Search the dblp DataBase
Gleb Naumovich :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Mikhail Sosonkin , Gleb Naumovich , Nasir D. Memon Obfuscation of design intent in object-oriented applications. [Citation Graph (0, 0)][DBLP ] Digital Rights Management Workshop, 2003, pp:142-153 [Conf ] Gleb Naumovich , George S. Avrunin , Lori A. Clarke An Efficient Algorithm for Computing MHP Information for Concurrent Java Programs. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 1999, pp:338-354 [Conf ] Gleb Naumovich , George S. Avrunin , Lori A. Clarke , Leon J. Osterweil Applying Static Analysis to Software Architectures. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 1997, pp:77-93 [Conf ] Gleb Naumovich , George S. Avrunin , Lori A. Clarke Data Flow Analysis for Checking Properties of Concurrent Java Programs. [Citation Graph (0, 0)][DBLP ] ICSE, 1999, pp:399-410 [Conf ] Gleb Naumovich , Lori A. Clarke , Leon J. Osterweil , Matthew B. Dwyer Verification of Concurrent Software with FLAVERS. [Citation Graph (0, 0)][DBLP ] ICSE, 1997, pp:594-595 [Conf ] Vikram Anantapadmanabhan , Phyllis G. Frankl , Nasir D. Memon , Gleb Naumovich Design of a Laboratory for Information Security Education. [Citation Graph (0, 0)][DBLP ] World Conference on Information Security Education, 2003, pp:61-73 [Conf ] Paolina Centonze , Gleb Naumovich , Stephen J. Fink , Marco Pistoia Role-Based access control consistency validation. [Citation Graph (0, 0)][DBLP ] ISSTA, 2006, pp:121-132 [Conf ] Gleb Naumovich A conservative algorithm for computing the flow of permissions in Java programs. [Citation Graph (0, 0)][DBLP ] ISSTA, 2002, pp:33-43 [Conf ] Gleb Naumovich Using the observer design pattern for implementation of data flow analyses. [Citation Graph (0, 0)][DBLP ] PASTE, 2002, pp:61-68 [Conf ] Gleb Naumovich , Lori A. Clarke , Jamieson M. Cobleigh Using Partial Order Techniques to Improve Performance of Data Flow Analysis Based Verification. [Citation Graph (0, 0)][DBLP ] PASTE, 1999, pp:57-65 [Conf ] Gleb Naumovich , Lori A. Clarke , Leon J. Osterweil Efficient Composite Data Flow Analysis Applied to Concurrent Programs. [Citation Graph (0, 0)][DBLP ] PASTE, 1998, pp:51-58 [Conf ] Aiwu Shi , Gleb Naumovich Static Analysis for Computing Escapability and Mutability for Java Components. [Citation Graph (0, 0)][DBLP ] SCAM, 2005, pp:119-128 [Conf ] Gleb Naumovich , George S. Avrunin A Conservative Data Flow Algorithm for Detecting All Pairs of Statement That May Happen in Parallel. [Citation Graph (0, 0)][DBLP ] SIGSOFT FSE, 1998, pp:24-34 [Conf ] Gleb Naumovich , Lori A. Clarke Classifying properties: an alternative to the safety-liveness classification. [Citation Graph (0, 0)][DBLP ] SIGSOFT FSE, 2000, pp:159-168 [Conf ] Gleb Naumovich , Lori A. Clarke , Leon J. Osterweil Verification of Communication Protocols Using Data Flow Analysis. [Citation Graph (0, 0)][DBLP ] SIGSOFT FSE, 1996, pp:93-105 [Conf ] Gleb Naumovich , Nasir D. Memon Preventing Piracy, Reverse Engineering, and Tampering. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2003, v:36, n:7, pp:64-71 [Journal ] Matthew B. Dwyer , Lori A. Clarke , Jamieson M. Cobleigh , Gleb Naumovich Flow analysis for verifying properties of concurrent software systems. [Citation Graph (0, 0)][DBLP ] ACM Trans. Softw. Eng. Methodol., 2004, v:13, n:4, pp:359-430 [Journal ] Aiwu Shi , Gleb Naumovich SAFES: A Static Analysis for Field Security in Java Components. [Citation Graph (0, 0)][DBLP ] SEKE, 2007, pp:302-307 [Conf ] Improving Data Integrity with a Java Mutability Analysis. [Citation Graph (, )][DBLP ] Field Escape Analysis for Data Confidentiality in Java Components. [Citation Graph (, )][DBLP ] JTutor: an Eclipse plug-in suite for creation and replay of code-based tutorials. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.003secs