-1_17\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eMONAA: A Tool for Timed Pattern Matching with Automata-Based Acceleration.\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eMasaki Waga, Ichiro Hasuo, Kohei Suenaga\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e3rd Workshop on Monitoring and Testing of Cyber-Physical Systems, MT@CPSWeek 2018, Porto, Portugal, April 10, 2018\u003c/em\u003e, 2018\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1109/MT-CPS.2018.00014\" target=\"_blank\" rel=\"noopener\"\u003e10.1109/MT-CPS.2018.00014\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eGeneralized homogeneous polynomials for efficient template-based nonlinear invariant synthesis.\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eKensuke Kojima, Minoru Kinoshita, Kohei Suenaga\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eTheor. Comput. Sci.\u003c/em\u003e, 2018\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1016/j.tcs.2018.06.005\" target=\"_blank\" rel=\"noopener\"\u003e10.1016/j.tcs.2018.06.005\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eProbabilistic guards: A mechanism for increasing the granularity of work-stealing programs\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eHiroshi Yoritaka, Ken Matsui, Masahiro Yasugi, Tasuku Hiraishi, Seiji Umatani\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eParallel Computing\u003c/em\u003e, 2018\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003e分割統治型総和の部分的計算結果を効率よく利用する方式の研究\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e佐多 育斗,八杉 昌宏,平石 拓,馬谷 誠二\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e情報処理学会第121回プログラミング研究会\u003c/em\u003e, 2018\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003e並列分散フレームワークの耐障害性評価のための通信障害模擬機能\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e西牟禮 亮,八杉 昌宏,平石 拓,馬谷 誠二\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e第20回プログラミングおよびプログラミング言語ワークショップ(PPL2018)\u003c/em\u003e, 2018\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eJVM上の動的言語のための抽象解釈\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e馬谷 誠二\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e情報処理学会第121回プログラミング研究会\u003c/em\u003e, 2018\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n  \u003c/div\u003e\n\n  \n  \n\n  \u003ch3 id=\"2017\" class=\"pub-group-year\"\u003e2017\u003c/h2\u003e\n  \u003cdiv class=\"pub-list\"\u003e\n    \n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eA Nonstandard Functional Programming Language\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eHirofumi Nakamura, Kensuke Kojima, Kohei Suenaga, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of Asian Symposium on Programming Languages and Systems (APLAS2017)\u003c/em\u003e, 2017\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1007/978-3-319-71237-6_25\" target=\"_blank\" rel=\"noopener\"\u003e10.1007/978-3-319-71237-6_25\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eA DSL for Compensable and Interruptible Executions\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eHiroaki Inoue, Tomoyuki Aotani, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of 4th Workshop on Reactive and Event-based Languages \u0026amp; Systems (REBLS)\u003c/em\u003e, 2017\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eC言語における無効なスタック領域へのポインタを検出する静的解析\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e矢杉 和義, 五十嵐 淳\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e日本ソフトウェア科学会第34回大会論文集\u003c/em\u003e, 2017\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eOn Polymorphic Gradual Typing\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eYuu Igarashi, Taro Sekiyama, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of the ACM on Programming Languages\u003c/em\u003e, 2017\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eA Type Reconstruction Algorithm for Gradually Typed Delimited Continuations\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eYusuke Miyazaki, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e第19回プログラミングおよびプログラミング言語ワークショップ(PPL2017)論文集\u003c/em\u003e, 2017\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eA Hoare logic for GPU Kernels\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eKensuke Kojima, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eACM Transactions on Computational Logic\u003c/em\u003e, 2017\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1145/3001834\" target=\"_blank\" rel=\"noopener\"\u003e10.1145/3001834\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eStateful manifest contracts\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eTaro Sekiyama, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eConference Record of the Annual ACM Symposium on Principles of Programming Languages\u003c/em\u003e, 2017\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1145/3009837.3009875\" target=\"_blank\" rel=\"noopener\"\u003e10.1145/3009837.3009875\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eVerification of Code Generators via Higher-Order Model Checking\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eTakashi Suwa, Takeshi Tsukada, Naoki Kobayashi, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of the 2017 ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation (PEPM\u0026#39;17)\u003c/em\u003e, 2017\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1145/3018882.3018886\" target=\"_blank\" rel=\"noopener\"\u003e10.1145/3018882.3018886\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003ePolymorphic Manifest Contracts, Revised and Resolved\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eTaro Sekiyama, Atsushi Igarashi, Michael Greenberg\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eACM Transactions on Programming Languages and Systems\u003c/em\u003e, 2017\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eSharper and Simpler Nonlinear Interpolants for Program Verification.