Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Somesh Jha
2010 – today
- 2013
[j22]Martin Franz, Björn Deiseroth, Kay Hamacher, Somesh Jha, Stefan Katzenbeisser, Heike Schröder: Secure computations on non-integer values with applications to privacy-preserving sequence analysis. Inf. Sec. Techn. Report 17(3): 117-128 (2013)
[c97]William R. Harris, Guoliang Jin, Shan Lu, Somesh Jha: Validating Library Usage Interactively. CAV 2013: 796-812
[c96]Florian Sagstetter, Martin Lukasiewycz, Sebastian Steinhorst, Marko Wolf, Alexandre Bouard, William R. Harris, Somesh Jha, Thomas Peyrin, Axel Poschmann, Samarjit Chakraborty: Security challenges in automotive hardware/software architecture design. DATE 2013: 458-463
[c95]William R. Harris, Somesh Jha, Thomas W. Reps, Jonathan Anderson, Robert N. M. Watson: Declarative, Temporal, and Practical Programming with Capabilities. IEEE Symposium on Security and Privacy 2013: 18-32- 2012
[j21]Paul F. Syverson, Somesh Jha: Guest Editorial: Special Issue on Computer and Communications Security. ACM Trans. Inf. Syst. Secur. 15(1): 1 (2012)
[c94]Matthew Fredrikson, Richard Joiner, Somesh Jha, Thomas W. Reps, Phillip A. Porras, Hassen Saïdi, Vinod Yegneswaran: Efficient Runtime Policy Enforcement Using Counterexample-Guided Abstraction Refinement. CAV 2012: 548-563
[c93]William R. Harris, Somesh Jha, Thomas W. Reps: Secure Programming via Visibly Pushdown Safety Games. CAV 2012: 581-598
[c92]Wenchao Li, Sanjit A. Seshia, Somesh Jha: CrowdMine: towards crowdsourced human-assisted verification. DAC 2012: 1254-1255
[c91]Marc de Kruijf, Karthikeyan Sankaralingam, Somesh Jha: Static analysis and compiler design for idempotent processing. PLDI 2012: 475-486
[c90]Damien Octeau, Somesh Jha, Patrick McDaniel: Retargeting Android applications to Java bytecode. SIGSOFT FSE 2012: 6- 2011
[j20]Daniel Luchaup, Randy Smith, Cristian Estan, Somesh Jha: Speculative Parallel Pattern Matching. IEEE Transactions on Information Forensics and Security 6(2): 438-451 (2011)
[c89]Matthew Fredrikson, Mihai Christodorescu, Somesh Jha: Dynamic Behavior Matching: A Complexity Analysis and New Approximation Algorithms. CADE 2011: 252-267
[c88]Martin Franz, Björn Deiseroth, Kay Hamacher, Somesh Jha, Stefan Katzenbeisser, Heike Schröder: Towards Secure Bioinformatics Services (Short Paper). Financial Cryptography 2011: 276-283
[p4]Mihai Christodorescu, Matthew Fredrikson, Somesh Jha, Jonathon T. Giffin: End-to-End Software Diversification of Internet Services. Moving Target Defense 2011: 117-130- 2010
[b1]Anupam Datta, Somesh Jha, Ninghui Li, David Melski, Thomas W. Reps: Analysis Techniques for Information Security. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2010
[j19]Somesh Jha, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith, Stephen Chenney: Semantic integrity in large-scale online simulations. ACM Trans. Internet Techn. 10(1) (2010)
[c87]Amit Kumar, Lorenzo De Carli, Sung Jin Kim, Marc de Kruijf, Karthikeyan Sankaralingam, Cristian Estan, Somesh Jha: Design and implementation of the PLUG architecture for programmable and efficient network lookups. PACT 2010: 331-342
[c86]
[c85]William R. Harris, Somesh Jha, Thomas W. Reps: DIFC programs by automatic instrumentation. ACM Conference on Computer and Communications Security 2010: 284-296
