The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

George C. Necula: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. George C. Necula, Peter Lee
    Safe Kernel Extensions Without Run-Time Checking. [Citation Graph (2, 0)][DBLP]
    OSDI, 1996, pp:229-243 [Conf]
  2. George C. Necula
    Proof-Carrying Code. [Citation Graph (1, 0)][DBLP]
    POPL, 1997, pp:106-119 [Conf]
  3. Sumit Gulwani, George C. Necula
    A Randomized Satisfability Procedure for Arithmetic and Uninterpreted Function Symbols. [Citation Graph (0, 0)][DBLP]
    CADE, 2003, pp:167-181 [Conf]
  4. George C. Necula, Peter Lee
    Proof Generation in the Touchstone Theorem Prover. [Citation Graph (0, 0)][DBLP]
    CADE, 2000, pp:25-44 [Conf]
  5. Robert R. Schneck, George C. Necula
    A Gradual Approach to a More Trustworthy, Yet Scalable, Proof-Carrying Code. [Citation Graph (0, 0)][DBLP]
    CADE, 2002, pp:47-62 [Conf]
  6. Ajay Chander, David Espinosa, Nayeem Islam, Peter Lee, George C. Necula
    JVer: A Java Verifier. [Citation Graph (0, 0)][DBLP]
    CAV, 2005, pp:144-147 [Conf]
  7. Christopher Colby, Peter Lee, George C. Necula
    A Proof-Carrying Code Architecture for Java. [Citation Graph (0, 0)][DBLP]
    CAV, 2000, pp:557-560 [Conf]
  8. Thomas A. Henzinger, Ranjit Jhala, Rupak Majumdar, George C. Necula, Grégoire Sutre, Westley Weimer
    Temporal-Safety Proofs for Systems Code. [Citation Graph (0, 0)][DBLP]
    CAV, 2002, pp:526-538 [Conf]
  9. Scott McPeak, George C. Necula
    Data Structure Specifications via Local Equality Axioms. [Citation Graph (0, 0)][DBLP]
    CAV, 2005, pp:476-490 [Conf]
  10. George C. Necula, Sumit Gulwani
    Randomized Algorithms for Program Analysis and Verification. [Citation Graph (0, 0)][DBLP]
    CAV, 2005, pp:1- [Conf]
  11. Jeremy Condit, George C. Necula
    Data Slicing: Separating the Heap into Independent Regions. [Citation Graph (0, 0)][DBLP]
    CC, 2005, pp:172-187 [Conf]
  12. Scott McPeak, George C. Necula
    Elkhound: A Fast, Practical GLR Parser Generator. [Citation Graph (0, 0)][DBLP]
    CC, 2004, pp:73-88 [Conf]
  13. George C. Necula
    Using Dependent Types to Port Type Systems to Low-Level Languages. [Citation Graph (0, 0)][DBLP]
    CC, 2006, pp:1- [Conf]
  14. George C. Necula, Scott McPeak, Shree Prakash Rahul, Westley Weimer
    CIL: Intermediate Language and Tools for Analysis and Transformation of C Programs. [Citation Graph (0, 0)][DBLP]
    CC, 2002, pp:213-228 [Conf]
  15. Nathan Whitehead, Martín Abadi, George C. Necula
    By Reason and Authority: A System for Authorization of Proof-Carrying Code. [Citation Graph (0, 0)][DBLP]
    CSFW, 2004, pp:236-250 [Conf]
  16. Ajay Chander, David Espinosa, Nayeem Islam, Peter Lee, George C. Necula
    Enforcing Resource Bounds via Static Verification of Dynamic Checks. [Citation Graph (0, 0)][DBLP]
    ESOP, 2005, pp:311-325 [Conf]
  17. George C. Necula
    A Scalable Architecture for Proof-Carrying Code. [Citation Graph (0, 0)][DBLP]
    FLOPS, 2001, pp:21-39 [Conf]
  18. Sumit Gulwani, Ashish Tiwari, George C. Necula
    Join Algorithms for the Theory of Uninterpreted Functions. [Citation Graph (0, 0)][DBLP]
    FSTTCS, 2004, pp:311-323 [Conf]
  19. Matthew Harren, George C. Necula
    Lightweight Wrappers for Interfacing with Binary Code in CCured. [Citation Graph (0, 0)][DBLP]
    ISSS, 2003, pp:209-225 [Conf]
  20. George C. Necula, Robert R. Schneck