\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eTakamasa Okudono, Yuki Nishida 0001, Kensuke Kojima, Kohei Suenaga, Kengo Kido, Ichiro Hasuo\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProgramming Languages and Systems - 15th Asian Symposium(APLAS)\u003c/em\u003e, 2017\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1007/978-3-319-71237-6_24\" target=\"_blank\" rel=\"noopener\"\u003e10.1007/978-3-319-71237-6_24\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eEfficient Online Timed Pattern Matching by Automata-Based Skipping\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eMasaki Waga, Ichiro Hasuo, Kohei Suenaga\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eFORMATS 2017\u003c/em\u003e, 2017\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1007/978-3-319-65765-3_13\" target=\"_blank\" rel=\"noopener\"\u003e10.1007/978-3-319-65765-3_13\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eTowards Proof Synthesis Guided by Neural Machine Translation for Intuitionistic Propositional Logic\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eTaro Sekiyama, Akifumi Imanishi, Kohei Suenaga\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eCoRR\u003c/em\u003e, 2017\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eアクセス制御論理に基づくIoT向け分散型アクセス制御フレームワーク\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e五十嵐 琢磨,馬谷 誠二\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e第15回 ディペンダブルシステムワークショップ (DSW 2017)\u003c/em\u003e, 2017\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eアクセス制御機能の組み込まれた拡張オブジェクト指向言語\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e馬谷 誠二\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e情報処理学会 第58回プログラミング・シンポジウム\u003c/em\u003e, 2017\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003e優先度ならびに重みを用いたワークスティールフレームワークの性能改善\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e寄高 啓司,八杉 昌宏,平石 拓,馬谷 誠二\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eThe 1st. cross-disciplinary Workshop on Computing Systems, Infrastructures, and Programming (xSIG 2017)\u003c/em\u003e, 2017\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003e仮想環境を考慮した要求駆動型負荷分散\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e良本 海,八杉 昌宏,平石 拓,馬谷 誠二\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e日本ソフトウェア科学会第34回大会\u003c/em\u003e, 2017\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eHOPEコンパイラのプロトタイプ実装\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e重本 孝太,八杉 昌宏,平石 拓,馬谷 誠二\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e2017年並列/分散/協調処理に関する『秋田』サマー・ワークショップ (SWoPP2017)\u003c/em\u003e, 2017\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n  \u003c/div\u003e\n\n  \n  \n\n  \u003ch3 id=\"2016\" class=\"pub-group-year\"\u003e2016\u003c/h2\u003e\n  \u003cdiv class=\"pub-list\"\u003e\n    \n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003e階層的グループ化に基づきAndroidアプリの安全性を向上するバイトコード書換えツール\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e馬谷 誠二, 藤原 康史, 五十嵐 淳\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e日本ソフトウェア科学会第33回大会論文集\u003c/em\u003e, 2016\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eAn Extended Behavioral Type System for Memory-Leak Freedom\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eQi Tan, Kohei Suenaga, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e日本ソフトウェア科学会第33回大会論文集\u003c/em\u003e, 2016\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eSIMT のための Hoare 論理の Coq を用いた形式化と 並列 prefix-sum アルゴリズムの検証\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e奥村 健太郎, 小島 健介, 五十嵐 淳\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e第18回プログラミングおよびプログラミング言語ワークショップ(PPL2016)論文集\u003c/em\u003e, 2016\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eGradual typing for delimited continuations\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eYusuke Miyazaki, Taro Sekiyama, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eThe 5th Script To Program Evolution Workshop\u003c/em\u003e, 2016\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eA Library-Based Approach to Context-Dependent Computation with Reactive Values\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eHiroaki Inoue, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of Constrained and Reactive Objects Workshop (CROW2016)\u003c/em\u003e, 2016\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1145/2892664.2892669\" target=\"_blank\" rel=\"noopener\"\u003e10.1145/2892664.2892669\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003e規則違反コードの構造を反映した木パタンを用いるコード検査器\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e中村 真也,鵜川 始陽,馬谷 誠二\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e情報処理学会論文誌 プログラミング\u003c/em\u003e, 2016\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003e仮想環境を考慮した要求駆動型負荷分散の検討\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e良本 海,八杉 昌宏,平石 拓,馬谷 誠二\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e第18回プログラミングおよびプログラミング言語ワークショップ(PPL2016)\u003c/em\u003e, 2016\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003ePreliminary Evaluations of Probabilistic Guards for a Work-Stealing Framework\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eHiroshi Yoritaka, Ken Matsui, Masahiro Yasugi, Tasuku Hiraishi, Seiji Umatani\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eAnnual Meeting on Advanced Computing System and Infrastructure (ACSI) 2016\u003c/em\u003e, 2016\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eHOPEコンパイラの実装に向けて\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e重本 孝太,八杉 昌宏,平石 拓,馬谷 誠二\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e第18回プログラミングおよびプログラミング言語ワークショップ(PPL2016)\u003c/em\u003e, 2016\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eAn MPI-based Implementation of the Tascell Task-Parallel Programming Language\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eDaisuke Muraoka, Masahiro Yasugi, Tasuku Hiraishi, Seiji Umatani\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eAnnual Meeting on Advanced Computing System and Infrastructure (ACSI) 2016\u003c/em\u003e, 2016\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eEvaluation of an MPI-based Implementation of the Tascell Task-Parallel Language on Massively Parallel Systems\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eDaisuke Muraoka, Masahiro Yasugi, Tasuku Hiraishi, Seiji Umatani\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003ePROCEEDINGS OF 45TH INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING WORKSHOPS (ICPPW 2016)\u003c/em\u003e, 