[c84]Dave King, Susmit Jha, Divya Muthukumaran, Trent Jaeger, Somesh Jha, Sanjit A. Seshia: Automating Security Mediation Placement. ESOP 2010: 327-344
[c83]Matt Fredrikson, Somesh Jha, Mihai Christodorescu, Reiner Sailer, Xifeng Yan: Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors. IEEE Symposium on Security and Privacy 2010: 45-60
[c82]Roberto Paleari, Lorenzo Martignoni, Emanuele Passerini, Drew Davidson, Matt Fredrikson, Jonathon T. Giffin, Somesh Jha: Automatic Generation of Remediation Procedures for Malware Infections. USENIX Security Symposium 2010: 419-434
[p3]Paul Barford, Marc Dacier, Thomas G. Dietterich, Matt Fredrikson, Jonathon T. Giffin, Sushil Jajodia, Somesh Jha, Jason H. Li, Peng Liu, Peng Ning, Xinming Ou, Dawn Song, Laura Strater, Vipin Swarup, George P. Tadda, C. Wang, John Yen: Cyber SA: Situational Awareness for Cyber Defense. Cyber Situational Awareness 2010: 3-13
[p2]Matt Fredrikson, Mihai Christodorescu, Jonathon T. Giffin, Somesh Jha: A Declarative Framework for Intrusion Analysis. Cyber Situational Awareness 2010: 179-200
[e6]Somesh Jha, Anish Mathuria (Eds.): Information Systems Security - 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings. Lecture Notes in Computer Science 6503, Springer 2010, ISBN 978-3-642-17713-2
[e5]Somesh Jha, Robin Sommer, Christian Kreibich (Eds.): Recent Advances in Intrusion Detection, 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings. Lecture Notes in Computer Science 6307, Springer 2010, ISBN 978-3-642-15511-6
[i2]Martin Franz, Björn Deiseroth, Kay Hamacher, Somesh Jha, Stefan Katzenbeisser, Heike Schröder: Secure Computations on Non-Integer Values. IACR Cryptology ePrint Archive 2010: 499 (2010)
2000 – 2009
- 2009
[c81]Drew Davidson, Randy Smith, Nic Doyle, Somesh Jha: Protocol Normalization Using Attribute Grammars. ESORICS 2009: 216-231
[c80]William R. Harris, Nicholas Kidd, Sagar Chaki, Somesh Jha, Thomas W. Reps: Verifying Information Flow Control over Unbounded Processes. FM 2009: 773-789
[c79]Daniel Luchaup, Randy Smith, Cristian Estan, Somesh Jha: Multi-byte Regular Expression Matching with Speculation. RAID 2009: 284-303
[e4]Ehab Al-Shaer, Somesh Jha, Angelos D. Keromytis (Eds.): Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. ACM 2009, ISBN 978-1-60558-894-0
[e3]Engin Kirda, Somesh Jha, Davide Balzarotti (Eds.): Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings. Lecture Notes in Computer Science 5758, Springer 2009, ISBN 978-3-642-04341-3- 2008
[j18]David Brumley, James Newsome, Dawn Song, Hao Wang, Somesh Jha: Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures. IEEE Trans. Dependable Sec. Comput. 5(4): 224-241 (2008)
[j17]Somesh Jha, Ninghui Li, Mahesh V. Tripunitara, Qihua Wang, William H. Winsborough: Towards Formal Verification of Role-Based Access Control Policies. IEEE Trans. Dependable Sec. Comput. 5(4): 242-255 (2008)
[j16]Mila Dalla Preda, Mihai Christodorescu, Somesh Jha, Saumya K. Debray: A semantics-based approach to malware detection. ACM Trans. Program. Lang. Syst. 30(5) (2008)
[c78]Vinod Ganapathy, Matthew J. Renzelmann, Arini Balakrishnan, Michael M. Swift, Somesh Jha: The design and implementation of microdrivers. ASPLOS 2008: 168-178
[c77]Randy Smith, Cristian Estan, Somesh Jha, Ida Siahaan: Fast Signature Matching Using Extended Finite Automaton (XFA). ICISS 2008: 158-172
