The SCEAS System
Navigation Menu

Search the dblp DataBase


Gleb Naumovich: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Mikhail Sosonkin, Gleb Naumovich, Nasir D. Memon
    Obfuscation of design intent in object-oriented applications. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2003, pp:142-153 [Conf]
  2. Gleb Naumovich, George S. Avrunin, Lori A. Clarke
    An Efficient Algorithm for Computing MHP Information for Concurrent Java Programs. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 1999, pp:338-354 [Conf]
  3. Gleb Naumovich, George S. Avrunin, Lori A. Clarke, Leon J. Osterweil
    Applying Static Analysis to Software Architectures. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 1997, pp:77-93 [Conf]
  4. Gleb Naumovich, George S. Avrunin, Lori A. Clarke
    Data Flow Analysis for Checking Properties of Concurrent Java Programs. [Citation Graph (0, 0)][DBLP]
    ICSE, 1999, pp:399-410 [Conf]
  5. Gleb Naumovich, Lori A. Clarke, Leon J. Osterweil, Matthew B. Dwyer
    Verification of Concurrent Software with FLAVERS. [Citation Graph (0, 0)][DBLP]
    ICSE, 1997, pp:594-595 [Conf]
  6. Vikram Anantapadmanabhan, Phyllis G. Frankl, Nasir D. Memon, Gleb Naumovich
    Design of a Laboratory for Information Security Education. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:61-73 [Conf]
  7. Paolina Centonze, Gleb Naumovich, Stephen J. Fink, Marco Pistoia
    Role-Based access control consistency validation. [Citation Graph (0, 0)][DBLP]
    ISSTA, 2006, pp:121-132 [Conf]
  8. Gleb Naumovich
    A conservative algorithm for computing the flow of permissions in Java programs. [Citation Graph (0, 0)][DBLP]
    ISSTA, 2002, pp:33-43 [Conf]
  9. Gleb Naumovich
    Using the observer design pattern for implementation of data flow analyses. [Citation Graph (0, 0)][DBLP]
    PASTE, 2002, pp:61-68 [Conf]
  10. Gleb Naumovich, Lori A. Clarke, Jamieson M. Cobleigh
    Using Partial Order Techniques to Improve Performance of Data Flow Analysis Based Verification. [Citation Graph (0, 0)][DBLP]
    PASTE, 1999, pp:57-65 [Conf]
  11. Gleb Naumovich, Lori A. Clarke, Leon J. Osterweil
    Efficient Composite Data Flow Analysis Applied to Concurrent Programs. [Citation Graph (0, 0)][DBLP]
    PASTE, 1998, pp:51-58 [Conf]
  12. Aiwu Shi, Gleb Naumovich
    Static Analysis for Computing Escapability and Mutability for Java Components. [Citation Graph (0, 0)][DBLP]
    SCAM, 2005, pp:119-128 [Conf]
  13. Gleb Naumovich, George S. Avrunin
    A Conservative Data Flow Algorithm for Detecting All Pairs of Statement That May Happen in Parallel. [Citation Graph (0, 0)][DBLP]
    SIGSOFT FSE, 1998, pp:24-34 [Conf]
  14. Gleb Naumovich, Lori A. Clarke
    Classifying properties: an alternative to the safety-liveness classification. [Citation Graph (0, 0)][DBLP]
    SIGSOFT FSE, 2000, pp:159-168 [Conf]
  15. Gleb Naumovich, Lori A. Clarke, Leon J. Osterweil
    Verification of Communication Protocols Using Data Flow Analysis. [Citation Graph (0, 0)][DBLP]
    SIGSOFT FSE, 1996, pp:93-105 [Conf]
  16. Gleb Naumovich, Nasir D. Memon
    Preventing Piracy, Reverse Engineering, and Tampering. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2003, v:36, n:7, pp:64-71 [Journal]
  17. Matthew B. Dwyer, Lori A. Clarke, Jamieson M. Cobleigh, Gleb Naumovich
    Flow analysis for verifying properties of concurrent software systems. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Softw. Eng. Methodol., 2004, v:13, n:4, pp:359-430 [Journal]
  18. Aiwu Shi, Gleb Naumovich
    SAFES: A Static Analysis for Field Security in Java Components. [Citation Graph (0, 0)][DBLP]
    SEKE, 2007, pp:302-307 [Conf]

  19. Improving Data Integrity with a Java Mutability Analysis. [Citation Graph (, )][DBLP]

  20. Field Escape Analysis for Data Confidentiality in Java Components. [Citation Graph (, )][DBLP]

  21. JTutor: an Eclipse plug-in suite for creation and replay of code-based tutorials. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002