2016\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1109/ICPPW.2016.36\" target=\"_blank\" rel=\"noopener\"\u003e10.1109/ICPPW.2016.36\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eExtending aWork-Stealing Framework with Probabilistic Guards\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eHiroshi Yoritaka, Ken Matsui, Masahiro Yasugi, Tasuku Hiraishi, Seiji Umatani\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003ePROCEEDINGS OF 45TH INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING WORKSHOPS (ICPPW 2016)\u003c/em\u003e, 2016\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1109/ICPPW.2016.37\" target=\"_blank\" rel=\"noopener\"\u003e10.1109/ICPPW.2016.37\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n  \u003c/div\u003e\n\n  \n  \n\n  \u003ch3 id=\"2015\" class=\"pub-group-year\"\u003e2015\u003c/h2\u003e\n  \u003cdiv class=\"pub-list\"\u003e\n    \n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003e参照を備えた多段階計算のための多相的型システム\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e小林 恵, 五十嵐淳\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e日本ソフトウェア科学会第32回大会論文集\u003c/em\u003e, 2015\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eVisibility of Context-oriented Behavior and State in L\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eRobert Hirschfeld, Hidehiko Masuhara, Atsushi Igarashi, Tim Felgentreff\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eComputer Software\u003c/em\u003e, 2015\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.11309/jssst.32.3_149\" target=\"_blank\" rel=\"noopener\"\u003e10.11309/jssst.32.3_149\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eManifest contracts for datatypes\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eTaro Sekiyama, Yuki Nishida, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eConference Record of the Annual ACM Symposium on Principles of Programming Languages\u003c/em\u003e, 2015\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1145/2676726.2676996\" target=\"_blank\" rel=\"noopener\"\u003e10.1145/2676726.2676996\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eA Sound Type System for Layer Subtyping and Dynamically Activated First-Class Layers\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eHiroaki Inoue, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of Asian Symposium on Programming Languages and Systems (APLAS 2015)\u003c/em\u003e, 2015\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1007/978-3-319-26529-2_24\" target=\"_blank\" rel=\"noopener\"\u003e10.1007/978-3-319-26529-2_24\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eShifting the Blame: A Blame Calculus with Delimited Control\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eTaro Sekiyama, Soichiro Ueda, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of Asian Symposium on Programming Languages and Systems (APLAS 2015)\u003c/em\u003e, 2015\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1007/978-3-319-26529-2_11\" target=\"_blank\" rel=\"noopener\"\u003e10.1007/978-3-319-26529-2_11\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eInput Synthesis for Sampled Data Systems by Program Logic\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eTakumi Akazaki, Ichiro Hasuo, Kohei Suenaga\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProc. of the 4th Workshop on Hybrid Autonomous Systems (HAS 2014)\u003c/em\u003e, 2015\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.4204/EPTCS.174.3\" target=\"_blank\" rel=\"noopener\"\u003e10.4204/EPTCS.174.3\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eValidated Numerics Meets Reachability Analysis for CPS Design (NII Shonan Meeting 2015-14).\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eDaisuke Ishii, Kohei Suenaga, Walid Taha\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eNII Shonan Meet. Rep.\u003c/em\u003e, 2015\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eDesign and Implementation of a Java Bytecode Manipulation Library for Clojure\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eSeiji Umatani, Tomoharu Ugawa, and Masahiro Yasugi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eJournal of Information Processing\u003c/em\u003e, 2015\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eメッセージ媒介システムの構想と試験実装\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e諏訪 将大,八杉 昌宏,平石 拓,馬谷 誠二\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eAnnual Meeting on Advanced Computing System and Infrastructure (ACSI) 2015\u003c/em\u003e, 2015\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eClojure用JVMバイトコード操作ライブラリの設計と実装\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e馬谷 誠二,鵜川 始陽,八杉 昌宏\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e情報処理学会第102回プログラミング研究会\u003c/em\u003e, 2015\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n  \u003c/div\u003e\n\n  \n  \n\n  \u003ch3 id=\"2014\" class=\"pub-group-year\"\u003e2014\u003c/h2\u003e\n  \u003cdiv class=\"pub-list\"\u003e\n    \n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eAutomatic Memory Management Based on Program Transformation using Ownerships\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eTatsuya Sonobe, Kohei Suenaga, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of Asian Symposium on Programming Languages and Systems (APLAS)\u003c/em\u003e, 2014\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1007/978-3-319-12736-1_4\" target=\"_blank\" rel=\"noopener\"\u003e10.1007/978-3-319-12736-1_4\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eFormalization of Featherweight Java and Featherweight GJ by using weak HOAS on Coq\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e奥村 健太郎, 五十嵐 淳\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e日本ソフトウェア科学会大会論文集\u003c/em\u003e, 2014\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eAutomatic Synthesis of Combiners in the MapReduce Framework: An Approach with Right Inverse\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eMinoru Kinoshita, Kohei Suenaga, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of International Symposium on Logic-Based Program Synthesis and Transformation (LOPSTR)\u003c/em\u003e, 2014\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eOn-Demand Layer Activation for Type-Safe