[c76]Mihai Christodorescu, Somesh Jha, Christopher Kruegel: Mining specifications of malicious behavior. ISEC 2008: 5-14
[c75]Lorenzo Martignoni, Elizabeth Stinson, Matt Fredrikson, Somesh Jha, John C. Mitchell: A Layered Architecture for Detecting Malicious Behaviors. RAID 2008: 78-97
[c74]Randy Smith, Cristian Estan, Somesh Jha, Shijin Kong: Deflating the big bang: fast and scalable deep packet inspection with extended finite automata. SIGCOMM 2008: 207-218
[c73]Dave King, Trent Jaeger, Somesh Jha, Sanjit A. Seshia: Effective blame for information-flow violations. SIGSOFT FSE 2008: 250-260
[c72]Randy Smith, Cristian Estan, Somesh Jha: XFA: Faster Signature Matching with Extended Automata. IEEE Symposium on Security and Privacy 2008: 187-201
[c71]Somesh Jha, Louis Kruger, Vitaly Shmatikov: Towards Practical Privacy for Genomic Computation. IEEE Symposium on Security and Privacy 2008: 216-230
[e2]Peng Ning, Paul F. Syverson, Somesh Jha (Eds.): Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008. ACM 2008, ISBN 978-1-59593-810-7- 2007
[j15]Mihai Christodorescu, Somesh Jha, Johannes Kinder, Stefan Katzenbeisser, Helmut Veith: Software transformations to improve malware detection. Journal in Computer Virology 3(4): 253-265 (2007)
[c70]Lorenzo Martignoni, Mihai Christodorescu, Somesh Jha: OmniUnpack: Fast, Generic, and Safe Unpacking of Malware. ACSAC 2007: 431-441
[c69]David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong Song: Creating Vulnerability Signatures Using Weakest Preconditions. CSF 2007: 311-325
[c68]Vinod Ganapathy, Arini Balakrishnan, Michael M. Swift, Somesh Jha: Microdrivers: A New Architecture for Device Drivers. HotOS 2007
[c67]Vinod Ganapathy, Dave King, Trent Jaeger, Somesh Jha: Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis. ICSE 2007: 458-467
[c66]Mila Dalla Preda, Mihai Christodorescu, Somesh Jha, Saumya K. Debray: A semantics-based approach to malware detection. POPL 2007: 377-388
[c65]Mihai Christodorescu, Somesh Jha, Christopher Kruegel: Mining specifications of malicious behavior. ESEC/SIGSOFT FSE 2007: 5-14
[c64]Somesh Jha, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith, Stephen Chenney: Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments. IEEE Symposium on Security and Privacy 2007: 179-186
[e1]Mihai Christodorescu, Somesh Jha, Douglas Maughan, Dawn Song, Cliff Wang (Eds.): Malware Detection. Advances in Information Security 27, Springer 2007, ISBN 978-0-387-32720-4
[i1]Somesh Jha, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith, Stephen Chenney: Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments. IACR Cryptology ePrint Archive 2007: 56 (2007)- 2006
[c63]Randy Smith, Cristian Estan, Somesh Jha: Backtracking Algorithmic Complexity Attacks against a NIDS. ACSAC 2006: 89-98
[c62]Hao Wang, Somesh Jha, Vinod Ganapathy: NetSpy: Automatic Generation of Spyware Signatures for NIDS. ACSAC 2006: 99-108
[c61]Shai Rubin, Somesh Jha, Barton P. Miller: Protomatching network traffic for high throughputnetwork intrusion detection. ACM Conference on Computer and Communications Security 2006: 47-58
[c60]Louis Kruger, Somesh Jha, Eu-Jin Goh, Dan Boneh: Secure function evaluation with ordered binary decision diagrams. ACM Conference on Computer and Communications Security 2006: 410-420
[c59]Shai Rubin, Somesh Jha, Barton P. Miller: On the Completeness of Attack Mutation Algorithms. CSFW 2006: 43-56