    Proof-Carrying Code with Untrusted Proof Rules. [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:283-298 [Conf]
  21. George C. Necula, Robert R. Schneck
    A Sound Framework for Untrusted Verification-Condition Generators. [Citation Graph (0, 0)][DBLP]
    LICS, 2003, pp:248-260 [Conf]
  22. George C. Necula, Peter Lee
    Efficient Representation and Validation of Proofs. [Citation Graph (0, 0)][DBLP]
    LICS, 1998, pp:93-104 [Conf]
  23. George C. Necula, Peter Lee
    Safe, Untrusted Agents Using Proof-Carrying Code. [Citation Graph (0, 0)][DBLP]
    Mobile Agents and Security, 1998, pp:61-91 [Conf]
  24. Westley Weimer, George C. Necula
    Finding and preventing run-time error handling mistakes. [Citation Graph (0, 0)][DBLP]
    OOPSLA, 2004, pp:419-431 [Conf]
  25. Úlfar Erlingsson, Martín Abadi, Michael Vrable, Mihai Budiu, George C. Necula
    XFI: Software Guards for System Address Spaces. [Citation Graph (0, 0)][DBLP]
    OSDI, 2006, pp:75-88 [Conf]
  26. Feng Zhou, Jeremy Condit, Zachary R. Anderson, Ilya Bagrak, Robert Ennals, Matthew Harren, George C. Necula, Eric A. Brewer
    SafeDrive: Safe and Recoverable Extensions Using Language-Based Techniques. [Citation Graph (0, 0)][DBLP]
    OSDI, 2006, pp:45-60 [Conf]
  27. Christopher Colby, Peter Lee, George C. Necula, Fred Blau, Mark Plesko, Kenneth Cline
    A certifying compiler for Java. [Citation Graph (0, 0)][DBLP]
    PLDI, 2000, pp:95-107 [Conf]
  28. Jeremy Condit, Matthew Harren, Scott McPeak, George C. Necula, Westley Weimer
    CCured in the real world. [Citation Graph (0, 0)][DBLP]
    PLDI, 2003, pp:232-244 [Conf]
  29. George C. Necula
    Translation validation for an optimizing compiler. [Citation Graph (0, 0)][DBLP]
    PLDI, 2000, pp:83-94 [Conf]
  30. George C. Necula, Peter Lee
    The Design and Implementation of a Certifying Compiler. [Citation Graph (0, 0)][DBLP]
    PLDI, 1998, pp:333-344 [Conf]
  31. George C. Necula, Peter Lee
    The design and implementation of a certifying compiler (with retrospective) [Citation Graph (0, 0)][DBLP]
    Best of PLDI, 1998, pp:612-625 [Conf]
  32. Sumit Gulwani, George C. Necula
    Discovering affine equalities using random interpretation. [Citation Graph (0, 0)][DBLP]
    POPL, 2003, pp:74-84 [Conf]
  33. Sumit Gulwani, George C. Necula
    Global value numbering using random interpretation. [Citation Graph (0, 0)][DBLP]
    POPL, 2004, pp:342-352 [Conf]
  34. Sumit Gulwani, George C. Necula
    Precise interprocedural analysis using random interpretation. [Citation Graph (0, 0)][DBLP]
    POPL, 2005, pp:324-337 [Conf]
  35. George C. Necula, Scott McPeak, Westley Weimer
    CCured: type-safe retrofitting of legacy code. [Citation Graph (0, 0)][DBLP]
    POPL, 2002, pp:128-139 [Conf]
  36. George C. Necula, Shree Prakash Rahul
    Oracle-based checking of untrusted software. [Citation Graph (0, 0)][DBLP]
    POPL, 2001, pp:142-154 [Conf]
  37. George C. Necula
    Proof-carrying code: design, implementation and applications (abstract). [Citation Graph (0, 0)][DBLP]
    PPDP, 2000, pp:175-177 [Conf]
  38. Bor-Yuh Evan Chang, Matthew Harren, George C. Necula
    Analysis of Low-Level Code Using Cooperating Decompilers. [Citation Graph (0, 0)][DBLP]
    SAS, 2006, pp:318-335 [Conf]
  39. Sumit Gulwani, George C. Necula
    A Polynomial-Time Algorithm for Global Value Numbering. [Citation Graph (0, 0)][DBLP]
    SAS, 2004, pp:212-227 [Conf]
  40. Sumit Gulwani, George C. Necula