Deactivation\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eTetsuo Kamina, Tomoyuki Aotani, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eInternational Workshop on Context-Oriented Programming, COP\u0026#39;14 - Co-located with the 26th European Conference on Object-Oriented Programming, ECOOP\u0026#39;14\u003c/em\u003e, 2014\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1145/2637066.2637070\" target=\"_blank\" rel=\"noopener\"\u003e10.1145/2637066.2637070\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eTowards Type-Safe JCop: A type system for layer inheritance and first-class layers\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eHiroaki Inoue, Atsushi Igarashi, Malte Appeltauer, Robert Hirschfeldi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eInternational Workshop on Context-Oriented Programming, COP\u0026#39;12 - Co-located with the 26th European Conference on Object-Oriented Programming, ECOOP\u0026#39;14\u003c/em\u003e, 2014\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1145/2637066.2637073\" target=\"_blank\" rel=\"noopener\"\u003e10.1145/2637066.2637073\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eOn Cross-Stage Persistence in Multi-Stage Programming\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eYuichiro Hanada, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of Intl. Symposium on Functional and Logic Programming (FLOPS2014)\u003c/em\u003e, 2014\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1007/978-3-319-07151-0_7\" target=\"_blank\" rel=\"noopener\"\u003e10.1007/978-3-319-07151-0_7\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003e顕在的契約計算のための代数的データ型\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e関山 太朗, 西田 雄気, 五十嵐 淳\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e第16回プログラミングおよびプログラミング言語ワークショップ(PPL2014)論文集\u003c/em\u003e, 2014\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eFormal Verification of CPS : A Nonstandard Analysis Approach\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eHASUO Ichiro, SUENAGA Kohei\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eJournal of The Society of Instrument and Control Engineers\u003c/em\u003e, 2014\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.11499/sicejl.53.1080\" target=\"_blank\" rel=\"noopener\"\u003e10.11499/sicejl.53.1080\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003ePractical Implementation Techniques of Ambient Calculus in Conventional Dynamic Languages\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eSeiji Umatani\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e29th Symposium on Applied Computing (SAC 2014)\u003c/em\u003e, 2014\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eJVMバイトコードへの低水準操作を簡潔に記述可能なマクロシステム\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e馬谷 誠二\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e情報処理学会 第55回プログラミング・シンポジウム\u003c/em\u003e, 2014\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n  \u003c/div\u003e\n\n  \n  \n\n  \u003ch3 id=\"2013\" class=\"pub-group-year\"\u003e2013\u003c/h2\u003e\n  \u003cdiv class=\"pub-list\"\u003e\n    \n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eA Hoare Logic for SIMT Programs\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eKensuke Kojima, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of Asian Symposium on Programming Languages and Systems (APLAS2013)\u003c/em\u003e, 2013\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1007/978-3-319-03542-0_5\" target=\"_blank\" rel=\"noopener\"\u003e10.1007/978-3-319-03542-0_5\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003e多段階計算λ▹のための越段階埋込\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e花田 裕一朗, 五十嵐 淳\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e日本ソフトウェア科学会第30回大会論文集\u003c/em\u003e, 2013\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eLayer Refinement in L\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eRobert Hirschfeld, Atsushi Igarashi, Hidehiko Masuhara\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e並列/分散/協調処理に関するサマー・ワークショップ (SWoPP)\u003c/em\u003e, 2013\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eMatching MyType to subtyping\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eChieri Saito, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eScience of Computer Programming\u003c/em\u003e, 2013\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1016/j.scico.2012.12.010\" target=\"_blank\" rel=\"noopener\"\u003e10.1016/j.scico.2012.12.010\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eL: Context-oriented programming with only layers\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eRobert Hirschfeld, Hidehiko Masuhara, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of the 5th International Workshop on Context-Oriented Programming, COP 2013\u003c/em\u003e, 2013\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1145/2489793.2489797\" target=\"_blank\" rel=\"noopener\"\u003e10.1145/2489793.2489797\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eModel-Checking Higher-Order Programs with Recursive Types\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eNaoki Kobayashi, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of European Symposium on Programming (ESOP2013)\u003c/em\u003e, 2013\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1007/978-3-642-37036-6_24\" target=\"_blank\" rel=\"noopener\"\u003e10.1007/978-3-642-37036-6_24\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eHyperstream processing systems: Nonstandard modeling of continuous-time signals\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eKohei Suenaga, Hiroyoshi Sekine, Ichiro Hasuo\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eConference Record of the Annual ACM Symposium on Principles of Programming Languages\u003c/em\u003e, 2013\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1145/2429069.2429120\" target=\"_blank\" rel=\"noopener\"\u003e10.1145/2429069.2429120\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eSafeアンビエントに基づく分散アプリケーション開発用Lisp環境\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e林 奉行, 馬谷 誠二, 八杉 昌宏, 湯淺 太一\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eコンピュータソフトウェア\u003c/em\u003e, 2013\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eL-Closureの呼び出しコストの削減\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e田附 正充,八杉 昌宏,平石 拓,馬谷 誠二\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e情報処理学会論文誌 プログラミング\u003c/em\u003e, 2013\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n  \u003c/div\u003e\n\n  \n  \n\n  \u003ch3 id=\"2012\" class=\"pub-group-year\"\u003e2012\u003c/h2\u003e\n  \u003cdiv class=\"pub-list\"\u003e\n    \n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eType-based safe resource deallocation for shared-memory concurrency\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eKohei Suenaga, Ryota Fukuda, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA)\u003c/em\u003e, 2012\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1145/2398857.2384618\" target=\"_blank\" rel=\"noopener\"\u003e10.1145/2398857.2384618\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eA Type System for Dynamic Layer Composition\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eAtsushi Igarashi, Robert Hirschfeld, Hidehiko Masuhara\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of the International Workshop on Foundations of Object-Oriented Languages (FOOL2012)\u003c/em\u003e, 2012\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003e顕在的契約計算におけるアップキャスト除去\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e関山 太朗, 五十嵐 淳\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e第14回プログラミングおよびプログラミング言語ワークショップ\u003c/em\u003e, 2012\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eExercises in Nonstandard Static Analysis of Hybrid Systems\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eIchiro Hasuo, Kohei Suenaga\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e24th International Conference, CAV 2012\u003c/em\u003e, 2012\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1007/978-3-642-31424-7_34\" target=\"_blank\" rel=\"noopener\"\u003e10.1007/978-3-642-31424-7_34\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eSEAN: Support Tool for Detecting Rule Violations in JNI Coding\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eHaruna Nishiwaki, Tomoharu Ugawa, Seiji Umatani, Masahiro Yasugi, and Taiichi Yuasa\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eIPSJ Transactions on Programming\u003c/em\u003e, 2012\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eJNIコーディングの規則違反を検出するための支援ツールSEANの開発\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e西脇春名,鵜川始陽,馬谷 誠二,八杉 昌宏,湯淺 太一\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e情報処理学会第87回プログラミング研究会\u003c/em\u003e, 2012\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eDetecting Bugs in Android Using a Static Escape Analyzer SEAN for Native Code\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eHaruna Nishiwaki, Tomoharu Ugawa, Seiji Umatani, Masahiro Yasugi, Taiichi Yuasa\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e10th Asian Symposium on Programming Languages and Systems (APLAS 2012)\u003c/em\u003e, 2012\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n  \u003c/div\u003e\n\n  \n  \n\n  \u003ch3 id=\"2011\" class=\"pub-group-year\"\u003e2011\u003c/h2\u003e\n  \u003cdiv class=\"pub-list\"\u003e\n    \n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eConstructive linear-time temporal logic: Proof systems and Kripke semantics\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eKensuke Kojima, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eInformation and Computation\u003c/em\u003e, 2011\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1016/j.ic.2010.09.008\" target=\"_blank\" rel=\"noopener\"\u003e10.1016/j.ic.2010.09.008\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eSystematic Derivation of a λ○ Virtual Machine with Low-Level Code Generation by using Fusion Transformation\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e小山内 幸一, 五十嵐 淳\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e日本ソフトウェア科学会第28回大会論文集\u003c/em\u003e, 2011\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003ePolymorphic Contracts\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eJoao Filipe Belo, Michael Greenberg, Atsushi Igarashi, Benjamin C. Pierce\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of European Symposium on Programming (ESOP2011)\u003c/em\u003e, 2011\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1007/978-3-642-19718-5_2\" target=\"_blank\" rel=\"noopener\"\u003e10.1007/978-3-642-19718-5_2\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eSpecial track on object-oriented languages and systems\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eD. Ancona, S. Chiba, A. Igarashi, A. Kellens\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of the ACM Symposium on Applied Computing\u003c/em\u003e, 2011\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eGradual typing for generics\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eLintaro Ina, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of the 2011 ACM international conference on Object oriented programming systems languages and applications - OOPSLA \u0026#39;11\u003c/em\u003e, 2011\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1145/2048066.2048114\" target=\"_blank\" rel=\"noopener\"\u003e10.1145/2048066.2048114\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eContextFJ: A minimal core calculus for context-oriented programming\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eRobert Hirschfeld, Atsushi Igarashi, Hidehiko Masuhara\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of the 10th International Workshop on Foundations of Aspect-Oriented Languages, FOAL 2011\u003c/em\u003e, 2011\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1145/1960510.1960515\" target=\"_blank\" rel=\"noopener\"\u003e10.1145/1960510.1960515\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eOrdered Types for Stream Processing of Tree-Structured Data\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eSato Ryosuke, Suenaga Kohei, Kobayashi Naoki\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eInformation and Media Technologies\u003c/em\u003e, 2011\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.11185/imt.6.385\" target=\"_blank\" rel=\"noopener\"\u003e10.11185/imt.6.385\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eProgramming