[c58]Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwoon, Stuart G. Stubblebine: Reducing the Dependence of SPKI/SDSI on PKI. ESORICS 2006: 156-173
[c57]Jonathon T. Giffin, Somesh Jha, Barton P. Miller: Automated Discovery of Mimicry Attacks. RAID 2006: 41-60
[c56]David Brumley, James Newsome, Dawn Xiaodong Song, Hao Wang, Somesh Jha: Towards Automatic Generation of Vulnerability-Based Signatures. IEEE Symposium on Security and Privacy 2006: 2-16
[c55]Vinod Ganapathy, Trent Jaeger, Somesh Jha: Retrofitting Legacy Code for Authorization Policy Enforcement. IEEE Symposium on Security and Privacy 2006: 214-229
[c54]Somesh Jha, Stefan Schwoon, Hao Wang, Thomas W. Reps: Weighted Pushdown Systems and Trust-Management Systems. TACAS 2006: 1-26- 2005
[j14]Sagar Chaki, Edmund M. Clarke, Somesh Jha, Helmut Veith: An Iterative Framework for Simulation Conformance. J. Log. Comput. 15(4): 465-488 (2005)
[j13]Thomas W. Reps, Stefan Schwoon, Somesh Jha, David Melski: Weighted pushdown systems and their application to interprocedural dataflow analysis. Sci. Comput. Program. 58(1-2): 206-263 (2005)
[c53]Vinod Ganapathy, Trent Jaeger, Somesh Jha: Automatic placement of authorization hooks in the linux security modules framework. ACM Conference on Computer and Communications Security 2005: 330-339
[c52]
[c51]Muthian Sivathanu, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, Somesh Jha: A Logic of File Systems. FAST 2005
[c50]Vinod Ganapathy, Sanjit A. Seshia, Somesh Jha, Thomas W. Reps, Randal E. Bryant: Automatic discovery of API-level exploits. ICSE 2005: 312-321
[c49]Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke Lee, Barton P. Miller: Environment-Sensitive Intrusion Detection. RAID 2005: 185-206
[c48]Shai Rubin, Somesh Jha, Barton P. Miller: Language-Based Generation and Evaluation of NIDS Signatures. IEEE Symposium on Security and Privacy 2005: 3-17
[c47]Mihai Christodorescu, Somesh Jha, Sanjit A. Seshia, Dawn Xiaodong Song, Randal E. Bryant: Semantics-Aware Malware Detection. IEEE Symposium on Security and Privacy 2005: 32-46- 2004
[j12]Somesh Jha, Thomas W. Reps: Model checking SPKI/SDSI. Journal of Computer Security 12(3-4): 317-353 (2004)
[j11]Sagar Chaki, Edmund M. Clarke, Alex Groce, Somesh Jha, Helmut Veith: Modular Verification of Software Components in C. IEEE Trans. Software Eng. 30(6): 388-402 (2004)
[c46]Shai Rubin, Somesh Jha, Barton P. Miller: Automatic Generation and Analysis of NIDS Attacks. ACSAC 2004: 28-38
[c45]
[c44]Jonathon T. Giffin, Somesh Jha, Barton P. Miller: Efficient Context-Sensitive Intrusion Detection. NDSS 2004
[c43]Vinod Yegneswaran, Paul Barford, Somesh Jha: Global Intrusion Detection in the DOMINO Overlay System. NDSS 2004
[c42]Hao Wang, Somesh Jha, Miron Livny, Patrick Drew McDaniel: Security Policy Reconciliation in Distributed Computing Environments. POLICY 2004: 137-
[c41]Henry Hanping Feng, Jonathon T. Giffin, Yong Huang, Somesh Jha, Wenke Lee, Barton P. Miller: Formalizing Sensitivity in Static Analysis for Intrusion Detection. IEEE Symposium on Security and Privacy 2004: 194-- 2003
[j10]Edmund M. Clarke, Orna Grumberg, Somesh Jha, Yuan Lu, Helmut Veith: Counterexample-guided abstraction refinement for symbolic model checking. J. ACM 50(5): 752-794 (2003)
[j9]Edmund M. Clarke, Somesh Jha, Wilfredo R. Marrero: Efficient verification of security protocols using partial-order reductions. STTT 4(2): 173-188 (2003)
