Year |
Citation |
Score |
2015 |
Yang P, Gofman MI, Stoller SD, Yang Z. Policy analysis for administrative role based access control without separate administration Journal of Computer Security. 23: 1-29. DOI: 10.3233/Jcs-140511 |
0.31 |
|
2015 |
Xu Z, Stoller SD. Mining Attribute-Based Access Control Policies Ieee Transactions On Dependable and Secure Computing. 12: 533-545. DOI: 10.1109/Tdsc.2014.2369048 |
0.605 |
|
2014 |
Gupta P, Stoller SD, Xu Z. Abductive Analysis of Administrative Policies in Rule-Based Access Control Ieee Transactions On Dependable and Secure Computing. 11: 412-424. DOI: 10.1109/Tdsc.2013.42 |
0.593 |
|
2013 |
Xu Z, Stoller SD. Mining parameterized role-based policies Codaspy 2013 - Proceedings of the 3rd Acm Conference On Data and Application Security and Privacy. 255-265. DOI: 10.1145/2435349.2435384 |
0.314 |
|
2012 |
Liu YA, Stoller SD, Lin B, Gorbovitski M. From clarity to efficiency for distributed algorithms ? Proceedings of the Conference On Object-Oriented Programming Systems, Languages, and Applications, Oopsla. 395-409. DOI: 10.1145/2384616.2384645 |
0.359 |
|
2012 |
Xu Z, Stoller SD. Algorithms for mining meaningful roles Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 57-66. DOI: 10.1145/2295136.2295146 |
0.312 |
|
2012 |
Liu YA, Stoller SD, Lin B. High-level executable specifications of distributed algorithms Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7596: 95-110. DOI: 10.1007/978-3-642-33536-5_11 |
0.322 |
|
2011 |
Stoller SD, Yang P, Gofman MI, Ramakrishnan CR. Symbolic reachability analysis for parameterized administrative role-based access control Computers and Security. 30: 148-164. DOI: 10.1016/J.Cose.2010.08.002 |
0.309 |
|
2010 |
Agarwal R, Bensalem S, Farchi E, Havelund K, Nir-Buchbinder Y, Stoller SD, Ur S, Wang L. Detection of deadlock potentials in multithreaded programs Ibm Journal of Research and Development. 54. DOI: 10.1147/Jrd.2010.2060276 |
0.475 |
|
2010 |
Gorbovitski M, Liu YA, Stoller SD, Rothamel T, Tekle KT. Alias analysis for optimization of dynamic languages Proceedings of the 6th Symposium On Dynamic Languages, Dls '10. 27-41. DOI: 10.1145/1869631.1869635 |
0.339 |
|
2010 |
Liu YA, Gorbovitski M, Stoller SD. A language and framework for invariant-driven transformations Acm Sigplan Notices. 45: 55-64. DOI: 10.1145/1837852.1621617 |
0.349 |
|
2009 |
Liu YA, Stoller SD. From datalog rules to efficient programs with time and space guarantees Acm Transactions On Programming Languages and Systems. 31. DOI: 10.1145/1552309.1552311 |
0.435 |
|
2009 |
Unnikrishnan L, Stoller SD. Parametric heap usage analysis for functional programs International Symposium On Memory Management, Ismm. 139-148. DOI: 10.1145/1542431.1542451 |
0.674 |
|
2006 |
Stoller SD, Cohen E. Optimistic synchronization-based state-space reduction Formal Methods in System Design. 28: 263-289. DOI: 10.1007/s10703-006-0003-4 |
0.312 |
|
2003 |
Liu YA, Stoller SD. Dynamic programming via static incrementalization Higher-Order and Symbolic Computation. 16: 37-62. DOI: 10.1023/A:1023068020483 |
0.312 |
|
2003 |
Wang L, Stoller SD. Run-time analysis for atomicity Electronic Notes in Theoretical Computer Science. 89: 195-213. DOI: 10.1016/S1571-0661(04)81049-1 |
0.472 |
|
2003 |
Liu YA, Stoller SD. Eliminating dead code on recursive data Science of Computer Programming. 47: 221-242. DOI: 10.1016/S0167-6423(02)00134-X |
0.339 |
|
2003 |
Unnikrishnan L, Stoller SD, Liu YA. Optimized live heap bound analysis Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2575: 70-85. |
0.687 |
|
2002 |
Stoller SD. Model-checking multi-threaded distributed Java programs International Journal On Software Tools For Technology Transfer. 4: 71-91. DOI: 10.1007/s10009-002-0077-2 |
0.364 |
|
2002 |
Liu YA, Stoller SD. Program optimization using indexed and recursive data structures Proceedings of the Acm Sigplan Symposium On Partial Evaluation and Semantics-Based Program Manipulation. 108-118. |
0.343 |
|
2001 |
Liu YA, Stoller SD, Teitelbaum T. Strengthening invariants for efficient computation Science of Computer Programming. 41: 139-172. DOI: 10.1016/S0167-6423(01)00003-X |
0.305 |
|
2001 |
Liu YA, Li N, Stoller SD. Solving regular tree grammar based constraints Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2126: 213-233. |
0.367 |
|
2001 |
Unnikrishnan L, Stoller SD, Liu YA. Automatic accurate live memory analysis for garbage-collected languages Sigplan Notices (Acm Special Interest Group On Programming Languages). 36: 102-111. |
0.686 |
|
2000 |
Stoller SD, Unnikrishnan L, Liu YA. Efficient detection of global properties in distributed systems using partial-order methods Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1855: 264-279. |
0.658 |
|
2000 |
Liu YA, Stoller SD. From recursion to iteration: What are the optimizations? Proceedings of the Acm Sigplan Symposium On Partial Evaluation and Semantics-Based Program Manipulation. 73-82. |
0.414 |
|
Show low-probability matches. |