default search action
Scott D. Stoller
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c124]Yanhong A. Liu, Scott D. Stoller:
Tutorial: Consensus Algorithms from Classical to Blockchain: Quickly Program, Configure, Run, and Check. ICDCSW 2024: 1-4 - [c123]Andreas Brandstätter, Scott A. Smolka, Scott D. Stoller, Ashish Tiwari, Radu Grosu:
Flock-Formation Control of Multi-Agent Systems using Imperfect Relative Distance Measurements. ICRA 2024: 12193-12200 - 2023
- [j35]Usama Mehmood, Shouvik Roy, Amol Damare, Radu Grosu, Scott A. Smolka, Scott D. Stoller:
A distributed simplex architecture for multi-agent systems. J. Syst. Archit. 134: 102784 (2023) - [j34]Yanhong A. Liu, Scott D. Stoller, Yi Tong, Bo Lin:
Integrating Logic Rules with Everything Else, Seamlessly. Theory Pract. Log. Program. 23(4): 678-695 (2023) - [c122]Joon-Young Gwak, Priti Prabhakar Wakodikar, Meng Wang, Guanhua Yan, Xiaokui Shu, Scott D. Stoller, Ping Yang:
Debugging Malware Classification Models Based on Event Logs with Explainable AI. ICDM (Workshops) 2023: 939-948 - [c121]Andreas Brandstätter, Scott A. Smolka, Scott D. Stoller, Ashish Tiwari, Radu Grosu:
Multi-Agent Spatial Predictive Control with Application to Drone Flocking. ICRA 2023: 1221-1227 - [c120]Scott D. Stoller:
WebSheets: A New Privacy-Centric Framework for Web Applications. SACMAT 2023: 3-4 - [c119]Yanhong A. Liu, Scott D. Stoller, Yi Tong, K. Tuncay Tekle:
Benchmarking for Integrating Logic Rules with Everything Else. ICLP 2023: 12-26 - [i33]Yanhong A. Liu, Scott D. Stoller, Yi Tong, Bo Lin:
Integrating Logic Rules with Everything Else, Seamlessly. CoRR abs/2305.19202 (2023) - 2022
- [j33]Yanhong A. Liu, Scott D. Stoller:
Recursive rules with aggregation: a simple unified semantics. J. Log. Comput. 32(8): 1659-1693 (2022) - [c118]Andreas Brandstätter, Scott A. Smolka, Scott D. Stoller, Ashish Tiwari, Radu Grosu:
Towards Drone Flocking Using Relative Distance Measurements. ISoLA (3) 2022: 97-109 - [c117]Yanhong A. Liu, Scott D. Stoller:
Recursive Rules with Aggregation: A Simple Unified Semantics. LFCS 2022: 156-179 - [c116]Usama Mehmood, Sanaz Sheikhi, Stanley Bak, Scott A. Smolka, Scott D. Stoller:
The Black-Box Simplex Architecture for Runtime Assurance of Autonomous CPS. NFM 2022: 231-250 - [c115]Amol Damare, Shouvik Roy, Scott A. Smolka, Scott D. Stoller:
A Barrier Certificate-Based Simplex Architecture with Application to Microgrids. RV 2022: 105-123 - [i32]Amol Damare, Shouvik Roy, Scott A. Smolka, Scott D. Stoller:
Runtime-Assured, Real-Time Neural Control of Microgrids. CoRR abs/2202.09710 (2022) - [i31]Andreas Brandstätter, Scott A. Smolka, Scott D. Stoller, Ashish Tiwari, Radu Grosu:
Multi-Agent Spatial Predictive Control with Application to Drone Flocking (Extended Version). CoRR abs/2203.16960 (2022) - [i30]Yanhong A. Liu, Scott D. Stoller, Yi Tong, Bo Lin, K. Tuncay Tekle:
Programming with rules and everything else, seamlessly. CoRR abs/2205.15204 (2022) - 2021
- [j32]Yanhong A. Liu, Scott D. Stoller:
Knowledge of uncertain worlds: programming with logical constraints. J. Log. Comput. 31(1): 193-212 (2021) - [j31]Luca Bortolussi, Francesca Cairoli, Nicola Paoletti, Scott A. Smolka, Scott D. Stoller:
Neural predictive monitoring and a comparison of frequentist and Bayesian approaches. Int. J. Softw. Tools Technol. Transf. 23(4): 615-640 (2021) - [c114]Shouvik Roy, Usama Mehmood, Radu Grosu, Scott A. Smolka, Scott D. Stoller, Ashish Tiwari:
Distributed Control for Flocking Maneuvers via Acceleration-Weighted Neighborhooding. ACC 2021: 2745-2750 - [c113]Usama Mehmood, Scott D. Stoller, Radu Grosu, Scott A. Smolka:
Collision-Free 3D Flocking Using the Distributed Simplex Architecture. Formal Methods in Outer Space 2021: 147-156 - [c112]Usama Mehmood, Stanley Bak, Scott A. Smolka, Scott D. Stoller:
Safe CPS from unsafe controllers. CAADCPS@CPSIoTWeek 2021: 26-28 - [c111]Usama Mehmood, Scott D. Stoller, Radu Grosu, Shouvik Roy, Amol Damare, Scott A. Smolka:
A Distributed Simplex Architecture for Multi-agent Systems. SETTA 2021: 239-257 - [i29]Usama Mehmood, Stanley Bak, Scott A. Smolka, Scott D. Stoller:
Safe CPS from Unsafe Controllers. CoRR abs/2102.12981 (2021) - 2020
- [j30]Yanhong A. Liu, Scott D. Stoller:
Founded semantics and constraint semantics of logic rules. J. Log. Comput. 30(8): 1609-1668 (2020) - [c110]Shouvik Roy, Usama Mehmood, Radu Grosu, Scott A. Smolka, Scott D. Stoller, Ashish Tiwari:
Learning Distributed Controllers for V-Formation. ACSOS 2020: 119-128 - [c109]Usama Mehmood, Shouvik Roy, Radu Grosu, Scott A. Smolka, Scott D. Stoller, Ashish Tiwari:
Neural Flocking: MPC-Based Supervised Learning of Flocking Controllers. FoSSaCS 2020: 1-16 - [c108]Thang Bui, Scott D. Stoller:
Learning Attribute-Based and Relationship-Based Access Control Policies with Unknown Values. ICISS 2020: 23-44 - [c107]Yanhong A. Liu, Scott D. Stoller:
Knowledge of Uncertain Worlds: Programming with Logical Constraints. LFCS 2020: 111-127 - [c106]Dung T. Phan, Radu Grosu, Nils Jansen, Nicola Paoletti, Scott A. Smolka, Scott D. Stoller:
Neural Simplex Architecture. NFM 2020: 97-114 - [c105]Luca Bortolussi, Francesca Cairoli, Nicola Paoletti, Scott A. Smolka, Scott D. Stoller:
Bayesian Neural Predictive Monitoring. OVERLAY 2020: 95-100 - [c104]Yanhong A. Liu, Scott D. Stoller:
Assurance of Distributed Algorithms and Systems: Runtime Checking of Safety and Liveness. RV 2020: 47-66 - [c103]Thang Bui, Scott D. Stoller:
A Decision Tree Learning Approach for Mining Relationship-Based Access Control Policies. SACMAT 2020: 167-178 - [e4]Jorge Lobo, Scott D. Stoller, Peng Liu:
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, SACMAT 2020, Barcelona, Spain, June 10-12, 2020. ACM 2020, ISBN 978-1-4503-7568-9 [contents] - [i28]Shouvik Roy, Usama Mehmood, Radu Grosu, Scott A. Smolka, Scott D. Stoller, Ashish Tiwari:
Learning Distributed Controllers for V-Formation. CoRR abs/2006.00680 (2020) - [i27]Yanhong A. Liu, Scott D. Stoller:
Recursive Rules with Aggregation: A Simple Unified Semantics. CoRR abs/2007.13053 (2020) - [i26]Thang Bui, Scott D. Stoller:
Learning Attribute-Based and Relationship-Based Access Control Policies with Unknown Values. CoRR abs/2008.08444 (2020) - [i25]Yanhong A. Liu, Scott D. Stoller:
Assurance of Distributed Algorithms and Systems: Runtime Checking of Safety and Liveness. CoRR abs/2008.09735 (2020) - [i24]Usama Mehmood, Scott D. Stoller, Radu Grosu, Shouvik Roy, Amol Damare, Scott A. Smolka:
A Distributed Simplex Architecture for Multi-Agent Systems. CoRR abs/2012.10153 (2020)
2010 – 2019
- 2019
- [j29]Thang Bui, Scott D. Stoller, Jiajie Li:
Greedy and evolutionary algorithms for mining relationship-based access control policies. Comput. Secur. 80: 317-333 (2019) - [c102]Luca Bortolussi, Francesca Cairoli, Nicola Paoletti, Scott D. Stoller:
Conformal Predictions for Hybrid System State Classification. From Reactive Systems to Cyber-Physical Systems 2019: 225-241 - [c101]Christopher Kane, Bo Lin, Saksham Chand, Scott D. Stoller, Yanhong A. Liu:
High-Level Cryptographic Abstractions. PLAS@CCS 2019: 31-43 - [c100]Scott D. Stoller, Yanhong A. Liu:
Algorithm Diversity for Resilient Systems. DBSec 2019: 359-378 - [c99]Yanhong A. Liu, Scott D. Stoller:
From Classical to Blockchain Consensus: What Are the Exact Algorithms? PODC 2019: 544-545 - [c98]Yanhong A. Liu, Saksham Chand, Scott D. Stoller:
Moderately Complex Paxos Made Simple: High-Level Executable Specification of Distributed Algorithms. PPDP 2019: 15:1-15:15 - [c97]Luca Bortolussi, Francesca Cairoli, Nicola Paoletti, Scott A. Smolka, Scott D. Stoller:
Neural Predictive Monitoring. RV 2019: 129-147 - [c96]Thang Bui, Scott D. Stoller, Hieu Le:
Efficient and Extensible Policy Mining for Relationship-Based Access Control. SACMAT 2019: 161-172 - [c95]Dung T. Phan, Nicola Paoletti, Timothy Zhang, Radu Grosu, Scott A. Smolka, Scott D. Stoller:
Neural state classification for hybrid systems. SNR 2019: 24-27 - [i23]Thang Bui, Scott D. Stoller, Hieu Le:
Efficient and Extensible Policy Mining for Relationship-Based Access Control. CoRR abs/1903.07530 (2019) - [i22]Scott D. Stoller, Yanhong A. Liu:
Algorithm Diversity for Resilient Systems. CoRR abs/1904.12409 (2019) - [i21]Dung T. Phan, Nicola Paoletti, Radu Grosu, Nils Jansen, Scott A. Smolka, Scott D. Stoller:
Neural Simplex Architecture. CoRR abs/1908.00528 (2019) - [i20]Shouvik Roy, Usama Mehmood, Radu Grosu, Scott A. Smolka, Scott D. Stoller, Ashish Tiwari:
Neural Flocking: MPC-based Supervised Learning of Flocking Controllers. CoRR abs/1908.09813 (2019) - [i19]Thang Bui, Scott D. Stoller:
A Decision Tree Learning Approach for Mining Relationship-Based Access Control Policies. CoRR abs/1909.12095 (2019) - [i18]Yanhong A. Liu, Scott D. Stoller:
Knowledge of Uncertain Worlds: Programming with Logical Constraints. CoRR abs/1910.10346 (2019) - 2018
- [j28]Scott D. Stoller, Thang Bui:
Mining hierarchical temporal roles with multiple metrics. J. Comput. Secur. 26(1): 121-142 (2018) - [c94]Dung T. Phan, Nicola Paoletti, Timothy Zhang, Radu Grosu, Scott A. Smolka, Scott D. Stoller:
Neural State Classification for Hybrid Systems. ATVA 2018: 422-440 - [c93]Thang Bui, Scott D. Stoller, Jiajie Li:
Mining Relationship-Based Access Control Policies from Incomplete and Noisy Data. FPS 2018: 267-284 - [c92]Yanhong A. Liu, Scott D. Stoller:
Founded Semantics and Constraint Semantics of Logic Rules. LFCS 2018: 221-241 - [c91]Usama Mehmood, Nicola Paoletti, Dung T. Phan, Radu Grosu, Shan Lin, Scott D. Stoller, Ashish Tiwari, Junxing Yang, Scott A. Smolka:
Declarative vs rule-based control for flocking dynamics. SAC 2018: 816-823 - [c90]Md Nahid Hossain, Junao Wang, R. Sekar, Scott D. Stoller:
Dependence-Preserving Data Compaction for Scalable Forensic Analysis. USENIX Security Symposium 2018: 1723-1740 - [i17]Md Nahid Hossain, Sadegh M. Milajerdi, Junao Wang, Birhanu Eshete, Rigel Gjomemo, R. Sekar, Scott D. Stoller, V. N. Venkatakrishnan:
SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data. CoRR abs/1801.02062 (2018) - [i16]Dung T. Phan, Nicola Paoletti, Timothy Zhang, Radu Grosu, Scott A. Smolka, Scott D. Stoller:
Neural State Classification for Hybrid Systems. CoRR abs/1807.09901 (2018) - 2017
- [j27]Dung T. Phan, Junxing Yang, Radu Grosu, Scott A. Smolka, Scott D. Stoller:
Collision avoidance for mobile robots with limited sensing and limited information about moving obstacles. Formal Methods Syst. Des. 51(1): 62-86 (2017) - [j26]Yanhong A. Liu, Scott D. Stoller, Bo Lin:
From Clarity to Efficiency for Distributed Algorithms. ACM Trans. Program. Lang. Syst. 39(3): 12:1-12:41 (2017) - [c89]Dung T. Phan, Junxing Yang, Matthew Clark, Radu Grosu, John D. Schierman, Scott A. Smolka, Scott D. Stoller:
A Component-Based Simplex Architecture for High-Assurance Cyber-Physical Systems. ACSD 2017: 49-58 - [c88]Thang Bui, Scott D. Stoller, Shikhar Sharma:
Fast Distributed Evaluation of Stateful Attribute-Based Access Control Policies. DBSec 2017: 101-119 - [c87]Thang Bui, Scott D. Stoller, Jiajie Li:
Mining Relationship-Based Access Control Policies. SACMAT 2017: 239-246 - [c86]Junxing Yang, Md. Ariful Islam, Abhishek Murthy, Scott A. Smolka, Scott D. Stoller:
A Simplex Architecture for Hybrid Systems Using Barrier Certificates. SAFECOMP 2017: 117-131 - [c85]Md Nahid Hossain, Sadegh M. Milajerdi, Junao Wang, Birhanu Eshete, Rigel Gjomemo, R. Sekar, Scott D. Stoller, V. N. Venkatakrishnan:
SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data. USENIX Security Symposium 2017: 487-504 - [i15]Dung T. Phan, Scott A. Smolka, Radu Grosu, Usama Mehmood, Scott D. Stoller, Junxing Yang:
Model Checking Cyber-Physical Systems using Particle Swarm Optimization. CoRR abs/1703.01257 (2017) - [i14]Yanhong A. Liu, Saksham Chand, Scott D. Stoller:
Moderately Complex Paxos Made Simple: High-Level Specification of Distributed Algorithm. CoRR abs/1704.00082 (2017) - [i13]Dung T. Phan, Junxing Yang, Matthew Clark, Radu Grosu, John D. Schierman, Scott A. Smolka, Scott D. Stoller:
A Component-Based Simplex Architecture for High-Assurance Cyber-Physical Systems. CoRR abs/1704.04759 (2017) - [i12]Thang Bui, Scott D. Stoller, Jiajie Li:
Mining Relationship-Based Access Control Policies. CoRR abs/1708.04749 (2017) - [i11]Usama Mehmood, Nicola Paoletti, Dung T. Phan, Radu Grosu, Shan Lin, Scott D. Stoller, Ashish Tiwari, Junxing Yang, Scott A. Smolka:
Declarative vs Rule-based Control for Flocking Dynamics. CoRR abs/1710.10013 (2017) - [i10]Dung T. Phan, Radu Grosu, Nicola Paoletti, Scott A. Smolka, Scott D. Stoller:
How to Learn a Model Checker. CoRR abs/1712.01935 (2017) - 2016
- [c84]Scott D. Stoller, Thang Bui:
Mining Hierarchical Temporal Roles with Multiple Metrics. DBSec 2016: 79-95 - [c83]Saksham Chand, Yanhong A. Liu, Scott D. Stoller:
Formal Verification of Multi-Paxos for Distributed Consensus. FM 2016: 119-136 - [c82]Yanhong A. Liu, Jon Brandvein, Scott D. Stoller, Bo Lin:
Demand-driven incremental object queries. PPDP 2016: 228-241 - [i9]Scott D. Stoller, Thang Bui:
Mining Hierarchical Temporal Roles with Multiple Metrics. CoRR abs/1603.02640 (2016) - [i8]Saksham Chand, Yanhong A. Liu, Scott D. Stoller:
Formal Verification of Multi-Paxos for Distributed Consensus. CoRR abs/1606.01387 (2016) - [i7]Yanhong A. Liu, Scott D. Stoller:
The Founded Semantics and Constraint Semantics of Logic Rules. CoRR abs/1606.06269 (2016) - [i6]Birhanu Eshete, Rigel Gjomemo, Md Nahid Hossain, Sadegh Momeni, R. Sekar, Scott D. Stoller, V. N. Venkatakrishnan, Junao Wang:
Attack Analysis Results for Adversarial Engagement 1 of the DARPA Transparent Computing Program. CoRR abs/1610.06936 (2016) - 2015
- [j25]Ping Yang, Mikhail I. Gofman, Scott D. Stoller, Zijiang Yang:
Policy analysis for administrative role based access control without separate administration. J. Comput. Secur. 23(1): 1-29 (2015) - [j24]Zhongyuan Xu, Scott D. Stoller:
Mining Attribute-Based Access Control Policies. IEEE Trans. Dependable Secur. Comput. 12(5): 533-545 (2015) - [c81]Scott D. Stoller:
An Administrative Model for Relationship-Based Access Control. DBSec 2015: 53-68 - [c80]Dung T. Phan, Junxing Yang, Denise Ratasich, Radu Grosu, Scott A. Smolka, Scott D. Stoller:
Collision Avoidance for Mobile Robots with Limited Sensing and Limited Information About the Environment. RV 2015: 201-215 - [i5]Hung Pham, Scott A. Smolka, Scott D. Stoller, Dung T. Phan, Junxing Yang:
A survey on unmanned aerial vehicle collision avoidance systems. CoRR abs/1508.07723 (2015) - [i4]Yanhong A. Liu, Jon Brandvein, Scott D. Stoller, Bo Lin:
Demand-Driven Incremental Object Queries. CoRR abs/1511.04583 (2015) - 2014
- [j23]Puneet Gupta, Scott D. Stoller, Zhongyuan Xu:
Abductive Analysis of Administrative Policies in Rule-Based Access Control. IEEE Trans. Dependable Secur. Comput. 11(5): 412-424 (2014) - [c79]Zhongyuan Xu, Scott D. Stoller:
Mining Attribute-Based Access Control Policies from Logs. DBSec 2014: 276-291 - [c78]Tushar Deshpande, Panagiotis Katsaros, Scott A. Smolka, Scott D. Stoller:
Stochastic Game-Based Analysis of the DNS Bandwidth Amplification Attack Using Probabilistic Model Checking. EDCC 2014: 226-237 - [c77]Radu Grosu, Doron A. Peled, C. R. Ramakrishnan, Scott A. Smolka, Scott D. Stoller, Junxing Yang:
Compositional Branching-Time Measurements. FPS@ETAPS 2014: 118-128 - [c76]Radu Grosu, Doron A. Peled, C. R. Ramakrishnan, Scott A. Smolka, Scott D. Stoller, Junxing Yang:
Using Statistical Model Checking for Measuring Systems. ISoLA (2) 2014: 223-238 - [i3]Zhongyuan Xu, Scott D. Stoller:
Mining Attribute-Based Access Control Policies from Logs. CoRR abs/1403.5715 (2014) - [i2]Yanhong A. Liu, Scott D. Stoller, Bo Lin:
From Clarity to Efficiency for Distributed Algorithms. CoRR abs/1412.8461 (2014) - 2013
- [c75]Zhongyuan Xu, Scott D. Stoller:
Mining parameterized role-based policies. CODASPY 2013: 255-266 - [c74]Kenan Kalajdzic, Ezio Bartocci, Scott A. Smolka, Scott D. Stoller, Radu Grosu:
Runtime Verification with Particle Filtering. RV 2013: 149-166 - [i1]Zhongyuan Xu, Scott D. Stoller:
Mining Attribute-based Access Control Policies. CoRR abs/1306.2401 (2013) - 2012
- [j22]Justin Seyster, Ketan Dixit, Xiaowan Huang, Radu Grosu, Klaus Havelund, Scott A. Smolka, Scott D. Stoller, Erez Zadok:
InterAspect: aspect-oriented instrumentation with GCC. Formal Methods Syst. Des. 41(3): 295-320 (2012) - [j21]Xiaowan Huang, Justin Seyster, Sean Callanan, Ketan Dixit, Radu Grosu, Scott A. Smolka, Scott D. Stoller, Erez Zadok:
Software monitoring with controllable overhead. Int. J. Softw. Tools Technol. Transf. 14(3): 327-347 (2012) - [c73]Yanhong A. Liu, Scott D. Stoller, Bo Lin, Michael Gorbovitski:
From clarity to efficiency for distributed algorithms. OOPSLA 2012: 395-410 - [c72]Michael Gorbovitski, Yanhong A. Liu, Scott D. Stoller, Tom Rothamel:
Composing transformations for instrumentation and optimization. PEPM 2012: 53-62 - [c71]Ezio Bartocci, Radu Grosu, Atul Karmarkar, Scott A. Smolka, Scott D. Stoller, Erez Zadok, Justin Seyster:
Adaptive Runtime Verification. RV 2012: 168-182 - [c70]Zhongyuan Xu, Scott D. Stoller:
Algorithms for mining meaningful roles. SACMAT 2012: 57-66 - [c69]Yanhong A. Liu, Scott D. Stoller, Bo Lin:
High-Level Executable Specifications of Distributed Algorithms. SSS 2012: 95-110 - 2011
- [j20]Scott D. Stoller, Ping Yang, Mikhail I. Gofman, C. R. Ramakrishnan:
Symbolic reachability analysis for parameterized administrative role-based access control. Comput. Secur. 30(2-3): 148-164 (2011) - [j19]Amit Sasturkar, Ping Yang, Scott D. Stoller, C. R. Ramakrishnan:
Policy analysis for Administrative Role-Based Access Control. Theor. Comput. Sci. 412(44): 6208-6234 (2011) - [c68]Zhichao Li, Radu Grosu, Koundinya Muppalla, Scott A. Smolka, Scott D. Stoller, Erez Zadok:
Model discovery for energy-aware computing systems: An experimental evaluation. IGCC 2011: 1-6 - [c67]Justin Seyster, Prabakar Radhakrishnan, Samriti Katoch, Abhinav Duggal, Scott D. Stoller, Erez Zadok:
Redflag: A Framework for Analysis of Kernel-Level Concurrency. ICA3PP (1) 2011: 66-79 - [c66]Puneet Gupta, Scott D. Stoller, Zhongyuan Xu:
Abductive Analysis of Administrative Policies in Rule-Based Access Control. ICISS 2011: 116-130 - [c65]Scott D. Stoller, Ezio Bartocci, Justin Seyster, Radu Grosu, Klaus Havelund, Scott A. Smolka, Erez Zadok:
Runtime Verification with State Estimation. RV 2011: 193-207 - [c64]Zhichao Li, Radu Grosu, Priya Sehgal, Scott A. Smolka, Scott D. Stoller, Erez Zadok:
On the energy consumption and performance of systems software. SYSTOR 2011: 8 - [r1]Scott D. Stoller:
Trust Management in Databases. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1326-1327 - 2010
- [j18]Rahul Agarwal, Saddek Bensalem, Eitan Farchi, Klaus Havelund, Yarden Nir-Buchbinder, Scott D. Stoller, Shmuel Ur, Liqiang Wang:
Detection of deadlock potentials in multithreaded programs. IBM J. Res. Dev. 54(5): 3 (2010) - [c63]Scott D. Stoller:
Trust management for Web Services. CNSM 2010: 262-265 - [c62]Michael Gorbovitski, Yanhong A. Liu, Scott D. Stoller, Tom Rothamel, K. Tuncay Tekle:
Alias analysis for optimization of dynamic languages. DLS 2010: 27-42 - [c61]Justin Seyster, Ketan Dixit, Xiaowan Huang, Radu Grosu, Klaus Havelund, Scott A. Smolka, Scott D. Stoller, Erez Zadok:
Aspect-Oriented Instrumentation with GCC. RV 2010: 405-420
2000 – 2009
- 2009
- [j17]Yanhong A. Liu, Scott D. Stoller:
From datalog rules to efficient programs with time and space guarantees. ACM Trans. Program. Lang. Syst. 31(6): 21:1-21:38 (2009) - [c60]