The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Samik Basu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Natalia Stakhanova, Samik Basu, Johnny Wong
    A Cost-Sensitive Model for Preemptive Intrusion Response Systems. [Citation Graph (0, 0)][DBLP]
    AINA, 2007, pp:428-435 [Conf]
  2. Natalia Stakhanova, Samik Basu, Wensheng Zhang, Xia Wang, Johnny Wong
    Specification Synthesis for Monitoring and Analysis of MANET Protocols. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:183-187 [Conf]
  3. Natalia Stakhanova, Samik Basu, Robyn R. Lutz, Johnny Wong
    Automated Caching of Behavioral Patterns for Efficient Run-Time Monitoring. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:333-340 [Conf]
  4. Samik Basu, Scott A. Smolka, Orson R. Ward
    Model Checking the Java Meta-Locking Algorithm. [Citation Graph (0, 0)][DBLP]
    ECBS, 2000, pp:342-350 [Conf]
  5. Jyotishman Pathak, Samik Basu, Robyn R. Lutz, Vasant Honavar
    Parallel Web Service Composition in MoSCoE: A Choreography-Based Approach. [Citation Graph (0, 0)][DBLP]
    ECOWS, 2006, pp:3-12 [Conf]
  6. Samik Basu, Diptikalyan Saha, Yow-Jian Lin, Scott A. Smolka
    Generation of All Counter-Examples for Push-Down Systems. [Citation Graph (0, 0)][DBLP]
    FORTE, 2003, pp:79-94 [Conf]
  7. Samik Basu, Diptikalyan Saha, Scott A. Smolka
    Localizing Program Errors for Cimple Debugging. [Citation Graph (0, 0)][DBLP]
    FORTE, 2004, pp:79-96 [Conf]
  8. Samik Basu, Prem Uppuluri
    Proxy-Annotated Control Flow Graphs: Deterministic Context-Sensitive Monitoring for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:353-362 [Conf]
  9. Natalia Stakhanova, Samik Basu, Johnny Wong, Oleg Stakhanov
    Trust Framework for P2P Networks Using Peer-Profile Based Anomaly Technique. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2005, pp:203-209 [Conf]
  10. Jyotishman Pathak, Samik Basu, Robyn R. Lutz, Vasant Honavar
    MoSCoE: A Framework for Modeling Web Service Composition and Execution. [Citation Graph (0, 0)][DBLP]
    ICDE Workshops, 2006, pp:143- [Conf]
  11. Samik Basu, Madhavan Mukund, C. R. Ramakrishnan, I. V. Ramakrishnan, Rakesh M. Verma
    Local and Symbolic Bisimulation Using Tabled Constraint Logic Programming. [Citation Graph (0, 0)][DBLP]
    ICLP, 2001, pp:166-180 [Conf]
  12. Prem Uppuluri, Samik Basu
    LASE: Layered Approach for Sensor Security and Efficiency. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 2004, pp:346-353 [Conf]
  13. Jyotishman Pathak, Samik Basu, Vasant Honavar
    Modeling Web Services by Iterative Reformulation of Functional and Non-functional Requirements. [Citation Graph (0, 0)][DBLP]
    ICSOC, 2006, pp:314-326 [Conf]
  14. Jyotishman Pathak, Samik Basu, Robyn R. Lutz, Vasant Honavar
    Selecting and Composing Web Services through Iterative Reformulation of Functional Specifications. [Citation Graph (0, 0)][DBLP]
    ICTAI, 2006, pp:445-454 [Conf]
  15. Andrew S. Miner, Samik Basu
    Verification of software via integration of design and implementation. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2006, pp:- [Conf]
  16. R. Sekar, V. N. Venkatakrishnan, Samik Basu, Sandeep Bhatkar, Daniel C. DuVarney
    Model-carrying code: a practical approach for safe execution of untrusted applications. [Citation Graph (0, 0)][DBLP]
    SOSP, 2003, pp:15-28 [Conf]
  17. Samik Basu, K. Narayan Kumar, L. Robert Pokorny, C. R. Ramakrishnan
    Resource-Constrained Model Checking of Recursive Programs. [Citation Graph (0, 0)][DBLP]
    TACAS, 2002, pp:236-250 [Conf]
  18. Samik Basu, C. R. Ramakrishnan
    Compositional Analysis for Verification of Parameterized Systems. [Citation Graph (0, 0)][DBLP]
    TACAS, 2003, pp:315-330 [Conf]
  19. Curtis W. Keller, Diptikalyan Saha, Samik Basu, Scott A. Smolka
    FocusCheck: A Tool for Model Checking and Debugging Sequential C Programs. [Citation Graph (0, 0)][DBLP]
    TACAS, 2005, pp:563-569 [Conf]
  20. Ping Yang, Samik Basu, C. R. Ramakrishnan
    Parameterized Verification of pi-Calculus Systems. [Citation Graph (0, 0)][DBLP]
    TACAS, 2006, pp:42-57 [Conf]
  21. Samik Basu, Partha S. Roop, Roopak Sinha
    Local Module Checking for CTL Specifications. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:176, n:2, pp:125-141 [Journal]
  22. Samik Basu, C. R. Ramakrishnan
    Compositional analysis for verification of parameterized systems. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2006, v:354, n:2, pp:211-229 [Journal]
  23. Saayan Mitra, Ratnesh Kumar, Samik Basu
    Automated Choreographer Synthesis for Web Services Composition Using I/O Automata. [Citation Graph (0, 0)][DBLP]
    ICWS, 2007, pp:364-371 [Conf]
  24. Jyotishman Pathak, Samik Basu, Vasant Honavar
    On Context-Specific Substitutability of Web Services. [Citation Graph (0, 0)][DBLP]
    ICWS, 2007, pp:192-199 [Conf]
  25. Flavian Vasile, Samik Basu
    Cost-based Analysis of Multiple Counter-Examples. [Citation Graph (0, 0)][DBLP]
    SEKE, 2007, pp:33-38 [Conf]
  26. Samik Basu, Scott A. Smolka
    Model checking the Java metalocking algorithm. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Softw. Eng. Methodol., 2007, v:16, n:3, pp:- [Journal]

