default search action
Subodh Sharma 0001
Person information
- affiliation: IIT Delhi, New Delhi, India
Other persons with the same name
- Subodh Sharma 0002 — Kathmandu University, Nepal
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c34]Prashant Agrawal, Mahabir Prasad Jhanwar, Subodh Vishnu Sharma, Subhashis Banerjee:
Publicly Auditable Privacy-Preserving Electoral Rolls. CSF 2024: 217-232 - [c33]Divyanjali Sharma, Subodh Sharma:
Parameterized Static Analysis for Weak Memory Models. ISEC 2024: 25:1-25:4 - [c32]Pankaj Upadhyay, Subodh Sharma, Guangdong Bai:
Symbolic Verification of Mesh Commissioning Protocol of Thread. ISEC 2024: 27:1-27:4 - [i13]Prashant Agrawal, Mahabir Prasad Jhanwar, Subodh Vishnu Sharma, Subhashis Banerjee:
Publicly auditable privacy-preserving electoral rolls. CoRR abs/2402.11582 (2024) - 2023
- [c31]Dhriti Khanna, Subodh Sharma, Rahul Purandare:
Verifying Exception-Handling Code in Concurrent Libraries. APSEC 2023: 405-414 - [c30]Prashant Agrawal, Kabir Tomer, Abhinav Nakarmi, Mahabir Prasad Jhanwar, Subodh Vishnu Sharma, Subhashis Banerjee:
OpenVoting: Recoverability from Failures in Dual Voting. E-Vote-ID 2023: 18-34 - [c29]Tooba Khan, Kumar Madhukar, Subodh Vishnu Sharma:
Efficient Adversarial Input Generation via Neural Net Patching. PRDC 2023: 30-38 - [i12]Pankaj Upadhyay, Subodh Sharma, Guangdong Bai:
Symbolic Security Verification of Mesh Commissioning Protocol in Thread (extended version). CoRR abs/2312.12958 (2023) - [i11]Prashant Agrawal, Abhinav Nakarmi, Mahabir Prasad Jhanwar, Subodh Vishnu Sharma, Subhashis Banerjee:
Traceable mixnets. IACR Cryptol. ePrint Arch. 2023: 1942 (2023) - 2022
- [j3]Ridhi Jain, Rahul Purandare, Subodh Sharma:
BiRD: Race Detection in Software Binaries under Relaxed Memory Models. ACM Trans. Softw. Eng. Methodol. 31(4): 58:1-58:29 (2022) - [c28]Sanjana Singh, Divyanjali Sharma, Ishita Jaju, Subodh Sharma:
Fence Synthesis Under the C11 Memory Model. ATVA 2022: 83-99 - [c27]Rishabh Ranjan, Ishita Agrawal, Subodh Sharma:
Exploiting Epochs and Symmetries in Analysing MPI Programs. ASE 2022: 42:1-42:12 - [c26]Namrata Jain, Kosuke Kaneko, Subodh Sharma:
SKLEE: A Dynamic Symbolic Analysis Tool for Ethereum Smart Contracts (Tool Paper). SEFM 2022: 244-250 - [i10]Sanjiva Prasad, R. Madhukar Yerraguntla, Subodh Sharma:
Secure Information Flow Typing in LUSTRE. CoRR abs/2201.00184 (2022) - [i9]Sanjana Singh, Divyanjali Sharma, Ishita Jaju, Subodh Sharma:
Fence Synthesis under the C11 Memory Model. CoRR abs/2208.00285 (2022) - [i8]Tooba Khan, Kumar Madhukar, Subodh Vishnu Sharma:
Efficient Adversarial Input Generation via Neural Net Patching. CoRR abs/2211.16808 (2022) - 2021
- [c25]Dhriti Khanna, Rahul Purandare, Subodh Sharma:
Synthesizing Multi-threaded Tests from Sequential Traces to Detect Communication Deadlocks. ICST 2021: 1-12 - [c24]Divyanjali Sharma, Subodh Sharma:
Thread-Modular Analysis of Release-Acquire Concurrency. SAS 2021: 384-404 - [c23]Srishti Kulshrestha, Sarthak Agrawal, Devottam Gaurav, Manmohan Chaturvedi, Subodh Sharma, Ranjan Bose:
Development and Validation of Serious Games for Teaching Cybersecurity. JCSG 2021: 247-262 - [c22]Sanjana Singh, Divyanjali Sharma, Subodh Sharma:
Dynamic Verification of C11 Concurrency over Multi Copy Atomics. TASE 2021: 39-46 - [i7]Sanjana Singh, Divyanjali Sharma, Subodh Sharma:
Dynamic Verification of C/C++11 Concurrency over Multi Copy Atomics. CoRR abs/2103.01553 (2021) - [i6]Divyanjali Sharma, Subodh Sharma:
Thread-modular Analysis of Release-Acquire Concurrency. CoRR abs/2107.02346 (2021) - 2020
- [c21]Kosuke Kaneko, Yusuke Tsutsumi, Subodh Sharma, Yoshihiro Okada:
PACKUARIUM: Network Packet Visualization Using Mixed Reality for Detecting Bot IoT Device of DDoS Attack. EIDWT 2020: 361-372 - [c20]Dhriti Khanna, Rahul Purandare, Subodh Sharma:
Verifying and Testing Concurrent Programs using Constraint Solver based Approaches. ICSME 2020: 834-838 - [c19]Sanjiva Prasad, R. Madhukar Yerraguntla, Subodh Sharma:
Security Types for Synchronous Data Flow Systems. MEMOCODE 2020: 1-12 - [i5]Prashant Agrawal, Anubhutie Singh, Malavika Raghavan, Subodh Sharma, Subhashis Banerjee:
An operational architecture for privacy-by-design in public service applications. CoRR abs/2006.04654 (2020)
2010 – 2019
- 2019
- [j2]Subhashis Banerjee, Subodh Sharma:
Privacy concerns with Aadhaar. Commun. ACM 62(11): 80 (2019) - [c18]Johjima Shota, Kosuke Kaneko, Subodh Sharma, Kouichi Sakurai:
Simulation of Secure Volunteer Computing by Using Blockchain. AINA 2019: 883-894 - [c17]Limao Ma, Kosuke Kaneko, Subodh Sharma, Kouichi Sakurai:
Reliable Decentralized Oracle with Mechanisms for Verification and Disputation. CANDAR Workshops 2019: 346-352 - [i4]Prashant Agrawal, Kabir Tomer, Subodh Sharma, Subhashis Banerjee:
A universally verifiable, software independent, bare-handed voting protocol. CoRR abs/1908.09557 (2019) - 2018
- [c16]Dhriti Khanna, Subodh Sharma, César Rodríguez, Rahul Purandare:
Dynamic Symbolic Verification of MPI Programs. FM 2018: 466-484 - [c15]Yuki Nishida, Kosuke Kaneko, Subodh Sharma, Kouichi Sakurai:
Suppressing Chain Size of Blockchain-Based Information Sharing for Swarm Robotic Systems. CANDAR Workshops 2018: 524-528 - [c14]Sukrit Kalra, Seep Goel, Mohan Dhawan, Subodh Sharma:
ZEUS: Analyzing Safety of Smart Contracts. NDSS 2018 - 2017
- [j1]Vojtech Forejt, Saurabh Joshi, Daniel Kroening, Ganesh Narayanaswamy, Subodh Sharma:
Precise Predictive Analysis for Discovering Communication Deadlocks in MPI Programs. ACM Trans. Program. Lang. Syst. 39(4): 15:1-15:27 (2017) - 2016
- [c13]Sukrit Kalra, Ayush Goel, Dhriti Khanna, Mohan Dhawan, Subodh Sharma, Rahul Purandare:
POLLUX: safely upgrading dependent application libraries. SIGSOFT FSE 2016: 290-300 - [c12]Chinmay Narayan, Subodh Vishnu Sharma, Shibashis Guha, S. Arun-Kumar:
From Traces to Proofs: Proving Concurrent Programs Safe. TASE 2016: 152-159 - [i3]Chinmay Narayan, Subodh Sharma, S. Arun-Kumar:
Efficient Verification of Concurrent Programs Over TSO Memory Model. CoRR abs/1606.05435 (2016) - 2015
- [c11]César Rodríguez, Marcelo Sousa, Subodh Sharma, Daniel Kroening:
Unfolding-based Partial Order Reduction. CONCUR 2015: 456-469 - [i2]César Rodríguez, Marcelo Sousa, Subodh Sharma, Daniel Kroening:
Unfolding-based Partial Order Reduction. CoRR abs/1507.00980 (2015) - 2014
- [c10]Vojtech Forejt, Daniel Kroening, Ganesh Narayanaswamy, Subodh Sharma:
Precise Predictive Analysis for Discovering Communication Deadlocks in MPI Programs. FM 2014: 263-278 - [c9]Ajitha Rajan, Subodh Sharma, Peter Schrammel, Daniel Kroening:
Accelerated test execution using GPUs. ASE 2014: 97-102 - [i1]Daniel Kroening, Subodh Sharma, Björn Wachter:
AbPress: Flexing Partial-Order Reduction and Abstraction. CoRR abs/1410.6044 (2014) - 2013
- [b1]Subodh Sharma:
Predictive Analysis of Message Passing Applications. University of Utah, USA, 2013 - 2012
- [c8]Subodh Sharma, Ganesh Gopalakrishnan, Greg Bronevetsky:
A Sound Reduction of Persistent-Sets for Deadlock Detection in MPI Applications. SBMF 2012: 194-209 - [c7]Subodh Sharma, Ganesh Gopalakrishnan, Greg Bronevetsky:
Abstract: MAPPED: Predictive Dynamic Analysis Tool for MPI Applications. SC Companion 2012: 1425-1426 - 2011
- [c6]Subodh Sharma, Ganesh Gopalakrishnan:
Efficient Verification Solutions for Message Passing Systems. IPDPS Workshops 2011: 2026-2029
2000 – 2009
- 2009
- [c5]Subodh Sharma, Ganesh Gopalakrishnan, Eric Mercer, Jim Holt:
MCC: A runtime verification tool for MCAPI user applications. FMCAD 2009: 41-44 - [c4]Subodh Sharma, Ganesh Gopalakrishnan, Eric Mercer:
Dynamic verification of Multicore Communication applications in MCAPI. HLDVT 2009: 100-105 - [c3]Ganesh Gopalakrishnan, Yu Yang, Sarvani S. Vakkalanka, Anh Vo, Sriram Aananthakrishnan, Grzegorz Szubzda, Geoffrey Sawaya, Jason Williams, Subodh Sharma, Michael Delisi, Simone Atzeni:
Some resources for teaching concurrency. PADTAD 2009 - 2008
- [c2]Sarvani S. Vakkalanka, Subodh Sharma, Ganesh Gopalakrishnan, Robert M. Kirby:
ISP: a tool for model checking MPI programs. PPoPP 2008: 285-286 - [c1]Subodh Sharma, Sarvani S. Vakkalanka, Ganesh Gopalakrishnan, Robert M. Kirby, Rajeev Thakur, William Gropp:
A Formal Approach to Detect Functionally Irrelevant Barriers in MPI Programs. PVM/MPI 2008: 265-273
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint