Skip to main content

Showing 1–3 of 3 results for author: Politz, J G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2005.01794  [pdf, ps, other

    cs.CY

    Data Science as a Route to AI for Middle- and High-School Students

    Authors: Shriram Krishnamurthi, Emmanuel Schanzer, Joe Gibbs Politz, Benjamin S. Lerner, Kathi Fisler, Sam Dooman

    Abstract: The Bootstrap Project's Data Science curriculum has trained about 100 teachers who are using it around the country. It is specifically designed to aid adoption at a wide range of institutions. It emphasizes valuable curricular goals by drawing on both the education literature and on prior experience with other computing outreach projects. It embraces "three P's" of data-oriented thinking: the prom… ▽ More

    Submitted 30 April, 2020; originally announced May 2020.

    Comments: Accepted and presented at the "Teaching AI in K-12" Symposium, part of the AAAI 2019 Fall Symposium Series

  2. arXiv:1802.02974  [pdf, other

    cs.PL

    Putting in All the Stops: Execution Control for JavaScript

    Authors: Samuel Baxter, Rachit Nigam, Joe Gibbs Politz, Shriram Krishnamurthi, Arjun Guha

    Abstract: Scores of compilers produce JavaScript, enabling programmers to use many languages on the Web, reuse existing code, and even use Web IDEs. Unfortunately, most compilers inherit the browser's compromised execution model, so long-running programs freeze the browser tab, infinite loops crash IDEs, and so on. The few compilers that avoid these problems suffer poor performance and are difficult to engi… ▽ More

    Submitted 15 April, 2018; v1 submitted 8 February, 2018; originally announced February 2018.

    Comments: In proceedings of ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI) 2018

  3. arXiv:1506.07813  [pdf, ps, other

    cs.PL

    ADsafety: Type-Based Verification of JavaScript Sandboxing

    Authors: Joe Gibbs Politz, Spiridon Eliopoulos, Arjun Guha, Shriram Krishnamurthi

    Abstract: Web sites routinely incorporate JavaScript programs from several sources into a single page. These sources must be protected from one another, which requires robust sandboxing. The many entry-points of sandboxes and the subtleties of JavaScript demand robust verification of the actual sandbox source. We use a novel type system for JavaScript to encode and verify sandboxing properties. The resultin… ▽ More

    Submitted 25 June, 2015; originally announced June 2015.

    Comments: in Proceedings of the USENIX Security Symposium (2011)