The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Xiangyu Zhang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Sriraman Tallam, Rajiv Gupta, Xiangyu Zhang
    Extended Whole Program Paths. [Citation Graph (0, 0)][DBLP]
    IEEE PACT, 2005, pp:17-26 [Conf]
  2. Xiangyu Zhang, Haifeng He, Neelam Gupta, Rajiv Gupta
    Experimental evaluation of using dynamic slices for fault location. [Citation Graph (0, 0)][DBLP]
    AADEBUG, 2005, pp:33-42 [Conf]
  3. Sriraman Tallam, Xiangyu Zhang, Rajiv Gupta
    Extending Path Profiling across Loop Backedges and Procedure Boundaries. [Citation Graph (0, 0)][DBLP]
    CGO, 2004, pp:251-264 [Conf]
  4. Xiangyu Zhang, Rajiv Gupta
    Hiding Program Slices for Software Security. [Citation Graph (0, 0)][DBLP]
    CGO, 2003, pp:325-336 [Conf]
  5. Youtao Zhang, Lan Gao, Jun Yang, Xiangyu Zhang, Rajiv Gupta
    SENSS: Security Enhancement to Symmetric Shared Memory Multiprocessors. [Citation Graph (0, 0)][DBLP]
    HPCA, 2005, pp:352-362 [Conf]
  6. Xiangyu Zhang, Neelam Gupta, Rajiv Gupta
    Locating faults through automated predicate switching. [Citation Graph (0, 0)][DBLP]
    ICSE, 2006, pp:272-281 [Conf]
  7. Xiangyu Zhang, Rajiv Gupta, Youtao Zhang
    Precise Dynamic Slicing Algorithms. [Citation Graph (0, 0)][DBLP]
    ICSE, 2003, pp:319-329 [Conf]
  8. Xiangyu Zhang, Rajiv Gupta, Youtao Zhang
    Efficient Forward Computation of Dynamic Slices Using Reduced Ordered Binary Decision Diagrams. [Citation Graph (0, 0)][DBLP]
    ICSE, 2004, pp:502-511 [Conf]
  9. Neelam Gupta, Haifeng He, Xiangyu Zhang, Rajiv Gupta
    Locating faulty code using failure-inducing chops. [Citation Graph (0, 0)][DBLP]
    ASE, 2005, pp:263-272 [Conf]
  10. Xiangyu Zhang, Rajiv Gupta
    Whole Execution Traces. [Citation Graph (0, 0)][DBLP]
    MICRO, 2004, pp:105-116 [Conf]
  11. Xiangyu Zhang, Rajiv Gupta
    Cost effective dynamic program slicing. [Citation Graph (0, 0)][DBLP]
    PLDI, 2004, pp:94-106 [Conf]
  12. Xiangyu Zhang, Neelam Gupta, Rajiv Gupta
    Pruning dynamic slices with confidence. [Citation Graph (0, 0)][DBLP]
    PLDI, 2006, pp:169-180 [Conf]
  13. Xiangyu Zhang, Rajiv Gupta
    Matching execution histories of program versions. [Citation Graph (0, 0)][DBLP]
    ESEC/SIGSOFT FSE, 2005, pp:197-206 [Conf]
  14. Xiangyu Zhang, Sriraman Tallam, Rajiv Gupta
    Dynamic slicing long running programs through execution fast forwarding. [Citation Graph (0, 0)][DBLP]
    SIGSOFT FSE, 2006, pp:81-91 [Conf]
  15. Xiangyu Zhang, Rajiv Gupta
    Whole execution traces and their applications. [Citation Graph (0, 0)][DBLP]
    TACO, 2005, v:2, n:3, pp:301-334 [Journal]
  16. Xiangyu Zhang, Rajiv Gupta, Youtao Zhang
    Cost and precision tradeoffs of dynamic data slicing algorithms. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 2005, v:27, n:4, pp:631-661 [Journal]
  17. Bin Xin, Xiangyu Zhang
    Efficient online detection of dynamic control dependence. [Citation Graph (0, 0)][DBLP]
    ISSTA, 2007, pp:185-195 [Conf]
  18. Sriraman Tallam, Chen Tian, Rajiv Gupta, Xiangyu Zhang
    Enabling tracing Of long-running multithreaded programs via dynamic execution reduction. [Citation Graph (0, 0)][DBLP]
    ISSTA, 2007, pp:207-218 [Conf]
  19. Xiangyu Zhang, Sriraman Tallam, Neelam Gupta, Rajiv Gupta
    Towards locating execution omission errors. [Citation Graph (0, 0)][DBLP]
    PLDI, 2007, pp:415-424 [Conf]
  20. Mingwu Zhang, Xiangyu Zhang, Xiang Zhang, Sunil Prabhakar
    Tracing Lineage Beyond Relational Operators. [Citation Graph (0, 0)][DBLP]
    VLDB, 2007, pp:1116-1127 [Conf]
  21. Xiangyu Zhang, Neelam Gupta, Rajiv Gupta
    A study of effectiveness of dynamic slicing in locating real faults. [Citation Graph (0, 0)][DBLP]
    Empirical Software Engineering, 2007, v:12, n:2, pp:143-160 [Journal]

  22. MapReduce-Based Pattern Finding Algorithm Applied in Motif Detection for Prescription Compatibility Network. [Citation Graph (, )][DBLP]


  23. Analyzing multicore dumps to facilitate concurrency bug reproduction. [Citation Graph (, )][DBLP]


  24. Alchemist: A Transparent Dependence Distance Profiling Infrastructure. [Citation Graph (, )][DBLP]


  25. An efficient multi-dimensional index for cloud data management. [Citation Graph (, )][DBLP]


  26. Avoiding Program Failures Through Safe Execution Perturbations. [Citation Graph (, )][DBLP]


  27. Convicting exploitable software vulnerabilities: An efficient input provenance based approach. [Citation Graph (, )][DBLP]


  28. Algorithms for Automatically Computing the Causal Paths of Failures. [Citation Graph (, )][DBLP]


  29. Precise calling context encoding. [Citation Graph (, )][DBLP]


  30. Matching Control Flow of Program Versions. [Citation Graph (, )][DBLP]


  31. Indexing Noncrashing Failures: A Dynamic Program Slicing-Based Approach. [Citation Graph (, )][DBLP]


  32. Scalable dynamic information flow tracking and its applications. [Citation Graph (, )][DBLP]


  33. Memory slicing. [Citation Graph (, )][DBLP]


  34. Strict control dependence and its effect on dynamic information flow analyses. [Citation Graph (, )][DBLP]


  35. Analyzing concurrency bugs using dual slicing. [Citation Graph (, )][DBLP]


  36. Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution. [Citation Graph (, )][DBLP]


  37. Efficient program execution indexing. [Citation Graph (, )][DBLP]


  38. Quasi-static scheduling for safe futures. [Citation Graph (, )][DBLP]


  39. Exploring desktop resources based on user activity analysis. [Citation Graph (, )][DBLP]


  40. Deriving input syntactic structure from execution. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002