|
Search the dblp DataBase
Nicholas Kidd:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Gogul Balakrishnan, Thomas W. Reps, Nicholas Kidd, Akash Lal, Junghee Lim, David Melski, Radu Gruian, Suan Hsi Yong, Chi-Hua Chen, Tim Teitelbaum
Model Checking x86 Executables with CodeSurfer/x86 and WPDS++. [Citation Graph (0, 0)][DBLP] CAV, 2005, pp:158-163 [Conf]
- Shai Rubin, Mihai Christodorescu, Vinod Ganapathy, Jonathon T. Giffin, Louis Kruger, Hao Wang, Nicholas Kidd
An auctioning reputation system based on anomaly. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2005, pp:270-279 [Conf]
- Mihai Christodorescu, Nicholas Kidd, Wen-Han Goh
String analysis for x86 binaries. [Citation Graph (0, 0)][DBLP] PASTE, 2005, pp:88-95 [Conf]
- Sagar Chaki, Edmund M. Clarke, Nicholas Kidd, Thomas W. Reps, Tayssir Touili
Verifying Concurrent Message-Passing C Programs with Recursive Calls. [Citation Graph (0, 0)][DBLP] TACAS, 2006, pp:334-349 [Conf]
- Akash Lal, Nicholas Kidd, Thomas W. Reps, Tayssir Touili
Abstract Error Projection. [Citation Graph (0, 0)][DBLP] SAS, 2007, pp:200-217 [Conf]
Verifying Information Flow Control over Unbounded Processes. [Citation Graph (, )][DBLP]
Program Analysis Using Weighted Pushdown Systems. [Citation Graph (, )][DBLP]
Language Strength Reduction. [Citation Graph (, )][DBLP]
A Decision Procedure for Detecting Atomicity Violations for Communicating Processes with Locks. [Citation Graph (, )][DBLP]
Interprocedural Analysis of Concurrent Programs Under a Context Bound. [Citation Graph (, )][DBLP]
Finding Concurrency-Related Bugs Using Random Isolation. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs
|