The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Karthik Pattabiraman: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Long Wang, Karthik Pattabiraman, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Lawrence G. Votta, Christopher A. Vick, Alan Wood
    Modeling Coordinated Checkpointing for Large-Scale Supercomputers. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:812-821 [Conf]
  2. Karthik Pattabiraman, Zbigniew Kalbarczyk, Ravishankar K. Iyer
    Application-Based Metrics for Strategic Placement of Detectors. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:75-82 [Conf]
  3. Shuo Chen, Karthik Pattabiraman, Zbigniew Kalbarczyk, Ravishankar K. Iyer
    Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities by Pointer Taintedness Semantics. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:83-100 [Conf]
  4. Nithin Nakka, Karthik Pattabiraman, Ravishankar K. Iyer
    Processor-Level Selective Replication. [Citation Graph (0, 0)][DBLP]
    DSN, 2007, pp:544-553 [Conf]
  5. Karthik Pattabiraman, Zbigniew Kalbarczyk, Ravishankar K. Iyer
    Automated Derivation of Application-aware Error Detectors using Static Analysis. [Citation Graph (0, 0)][DBLP]
    IOLTS, 2007, pp:211-216 [Conf]

  6. SymPLFIED: Symbolic program-level fault injection and error detection framework. [Citation Graph (, )][DBLP]


  7. Workshop on compiler and architectural techniques for application reliability and security (CATARS). [Citation Graph (, )][DBLP]


  8. An end-to-end approach for the automatic derivation of application-aware error detectors. [Citation Graph (, )][DBLP]


  9. Second workshop on Compiler and Architectural Techniques for Application Reliability and Security (CATARS). [Citation Graph (, )][DBLP]


  10. Dynamic Derivation of Application-Specific Error Detectors and their Implementation in Hardware. [Citation Graph (, )][DBLP]


  11. Detecting and tolerating asymmetric races. [Citation Graph (, )][DBLP]


  12. Discovering Application-Level Insider Attacks Using Symbolic Execution. [Citation Graph (, )][DBLP]


  13. Samurai: protecting critical data in unsafe languages. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002