[c40]Vinod Ganapathy, Somesh Jha, David Chandler, David Melski, David Vitek: Buffer overrun detection using linear programming and static analysis. ACM Conference on Computer and Communications Security 2003: 345-354
[c39]Stefan Schwoon, Somesh Jha, Thomas W. Reps, Stuart G. Stubblebine: On Generalized Authorization Problems. CSFW 2003: 202-
[c38]Sagar Chaki, Edmund M. Clarke, Alex Groce, Somesh Jha, Helmut Veith: Modular Verification of Software Components in C. ICSE 2003: 385-395
[c37]Thomas W. Reps, Stefan Schwoon, Somesh Jha: Weighted Pushdown Systems and Their Application to Interprocedural Dataflow Analysis. SAS 2003: 189-213
[c36]Sagar Chaki, Pascal Fenkam, Harald Gall, Somesh Jha, Engin Kirda, Helmut Veith: Integrating Publish/Subscribe into a Mobile Teamwork Support Platform. SEKE 2003: 510-517- 2002
[c35]
[c34]Somesh Jha, Thomas W. Reps: Analysis of SPKI/SDSI Certificates Using Model Checking. CSFW 2002: 129-
[c33]
[c32]Edmund M. Clarke, Somesh Jha, Yuan Lu, Helmut Veith: Tree-Like Counterexamples in Model Checking. LICS 2002: 19-29
[c31]Oleg Sheyner, Joshua W. Haines, Somesh Jha, Richard Lippmann, Jeannette M. Wing: Automated Generation and Analysis of Attack Graphs. IEEE Symposium on Security and Privacy 2002: 273-284
[c30]Jonathon T. Giffin, Somesh Jha, Barton P. Miller: Detecting Manipulated Remote Call Streams. USENIX Security Symposium 2002: 61-79- 2001
[c29]Pankaj Chauhan, Edmund M. Clarke, Somesh Jha, James H. Kukula, Helmut Veith, Dong Wang: Using Combinatorial Optimization Methods for Quantification Scheduling. CHARME 2001: 293-309
[c28]Somesh Jha, Kymie M. C. Tan, Roy A. Maxion: Markov Chains, Classifiers, and Intrusion Detection. CSFW 2001: 206-219
[c27]Edmund M. Clarke, Orna Grumberg, Somesh Jha, Yuan Lu, Helmut Veith: Progress on the State Explosion Problem in Model Checking. Informatics 2001: 176-194
[c26]Pankaj Chauhan, Edmund M. Clarke, Somesh Jha, James H. Kukula, Thomas R. Shiple, Helmut Veith, Dong Wang: Non-linear Quantification Scheduling in Image Computation. ICCAD 2001: 293-
[c25]
[c24]Alexis Campailla, Sagar Chaki, Edmund M. Clarke, Somesh Jha, Helmut Veith: Efficient Filtering in Publish-Subscribe Systems Using Binary Decision. ICSE 2001: 443-452- 2000
[j8]Edmund M. Clarke, Somesh Jha, Wilfredo R. Marrero: Verifying security protocols with Brutus. ACM Trans. Softw. Eng. Methodol. 9(4): 443-487 (2000)
[c23]Sergey Berezin, Edmund M. Clarke, Somesh Jha, Will Marrero: Model checking algorithms for the µ-calculus. Proof, Language, and Interaction 2000: 309-338
[c22]Edmund M. Clarke, Orna Grumberg, Somesh Jha, Yuan Lu, Helmut Veith: Counterexample-Guided Abstraction Refinement. CAV 2000: 154-169
[c21]Edmund M. Clarke, Somesh Jha, Wilfredo R. Marrero: Partial Order Reductions for Security Protocol Verification. TACAS 2000: 503-518
1990 – 1999
- 1999
[j7]Prasad Chalasani, Somesh Jha, Isaac Saias: Approximate Option Pricing. Algorithmica 25(1): 2-21 (1999)
[c20]Edmund M. Clarke, Somesh Jha, Yuan Lu, Dong Wang: Abstract BDDs: A Technque for Using Abstraction in Model Checking. CHARME 1999: 172-186
[c19]- 1998
[j6]Jürgen Dingel, David Garlan, Somesh Jha, David Notkin: Towards a Formal Treatment of Implicit Invocation Using Rely/Guarantee Reasoning. Formal Asp. Comput. 10(3): 193-213 (1998)
