|
Search the dblp DataBase
Samik Basu:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Natalia Stakhanova, Samik Basu, Johnny Wong
A Cost-Sensitive Model for Preemptive Intrusion Response Systems. [Citation Graph (0, 0)][DBLP] AINA, 2007, pp:428-435 [Conf]
- Natalia Stakhanova, Samik Basu, Wensheng Zhang, Xia Wang, Johnny Wong
Specification Synthesis for Monitoring and Analysis of MANET Protocols. [Citation Graph (0, 0)][DBLP] AINA Workshops (1), 2007, pp:183-187 [Conf]
- Natalia Stakhanova, Samik Basu, Robyn R. Lutz, Johnny Wong
Automated Caching of Behavioral Patterns for Efficient Run-Time Monitoring. [Citation Graph (0, 0)][DBLP] DASC, 2006, pp:333-340 [Conf]
- Samik Basu, Scott A. Smolka, Orson R. Ward
Model Checking the Java Meta-Locking Algorithm. [Citation Graph (0, 0)][DBLP] ECBS, 2000, pp:342-350 [Conf]
- Jyotishman Pathak, Samik Basu, Robyn R. Lutz, Vasant Honavar
Parallel Web Service Composition in MoSCoE: A Choreography-Based Approach. [Citation Graph (0, 0)][DBLP] ECOWS, 2006, pp:3-12 [Conf]
- Samik Basu, Diptikalyan Saha, Yow-Jian Lin, Scott A. Smolka
Generation of All Counter-Examples for Push-Down Systems. [Citation Graph (0, 0)][DBLP] FORTE, 2003, pp:79-94 [Conf]
- Samik Basu, Diptikalyan Saha, Scott A. Smolka
Localizing Program Errors for Cimple Debugging. [Citation Graph (0, 0)][DBLP] FORTE, 2004, pp:79-96 [Conf]
- Samik Basu, Prem Uppuluri
Proxy-Annotated Control Flow Graphs: Deterministic Context-Sensitive Monitoring for Intrusion Detection. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:353-362 [Conf]
- Natalia Stakhanova, Samik Basu, Johnny Wong, Oleg Stakhanov
Trust Framework for P2P Networks Using Peer-Profile Based Anomaly Technique. [Citation Graph (0, 0)][DBLP] ICDCS Workshops, 2005, pp:203-209 [Conf]
- Jyotishman Pathak, Samik Basu, Robyn R. Lutz, Vasant Honavar
MoSCoE: A Framework for Modeling Web Service Composition and Execution. [Citation Graph (0, 0)][DBLP] ICDE Workshops, 2006, pp:143- [Conf]
- Samik Basu, Madhavan Mukund, C. R. Ramakrishnan, I. V. Ramakrishnan, Rakesh M. Verma
Local and Symbolic Bisimulation Using Tabled Constraint Logic Programming. [Citation Graph (0, 0)][DBLP] ICLP, 2001, pp:166-180 [Conf]
- Prem Uppuluri, Samik Basu
LASE: Layered Approach for Sensor Security and Efficiency. [Citation Graph (0, 0)][DBLP] ICPP Workshops, 2004, pp:346-353 [Conf]
- Jyotishman Pathak, Samik Basu, Vasant Honavar
Modeling Web Services by Iterative Reformulation of Functional and Non-functional Requirements. [Citation Graph (0, 0)][DBLP] ICSOC, 2006, pp:314-326 [Conf]
- Jyotishman Pathak, Samik Basu, Robyn R. Lutz, Vasant Honavar
Selecting and Composing Web Services through Iterative Reformulation of Functional Specifications. [Citation Graph (0, 0)][DBLP] ICTAI, 2006, pp:445-454 [Conf]
- Andrew S. Miner, Samik Basu
Verification of software via integration of design and implementation. [Citation Graph (0, 0)][DBLP] IPDPS, 2006, pp:- [Conf]
- R. Sekar, V. N. Venkatakrishnan, Samik Basu, Sandeep Bhatkar, Daniel C. DuVarney
Model-carrying code: a practical approach for safe execution of untrusted applications. [Citation Graph (0, 0)][DBLP] SOSP, 2003, pp:15-28 [Conf]
- Samik Basu, K. Narayan Kumar, L. Robert Pokorny, C. R. Ramakrishnan
Resource-Constrained Model Checking of Recursive Programs. [Citation Graph (0, 0)][DBLP] TACAS, 2002, pp:236-250 [Conf]
- Samik Basu, C. R. Ramakrishnan
Compositional Analysis for Verification of Parameterized Systems. [Citation Graph (0, 0)][DBLP] TACAS, 2003, pp:315-330 [Conf]
- Curtis W. Keller, Diptikalyan Saha, Samik Basu, Scott A. Smolka
FocusCheck: A Tool for Model Checking and Debugging Sequential C Programs. [Citation Graph (0, 0)][DBLP] TACAS, 2005, pp:563-569 [Conf]
- Ping Yang, Samik Basu, C. R. Ramakrishnan
Parameterized Verification of pi-Calculus Systems. [Citation Graph (0, 0)][DBLP] TACAS, 2006, pp:42-57 [Conf]
- Samik Basu, Partha S. Roop, Roopak Sinha
Local Module Checking for CTL Specifications. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2007, v:176, n:2, pp:125-141 [Journal]
- Samik Basu, C. R. Ramakrishnan
Compositional analysis for verification of parameterized systems. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2006, v:354, n:2, pp:211-229 [Journal]
- Saayan Mitra, Ratnesh Kumar, Samik Basu
Automated Choreographer Synthesis for Web Services Composition Using I/O Automata. [Citation Graph (0, 0)][DBLP] ICWS, 2007, pp:364-371 [Conf]
- Jyotishman Pathak, Samik Basu, Vasant Honavar
On Context-Specific Substitutability of Web Services. [Citation Graph (0, 0)][DBLP] ICWS, 2007, pp:192-199 [Conf]
- Flavian Vasile, Samik Basu
Cost-based Analysis of Multiple Counter-Examples. [Citation Graph (0, 0)][DBLP] SEKE, 2007, pp:33-38 [Conf]
- Samik Basu, Scott A. Smolka
Model checking the Java metalocking algorithm. [Citation Graph (0, 0)][DBLP] ACM Trans. Softw. Eng. Methodol., 2007, v:16, n:3, pp:- [Journal]
Optimum Decentralized Choreography for Web Services Composition. [Citation Graph (, )][DBLP]
Composing Web Services through Automatic Reformulation of Service Specifications. [Citation Graph (, )][DBLP]
Web Service Substitution Based on Preferences Over Non-functional Attributes. [Citation Graph (, )][DBLP]
Dominance Testing via Model Checking. [Citation Graph (, )][DBLP]
Intrusion response cost assessment methodology. [Citation Graph (, )][DBLP]
A Framework for Cost Sensitive Assessment of Intrusion Response Selection. [Citation Graph (, )][DBLP]
Multi-clock Soc design using protocol conversion. [Citation Graph (, )][DBLP]
Approximate Model Checking of PCTL Involving Unbounded Path Properties. [Citation Graph (, )][DBLP]
TCP-Compose* - A TCP-Net Based Algorithm for Efficient Composition of Web Services Using Qualitative Preferences. [Citation Graph (, )][DBLP]
Extending Substitutability in Composite Services by Allowing Asynchronous Communication with Message Buffers. [Citation Graph (, )][DBLP]
A Framework for Optimal Decentralized Service-Choreography. [Citation Graph (, )][DBLP]
A bounded statistical approach for model checking of unbounded until properties. [Citation Graph (, )][DBLP]
Efficient Dominance Testing for Unconditional Preferences. [Citation Graph (, )][DBLP]
On Evaluation of Response Cost for Intrusion Response Systems. [Citation Graph (, )][DBLP]
Cross-Layer Based Anomaly Detection in Wireless Mesh Networks. [Citation Graph (, )][DBLP]
Behavioral automata composition for automatic topology independent verification of parameterized systems. [Citation Graph (, )][DBLP]
Product-line-based requirements customization for web service compositions. [Citation Graph (, )][DBLP]
A Module Checking Based Converter Synthesis Approach for SoCs. [Citation Graph (, )][DBLP]
Local and On-the-fly Choreography-based Web Service Composition. [Citation Graph (, )][DBLP]
On Utilizing Qualitative Preferences in Web Service Composition: A CP-net Based Approach. [Citation Graph (, )][DBLP]
On the symbiosis of specification-based and anomaly-based detection. [Citation Graph (, )][DBLP]
A Model Checking Approach to Protocol Conversion. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.305secs
|