  27. Optimum Decentralized Choreography for Web Services Composition. [Citation Graph (, )][DBLP]


  28. Composing Web Services through Automatic Reformulation of Service Specifications. [Citation Graph (, )][DBLP]


  29. Web Service Substitution Based on Preferences Over Non-functional Attributes. [Citation Graph (, )][DBLP]


  30. Dominance Testing via Model Checking. [Citation Graph (, )][DBLP]


  31. Intrusion response cost assessment methodology. [Citation Graph (, )][DBLP]


  32. A Framework for Cost Sensitive Assessment of Intrusion Response Selection. [Citation Graph (, )][DBLP]


  33. Multi-clock Soc design using protocol conversion. [Citation Graph (, )][DBLP]


  34. Approximate Model Checking of PCTL Involving Unbounded Path Properties. [Citation Graph (, )][DBLP]


  35. TCP-Compose* - A TCP-Net Based Algorithm for Efficient Composition of Web Services Using Qualitative Preferences. [Citation Graph (, )][DBLP]


  36. Extending Substitutability in Composite Services by Allowing Asynchronous Communication with Message Buffers. [Citation Graph (, )][DBLP]


  37. A Framework for Optimal Decentralized Service-Choreography. [Citation Graph (, )][DBLP]


  38. A bounded statistical approach for model checking of unbounded until properties. [Citation Graph (, )][DBLP]


  39. Efficient Dominance Testing for Unconditional Preferences. [Citation Graph (, )][DBLP]


  40. On Evaluation of Response Cost for Intrusion Response Systems. [Citation Graph (, )][DBLP]


  41. Cross-Layer Based Anomaly Detection in Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  42. Behavioral automata composition for automatic topology independent verification of parameterized systems. [Citation Graph (, )][DBLP]


  43. Product-line-based requirements customization for web service compositions. [Citation Graph (, )][DBLP]


  44. A Module Checking Based Converter Synthesis Approach for SoCs. [Citation Graph (, )][DBLP]


  45. Local and On-the-fly Choreography-based Web Service Composition. [Citation Graph (, )][DBLP]


  46. On Utilizing Qualitative Preferences in Web Service Composition: A CP-net Based Approach. [Citation Graph (, )][DBLP]


  47. On the symbiosis of specification-based and anomaly-based detection. [Citation Graph (, )][DBLP]


  48. A Model Checking Approach to Protocol Conversion. [Citation Graph (, )][DBLP]


Search in 0.108secs, Finished in 0.111secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002