[j5]Daniel Jackson, Somesh Jha, Craig Damon: Isomorph-Free Model Enumeration: A New Method for Checking Relational Specifications. ACM Trans. Program. Lang. Syst. 20(2): 302-343 (1998)
[c18]Prasad Chalasani, Somesh Jha, Onn Shehory, Katia P. Sycara: Query Restart Strategies for Web Agent. Agents 1998: 124-131
[c17]Somesh Jha, Prasad Chalasani, Onn Shehory, Katia P. Sycara: A Formal Treatment of Distributed Matchmaking. Agents 1998: 457-458
[c16]Onn Shehory, Katia P. Sycara, Prasad Chalasani, Somesh Jha: Increasing Resource Utilization and Task Performance by Agent Cloning. ATAL 1998: 413-426
[c15]Edmund M. Clarke, E. Allen Emerson, Somesh Jha, A. Prasad Sistla: Symmetry Reductions inModel Checking. CAV 1998: 147-158
[c14]Prasad Chalasani, Somesh Jha, Onn Shehory, Katia P. Sycara: Strategies for Querying Information Agents. CIA 1998: 94-107
[c13]
[c12]Edmund M. Clarke, Somesh Jha, Wilfredo R. Marrero: Using state space exploration and a natural deduction style message derivation engine to verify security protocols. PROCOMET 1998: 87-106
[c11]David Garlan, Somesh Jha, David Notkin: Reasoning about Implicit Invocation. SIGSOFT FSE 1998: 209-221- 1997
[j4]Anca Browne, Edmund M. Clarke, Somesh Jha, David E. Long, Wilfredo R. Marrero: An Improved Algorithm for the Evaluation of Fixpoint Expressions. Theor. Comput. Sci. 178(1-2): 237-255 (1997)
[j3]Edmund M. Clarke, Orna Grumberg, Somesh Jha: Verifying Parameterized Networks. ACM Trans. Program. Lang. Syst. 19(5): 726-750 (1997)
[c10]Onn Shehory, Katia P. Sycara, Somesh Jha: Multi-Agent Coordination through Coalition Formation. ATAL 1997: 143-154
[c9]Somesh Jha, Yuan Lu, Marius Minea, Edmund M. Clarke: Equivalence Checking Using Abstract BDDs. ICCD 1997: 332-337
[c8]E. Allen Emerson, Somesh Jha, Doron Peled: Combining Partial Order and Symmetry Reductions. TACAS 1997: 19-34- 1996
[j2]Edmund M. Clarke, Somesh Jha, Reinhard Enders, Thomas Filkorn: Exploiting Symmetry in Temporal Logic Model Checking. Formal Methods in System Design 9(1/2): 77-104 (1996)
[c7]
[c6]Daniel Jackson, Somesh Jha, Craig Damon: Faster Checking of Software Specifications by Eliminating Isomorphs. POPL 1996: 79-90
[c5]Craig Damon, Daniel Jackson, Somesh Jha: Checking Relational Specifications With Binary Decision Diagrams. SIGSOFT FSE 1996: 70-80- 1995
[j1]Edmund M. Clarke, Orna Grumberg, Hiromi Hiraishi, Somesh Jha, David E. Long, Kenneth L. McMillan, Linda A. Ness: Verification of the Futurebus+ Cache Coherence Protocol. Formal Methods in System Design 6(2): 217-232 (1995)
[c4]Edmund M. Clarke, Orna Grumberg, Somesh Jha: Veryfying Parameterized Networks using Abstraction and Regular Languages. CONCUR 1995: 395-407
[p1]Edmund M. Clarke, Somesh Jha: Symmetry and Induction in Model Checking. Computer Science Today 1995: 455-470- 1994
[c3]David E. Long, Anca Browne, Edmund M. Clarke, Somesh Jha, Wilfredo R. Marrero: An Improved Algorithm for the Evaluation of Fixpoint Expressions. CAV 1994: 338-350- 1993
[c2]Edmund M. Clarke, Thomas Filkorn, Somesh Jha: Exploiting Symmetry In Temporal Logic Model Checking. CAV 1993: 450-462
[c1]Edmund M. Clarke, Orna Grumberg, Hiromi Hiraishi, Somesh Jha, David E. Long, Kenneth L. McMillan, Linda A. Ness: Verification of the Futurebus+ Cache Coherence Protocol. CHDL 1993: 15-30
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 10:54 CEST by the dblp team