with Infinitesimals: A WHILE-Language for Hybrid System Modeling\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eKohei Suenaga, Ichiro Hasuo\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eAutomata, Languages and Programming, ICALP, Pt II\u003c/em\u003e, 2011\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1007/978-3-642-22012-8_31\" target=\"_blank\" rel=\"noopener\"\u003e10.1007/978-3-642-22012-8_31\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n  \u003c/div\u003e\n\n  \n  \n\n  \u003ch3 id=\"2010\" class=\"pub-group-year\"\u003e2010\u003c/h2\u003e\n  \u003cdiv class=\"pub-list\"\u003e\n    \n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eA Logical Foundation for Environment Classifiers\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eTakeshi Tsukada, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eLogical Methods in Computer Science\u003c/em\u003e, 2010\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.2168/lmcs-6%284:8%292010\" target=\"_blank\" rel=\"noopener\"\u003e10.2168/lmcs-6(4:8)2010\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eMostly modular compilation of crosscutting concerns by contextual predicate dispatch\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eShigeru Chiba, Atsushi Igarashi, Salikh Zakirov\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA)\u003c/em\u003e, 2010\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1145/1932682.1869503\" target=\"_blank\" rel=\"noopener\"\u003e10.1145/1932682.1869503\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eType relaxed weaving\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eH. Masuhara, A. Igarashi, M. Toyama\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eAOSD.10 - 9th International Conference on Aspect-Oriented Software Development\u003c/em\u003e, 2010\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1145/1739230.1739245\" target=\"_blank\" rel=\"noopener\"\u003e10.1145/1739230.1739245\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n  \u003c/div\u003e\n\n  \n  \n\n  \u003ch3 id=\"2009\" class=\"pub-group-year\"\u003e2009\u003c/h2\u003e\n  \u003cdiv class=\"pub-list\"\u003e\n    \n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eGradual Typing for Featherweight Java\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eINA Lintaro, IGARASHI Atsushi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eComputer Software\u003c/em\u003e, 2009\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.11309/jssst.26.2_18\" target=\"_blank\" rel=\"noopener\"\u003e10.11309/jssst.26.2_18\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eMatching ThisType to subtyping\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eChieri Saito, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of the ACM Symposium on Applied Computing\u003c/em\u003e, 2009\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1145/1529282.1529699\" target=\"_blank\" rel=\"noopener\"\u003e10.1145/1529282.1529699\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eSelf type constructors\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eChieri Saito, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceeding of the 24th ACM SIGPLAN conference on Object oriented programming systems languages and applications - OOPSLA 09\u003c/em\u003e, 2009\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1145/1640089.1640109\" target=\"_blank\" rel=\"noopener\"\u003e10.1145/1640089.1640109\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eTowards gradual typing for generics\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eLintaro Ina, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings for the 1st Workshop on Script to Program Evolution, STOP\u0026#39;09 in Conjunction with European Conference on Object-Oriented Programming, ECOOP\u0026#39;09\u003c/em\u003e, 2009\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1145/1570506.1570509\" target=\"_blank\" rel=\"noopener\"\u003e10.1145/1570506.1570509\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n  \u003c/div\u003e\n\n  \n  \n\n  \u003ch3 id=\"2008\" class=\"pub-group-year\"\u003e2008\u003c/h2\u003e\n  \u003cdiv class=\"pub-list\"\u003e\n    \n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eProving Noninterference by a Fully Complete Translation to the Simply Typed lambda-calculus\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eNaokata Shikuma, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eLogical Methods in Computer Science\u003c/em\u003e, 2008\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.2168/lmcs-4%283:10%292008\" target=\"_blank\" rel=\"noopener\"\u003e10.2168/lmcs-4(3:10)2008\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eOn Constructive Linear-Time Temporal Logic\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eKensuke Kojima, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of the Workshop on Intuitionistil Modal Logic and Applications (IMLA\u0026#39;08)\u003c/em\u003e, 2008\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eLightweight family polymorphism\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eChieri Saito, Atsushi Igarashi, Mirko Viroli\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eJournal of Functional Programming\u003c/em\u003e, 2008\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1017/s0956796807006405\" target=\"_blank\" rel=\"noopener\"\u003e10.1017/s0956796807006405\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eFeatherweight Java のための漸進的型付け\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e伊奈 林太郎, 五十嵐 淳\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e第10回プログラミングおよびプログラミング言語ワークショップ(PPL2008)論文集\u003c/em\u003e, 2008\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003e文脈依存資源使用解析のための型システム\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e仲井間 達也, 五十嵐 淳, 小林 直樹\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e第10回プログラミングおよびプログラミング言語ワークショップ(PPL2008)論文集\u003c/em\u003e, 2008\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eCalculi of meta-variables\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eM. Sato, T. Sakurai, Y. Kameyama, A. Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eFrontiers of Computer Science in China\u003c/em\u003e, 2008\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1007/s11704-008-0011-1\" target=\"_blank\" rel=\"noopener\"\u003e10.1007/s11704-008-0011-1\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eThe essence of lightweight family polymorphism\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eChieri Saito, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eJournal of Object Technology\u003c/em\u003e, 2008\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.5381/jot.2008.7.5.a3\" target=\"_blank\" rel=\"noopener\"\u003e10.5381/jot.2008.7.5.a3\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n  \u003c/div\u003e\n\n  \n  \n\n  \u003ch3 id=\"2007\" class=\"pub-group-year\"\u003e2007\u003c/h2\u003e\n  \u003cdiv class=\"pub-list\"\u003e\n    \n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eProving Noninterference by a Fully Complete Translation to the Simply Typed λ-Calculus\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eNaokata Shikuma, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eAdvances in Computer Science - ASIAN 2006. Secure Software and Related Issues\u003c/em\u003e, 2007\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1007/978-3-540-77505-8_24\" target=\"_blank\" rel=\"noopener\"\u003e10.1007/978-3-540-77505-8_24\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eVariant path types for scalable extensibility\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eAtsushi Igarashi, Mirko Viroli\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of the 22nd annual ACM SIGPLAN conference on Object oriented programming systems and applications - OOPSLA \u0026#39;07\u003c/em\u003e, 2007\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1145/1297027.1297037\" target=\"_blank\" rel=\"noopener\"\u003e10.1145/1297027.1297037\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eAn Algorithm to Decide Conformance of Resource Usage to Specification for Resource Usage Verification\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eIWAMA FUTOSHI, IGARASHI ATSUSHI, KOBAYASHI NAOKI\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e情報処理学会論文誌. プログラミング\u003c/em\u003e, 2007\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eUnion types for object-oriented programming\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eA. Igarashi, H. Nagira\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eJournal of Object Technology\u003c/em\u003e, 2007\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eDeriving compilers and virtual machines for a multi-level language\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eAtsushi Igarashi, Masashi Iwaki\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of Asian Symposium on Programming Languages and Systems (APLAS 2007)\u003c/em\u003e, 2007\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n  \u003c/div\u003e\n\n  \n  \n\n  \u003ch3 id=\"2006\" class=\"pub-group-year\"\u003e2006\u003c/h2\u003e\n  \u003cdiv class=\"pub-list\"\u003e\n    \n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eVariant parametric types: A flexible subtyping scheme for generics\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eAtsushi Igarashi, Mirko Viroli\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS\u003c/em\u003e, 2006\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1145/1152649.1152650\" target=\"_blank\" rel=\"noopener\"\u003e10.1145/1152649.1152650\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003e様相型に基づく情報流解析における非干渉性の論理関係による一般化とその証明\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e四熊 尚方, 五十嵐 淳\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e第8回プログラミングおよびプログラミング言語ワークショップ(PPL2006)論文集\u003c/em\u003e, 2006\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eResource usage analysis for a functional language with exceptions\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eF. Iwama, A. Igarashi, N. Kobayashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of the ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation\u003c/em\u003e, 2006\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1145/1111542.1111550\" target=\"_blank\" rel=\"noopener\"\u003e10.1145/1111542.1111550\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eA modal type system for multi-level generating extensions with persistent code\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eY. Yuse, A. Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003ePPDP\u0026#39;06 - Proceedings of the Eight ACM SIGPLAN Symposium on Principles and Practice of Declarative Programming\u003c/em\u003e, 2006\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n  \u003c/div\u003e\n\n  \n  \n\n  \u003ch3 id=\"2005\" class=\"pub-group-year\"\u003e2005\u003c/h2\u003e\n  \u003cdiv class=\"pub-list\"\u003e\n    \n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eResource usage analysis\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eA Igarashi, N Kobayashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS\u003c/em\u003e, 2005\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1145/1057387.1057390\" target=\"_blank\" rel=\"noopener\"\u003e10.1145/1057387.1057390\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003e例外機構を備えた言語のための資源使用法解析\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e岩間 太, 五十嵐 淳, 小林 直樹\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e第7回プログラミングおよびプログラミング言語ワークショップ(PPL2005)論文集\u003c/em\u003e, 2005\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eメタプログラミングのための時相論理に基づく型付λ計算\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e湯瀬 芳洋, 五十嵐 淳\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e第7回プログラミングおよびプログラミング言語ワークショップ(PPL2005)論文集\u003c/em\u003e, 2005\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n  \u003c/div\u003e\n\n  \n  \n\n  \u003ch3 id=\"2004\" class=\"pub-group-year\"\u003e2004\u003c/h2\u003e\n  \u003cdiv class=\"pub-list\"\u003e\n    \n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eGenerics・Union 型を導入したオブジェクト指向計算体系\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e柳楽 秀士, 五十嵐 淳\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e第6回プログラミングおよびプログラミング言語ワークショップ(PPL2004)論文集\u003c/em\u003e, 2004\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eA generic type system for the Pi-calculus\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eA Igarashi, N Kobayashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eTHEORETICAL COMPUTER SCIENCE\u003c/em\u003e, 2004\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1016/S0304-3975%2803%2900325-6\" target=\"_blank\" rel=\"noopener\"\u003e10.1016/S0304-3975(03)00325-6\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eA modal foundation for secure information flow\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eKenji Miyamoto, Atsushi Igarashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of the Workshop on Foundations of Computer Security (FCS\u0026#39;04), number 31 in Turku Centre for Computer Science General Publication,187-203\u003c/em\u003e, 2004\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n  \u003c/div\u003e\n\n  \n  \n\n  \u003ch3 id=\"2003\" class=\"pub-group-year\"\u003e2003\u003c/h2\u003e\n  \u003cdiv class=\"pub-list\"\u003e\n    \n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eUnion 型を導入したオブジェクト指向計算体系\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e柳楽 秀士, 五十嵐 淳\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e日本ソフトウェア科学会第20回大会論文集\u003c/em\u003e, 2003\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003e擬似引用を持つ型付計算体系λq\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003e山本 和樹, 岡本 暁広, 五十嵐 淳, 佐藤 雅彦\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003e第5回プログラミングおよびプログラミング言語ワークショップ(PPL2003)論文集\u003c/em\u003e, 2003\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n  \u003c/div\u003e\n\n  \n  \n\n  \u003ch3 id=\"2002\" class=\"pub-group-year\"\u003e2002\u003c/h2\u003e\n  \u003cdiv class=\"pub-list\"\u003e\n    \n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eOn Inner Classes\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eAtsushi Igarashi, Benjamin C. Pierce\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eInformation and Computation\u003c/em\u003e, 2002\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1006/inco.2002.3092\" target=\"_blank\" rel=\"noopener\"\u003e10.1006/inco.2002.3092\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eFoundations for Virtual Types\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eAtsushi Igarashi, Benjamin C. Pierce\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eInformation and Computation\u003c/em\u003e, 2002\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1006/inco.2001.2942\" target=\"_blank\" rel=\"noopener\"\u003e10.1006/inco.2001.2942\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eOn variance-based subtyping for parametric types\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eA Igarashi, M Viroli\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eECOOP 2002 - OBJECT-ORIENTED PROGRAMMING\u003c/em\u003e, 2002\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n  \u003c/div\u003e\n\n  \n  \n\n  \u003ch3 id=\"2001\" class=\"pub-group-year\"\u003e2001\u003c/h2\u003e\n  \u003cdiv class=\"pub-list\"\u003e\n    \n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eFeatherweight Java: A minimal core calculus for Java and GJ\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eA Igarashi, BC Pierce, P Wadler\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS\u003c/em\u003e, 2001\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1145/503502.503505\" target=\"_blank\" rel=\"noopener\"\u003e10.1145/503502.503505\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eA Recipe for Raw Types\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eAtsushi Igarashi, Benjamin C. Pierce, Philip Wadler\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of the International Workshop on Foundations of Object-Oriented Languages (FOOL8)\u003c/em\u003e, 2001\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n  \u003c/div\u003e\n\n  \n  \n\n  \u003ch3 id=\"2000\" class=\"pub-group-year\"\u003e2000\u003c/h2\u003e\n  \u003cdiv class=\"pub-list\"\u003e\n    \n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eGarbage Collection Based on a Linear Type System\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eAtsushi Igarashi, Naoki Kobayashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of the 3rd ACM SIGPLAN Wokshop on Types in Compilation (TIC\u0026#39;00)\u003c/em\u003e, 2000\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eType reconstruction for linear pi-calculus with I/O subtyping\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eA Igarashi, N Kobayashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eINFORMATION AND COMPUTATION\u003c/em\u003e, 2000\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n        \u003cspan class=\"doi\"\u003e\n          DOI: \u003ca href=\"https://doi.org/10.1006/inco.2000.2872\" target=\"_blank\" rel=\"noopener\"\u003e10.1006/inco.2000.2872\u003c/a\u003e\n        \u003c/span\u003e\n        \n      \u003c/div\u003e\n    \n  \u003c/div\u003e\n\n  \n  \n\n  \u003ch3 id=\"1999\" class=\"pub-group-year\"\u003e1999\u003c/h2\u003e\n  \u003cdiv class=\"pub-list\"\u003e\n    \n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eFeatherweight Java - A minimal core calculus for Java and GJ\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eA Igarashi, B Pierce, P Wadler\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA\u0026#39;99)\u003c/em\u003e, 1999\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n  \u003c/div\u003e\n\n  \n  \n\n  \u003ch3 id=\"1997\" class=\"pub-group-year\"\u003e1997\u003c/h2\u003e\n  \u003cdiv class=\"pub-list\"\u003e\n    \n    \n      \u003cdiv class=\"pub-item\"\u003e\n        \u003cstrong\u003eType-based Analysis of Communication for Concurrent Programming Languages\u003c/strong\u003e\u003cbr\u003e\n        \u003cspan class=\"authors\"\u003eAtsushi Igarashi, Naoki Kobayashi\u003c/span\u003e\u003cbr\u003e\n        \n        \u003cspan class=\"journal\"\u003e\n          \u003cem\u003eProceedings of the Fourth International Static Analysis Symposium\u003c/em\u003e, 1997\n        \u003c/span\u003e\u003cbr\u003e\n        \n        \n      \u003c/div\u003e\n    \n  \u003c/div\u003e\n\n\n"}]}