    Path-Sensitive Analysis for Linear Arithmetic and Uninterpreted Functions. [Citation Graph (0, 0)][DBLP]
    SAS, 2004, pp:328-343 [Conf]
  41. Matthew Harren, George C. Necula
    Using Dependent Types to Certify the Safety of Assembly Code. [Citation Graph (0, 0)][DBLP]
    SAS, 2005, pp:155-170 [Conf]
  42. J. Robert von Behren, Jeremy Condit, Feng Zhou, George C. Necula, Eric A. Brewer
    Capriccio: scalable threads for internet services. [Citation Graph (0, 0)][DBLP]
    SOSP, 2003, pp:268-281 [Conf]
  43. George C. Necula, Peter Lee
    Research on Proof-Carrying Code for Untrusted-Code Security. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:204- [Conf]
  44. Westley Weimer, George C. Necula
    Mining Temporal Specifications for Error Detection. [Citation Graph (0, 0)][DBLP]
    TACAS, 2005, pp:461-476 [Conf]
  45. Bor-Yuh Evan Chang, Adam J. Chlipala, George C. Necula, Robert R. Schneck
    The open verifier framework for foundational verifiers. [Citation Graph (0, 0)][DBLP]
    TLDI, 2005, pp:1-12 [Conf]
  46. Bor-Yuh Evan Chang, Adam J. Chlipala, George C. Necula, Robert R. Schneck
    Type-based verification of assembly language for compiler debugging. [Citation Graph (0, 0)][DBLP]
    TLDI, 2005, pp:91-102 [Conf]
  47. Bor-Yuh Evan Chang, Adam J. Chlipala, George C. Necula
    A Framework for Certified Program Analysis and Its Applications to Mobile-Code Safety. [Citation Graph (0, 0)][DBLP]
    VMCAI, 2006, pp:174-189 [Conf]
  48. Jens Knoop, George C. Necula, Wolf Zimmermann
    Preface. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:132, n:1, pp:1-3 [Journal]
  49. Jens Knoop, George C. Necula, Wolf Zimmermann
    Preface. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:141, n:2, pp:1-3 [Journal]
  50. George C. Necula
    Enforcing Security and Safety with Proof-Carrying Code. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 1999, v:20, n:, pp:- [Journal]
  51. Sumit Gulwani, George C. Necula
    A randomized satisfiability procedure for arithmetic and uninterpreted function symbols. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 2005, v:199, n:1-2, pp:107-131 [Journal]
  52. Sumit Gulwani, George C. Necula
    A polynomial-time algorithm for global value numbering. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 2007, v:64, n:1, pp:97-114 [Journal]
  53. George C. Necula, Jeremy Condit, Matthew Harren, Scott McPeak, Westley Weimer
    CCured: type-safe retrofitting of legacy software. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 2005, v:27, n:3, pp:477-526 [Journal]
  54. Jeremy Condit, Matthew Harren, Zachary R. Anderson, David Gay, George C. Necula
    Dependent Types for Low-Level Programming. [Citation Graph (0, 0)][DBLP]
    ESOP, 2007, pp:520-535 [Conf]
  55. Bor-Yuh Evan Chang, Xavier Rival, George C. Necula
    Shape Analysis with Structural Invariant Checkers. [Citation Graph (0, 0)][DBLP]
    SAS, 2007, pp:384-401 [Conf]
  56. Jens Knoop, George C. Necula, Wolf Zimmermann
    Preface. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:176, n:3, pp:1-2 [Journal]
  57. Ajay Chander, David Espinosa, Nayeem Islam, Peter Lee, George C. Necula
    Enforcing resource bounds via static verification of dynamic checks. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 2007, v:29, n:5, pp:- [Journal]

  58. Beyond Bug-Finding: Sound Program Analysis for Linux. [Citation Graph (, )][DBLP]


Search in 0.023secs, Finished in 0.027secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002