|
Search the dblp DataBase
Xiangyu Zhang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Sriraman Tallam, Rajiv Gupta, Xiangyu Zhang
Extended Whole Program Paths. [Citation Graph (0, 0)][DBLP] IEEE PACT, 2005, pp:17-26 [Conf]
- Xiangyu Zhang, Haifeng He, Neelam Gupta, Rajiv Gupta
Experimental evaluation of using dynamic slices for fault location. [Citation Graph (0, 0)][DBLP] AADEBUG, 2005, pp:33-42 [Conf]
- Sriraman Tallam, Xiangyu Zhang, Rajiv Gupta
Extending Path Profiling across Loop Backedges and Procedure Boundaries. [Citation Graph (0, 0)][DBLP] CGO, 2004, pp:251-264 [Conf]
- Xiangyu Zhang, Rajiv Gupta
Hiding Program Slices for Software Security. [Citation Graph (0, 0)][DBLP] CGO, 2003, pp:325-336 [Conf]
- Youtao Zhang, Lan Gao, Jun Yang, Xiangyu Zhang, Rajiv Gupta
SENSS: Security Enhancement to Symmetric Shared Memory Multiprocessors. [Citation Graph (0, 0)][DBLP] HPCA, 2005, pp:352-362 [Conf]
- Xiangyu Zhang, Neelam Gupta, Rajiv Gupta
Locating faults through automated predicate switching. [Citation Graph (0, 0)][DBLP] ICSE, 2006, pp:272-281 [Conf]
- Xiangyu Zhang, Rajiv Gupta, Youtao Zhang
Precise Dynamic Slicing Algorithms. [Citation Graph (0, 0)][DBLP] ICSE, 2003, pp:319-329 [Conf]
- Xiangyu Zhang, Rajiv Gupta, Youtao Zhang
Efficient Forward Computation of Dynamic Slices Using Reduced Ordered Binary Decision Diagrams. [Citation Graph (0, 0)][DBLP] ICSE, 2004, pp:502-511 [Conf]
- Neelam Gupta, Haifeng He, Xiangyu Zhang, Rajiv Gupta
Locating faulty code using failure-inducing chops. [Citation Graph (0, 0)][DBLP] ASE, 2005, pp:263-272 [Conf]
- Xiangyu Zhang, Rajiv Gupta
Whole Execution Traces. [Citation Graph (0, 0)][DBLP] MICRO, 2004, pp:105-116 [Conf]
- Xiangyu Zhang, Rajiv Gupta
Cost effective dynamic program slicing. [Citation Graph (0, 0)][DBLP] PLDI, 2004, pp:94-106 [Conf]
- Xiangyu Zhang, Neelam Gupta, Rajiv Gupta
Pruning dynamic slices with confidence. [Citation Graph (0, 0)][DBLP] PLDI, 2006, pp:169-180 [Conf]
- Xiangyu Zhang, Rajiv Gupta
Matching execution histories of program versions. [Citation Graph (0, 0)][DBLP] ESEC/SIGSOFT FSE, 2005, pp:197-206 [Conf]
- Xiangyu Zhang, Sriraman Tallam, Rajiv Gupta
Dynamic slicing long running programs through execution fast forwarding. [Citation Graph (0, 0)][DBLP] SIGSOFT FSE, 2006, pp:81-91 [Conf]
- Xiangyu Zhang, Rajiv Gupta
Whole execution traces and their applications. [Citation Graph (0, 0)][DBLP] TACO, 2005, v:2, n:3, pp:301-334 [Journal]
- Xiangyu Zhang, Rajiv Gupta, Youtao Zhang
Cost and precision tradeoffs of dynamic data slicing algorithms. [Citation Graph (0, 0)][DBLP] ACM Trans. Program. Lang. Syst., 2005, v:27, n:4, pp:631-661 [Journal]
- Bin Xin, Xiangyu Zhang
Efficient online detection of dynamic control dependence. [Citation Graph (0, 0)][DBLP] ISSTA, 2007, pp:185-195 [Conf]
- Sriraman Tallam, Chen Tian, Rajiv Gupta, Xiangyu Zhang
Enabling tracing Of long-running multithreaded programs via dynamic execution reduction. [Citation Graph (0, 0)][DBLP] ISSTA, 2007, pp:207-218 [Conf]
- Xiangyu Zhang, Sriraman Tallam, Neelam Gupta, Rajiv Gupta
Towards locating execution omission errors. [Citation Graph (0, 0)][DBLP] PLDI, 2007, pp:415-424 [Conf]
- Mingwu Zhang, Xiangyu Zhang, Xiang Zhang, Sunil Prabhakar
Tracing Lineage Beyond Relational Operators. [Citation Graph (0, 0)][DBLP] VLDB, 2007, pp:1116-1127 [Conf]
- Xiangyu Zhang, Neelam Gupta, Rajiv Gupta
A study of effectiveness of dynamic slicing in locating real faults. [Citation Graph (0, 0)][DBLP] Empirical Software Engineering, 2007, v:12, n:2, pp:143-160 [Journal]
MapReduce-Based Pattern Finding Algorithm Applied in Motif Detection for Prescription Compatibility Network. [Citation Graph (, )][DBLP]
Analyzing multicore dumps to facilitate concurrency bug reproduction. [Citation Graph (, )][DBLP]
Alchemist: A Transparent Dependence Distance Profiling Infrastructure. [Citation Graph (, )][DBLP]
An efficient multi-dimensional index for cloud data management. [Citation Graph (, )][DBLP]
Avoiding Program Failures Through Safe Execution Perturbations. [Citation Graph (, )][DBLP]
Convicting exploitable software vulnerabilities: An efficient input provenance based approach. [Citation Graph (, )][DBLP]
Algorithms for Automatically Computing the Causal Paths of Failures. [Citation Graph (, )][DBLP]
Precise calling context encoding. [Citation Graph (, )][DBLP]
Matching Control Flow of Program Versions. [Citation Graph (, )][DBLP]
Indexing Noncrashing Failures: A Dynamic Program Slicing-Based Approach. [Citation Graph (, )][DBLP]
Scalable dynamic information flow tracking and its applications. [Citation Graph (, )][DBLP]
Memory slicing. [Citation Graph (, )][DBLP]
Strict control dependence and its effect on dynamic information flow analyses. [Citation Graph (, )][DBLP]
Analyzing concurrency bugs using dual slicing. [Citation Graph (, )][DBLP]
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution. [Citation Graph (, )][DBLP]
Efficient program execution indexing. [Citation Graph (, )][DBLP]
Quasi-static scheduling for safe futures. [Citation Graph (, )][DBLP]
Exploring desktop resources based on user activity analysis. [Citation Graph (, )][DBLP]
Deriving input syntactic structure from execution. [Citation Graph (, )][DBLP]
Search in 0.022secs, Finished in 0.023secs
|