Brian Demsky
Affiliations: | Electrical and Computer Engineering - Ph.D. | University of California, Irvine, Irvine, CA |
Area:
Computer Science, Computer EngineeringGoogle:
"Brian Demsky"Children
Sign in to add traineeAlokika Dash | grad student | 2010 | UC Irvine |
James C. Jenista | grad student | 2012 | UC Irvine |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Hawkins B, Demsky B, Taylor MB. (2016) BlackBox: Lightweight security monitoring for COTS binaries Proceedings of the 14th International Symposium On Code Generation and Optimization, Cgo 2016. 261-272 |
Norris B, Demsky B. (2016) A practical approach for model checking C/C++11 code Acm Transactions On Programming Languages and Systems. 38 |
Fang L, Nguyen K, Xu G, et al. (2015) Interruptible tasks: Treating memory pressure as interrupts for highly scalable data-parallel programs Sosp 2015 - Proceedings of the 25th Acm Symposium On Operating Systems Principles. 394-409 |
Luu L, Shinde S, Saxena P, et al. (2014) A model counter for constraints over unbounded strings Acm Sigplan Notices. 49: 565-576 |
Norris B, Demsky B. (2013) CDSCHECKER: Checking concurrent data structures written with C/C++ atomics Proceedings of the Conference On Object-Oriented Programming Systems, Languages, and Applications, Oopsla. 131-149 |
Demsky B, Lam P. (2013) Views: Synthesizing fine-grained concurrency control Acm Transactions On Software Engineering and Methodology. 22 |
Zhou J, Demsky B. (2012) Memory management for many-core processors with software configurable locality policies Acm Sigplan Notices. 47: 3-14 |
Eom YH, Demsky B. (2012) Self-stabilizing java Acm Sigplan Notices. 47: 287-298 |
Eom YH, Yang S, Jenista JC, et al. (2012) DOJ: Dynamically parallelizing object-oriented programs Proceedings of the Acm Sigplan Symposium On Principles and Practice of Parallel Programming, Ppopp. 85-96 |
Demsky B. (2011) Cross-application data provenance and policy enforcement Acm Transactions On Information and System Security. 14 |