default search action
Saumya K. Debray
Person information
- affiliation: University of Arizona, Tucson, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c100]Saiful Islam Salim, Rubin Yuchan Yang, Alexander Cooper, Suryashree Ray, Saumya Debray, Sazzadur Rahaman:
Impeding LLM-assisted Cheating in Introductory Programming Assignments via Adversarial Perturbation. EMNLP 2024: 445-463 - [i5]Saiful Islam Salim, Rubin Yuchan Yang, Alexander Cooper, Suryashree Ray, Saumya Debray, Sazzadur Rahaman:
Impeding LLM-assisted Cheating in Introductory Programming Assignments via Adversarial Perturbation. CoRR abs/2410.09318 (2024) - 2023
- [c99]HeuiChan Lim, Saumya Debray:
Automatically Localizing Dynamic Code Generation Bugs in JIT Compiler Back-End. CC 2023: 145-155 - [i4]HeuiChan Lim, Saumya Debray:
Directed Test Program Generation for JIT Compiler Bug Localization. CoRR abs/2307.08885 (2023) - 2022
- [c98]HeuiChan Lim, Xiyu Kang, Saumya Debray:
Modeling code manipulation in JIT compilers. SOAP@PLDI 2022: 9-15 - 2021
- [c97]Ben Jacobsen, Sazzadur Rahaman, Saumya Debray:
Optimization to the Rescue: Evading Binary Code Stylometry with Adversarial Use of Code Optimizations. Checkmate@CCS 2021: 1-10 - [c96]Xiyu Kang, Saumya Debray:
A Framework for Automatic Exploit Generation for JIT Compilers. Checkmate@CCS 2021: 11-19 - [c95]HeuiChan Lim, Saumya Debray:
Automated bug localization in JIT compilers. VEE 2021: 153-164 - 2020
- [c94]Jesse Bartels, Jon Stephens, Saumya Debray:
Representing and Reasoning about Dynamic Code. ASE 2020: 312-323 - [i3]Adarsh Pyarelal, Marco Antonio Valenzuela-Escárcega, Rebecca Sharp, Paul Douglas Hein, Jon Stephens, Pratik Bhandari, HeuiChan Lim, Saumya Debray, Clayton T. Morrison:
AutoMATES: Automated Model Assembly from Text, Equations, and Software. CoRR abs/2001.07295 (2020)
2010 – 2019
- 2019
- [i2]Jesse Bartels, Jon Stephens, Saumya Debray:
Representing and Reasoning about Dynamic Code. CoRR abs/1910.09606 (2019) - 2018
- [c93]Jon Stephens, Babak Yadegari, Christian S. Collberg, Saumya Debray, Carlos Scheidegger:
Probabilistic Obfuscation Through Covert Channels. EuroS&P 2018: 243-257 - 2017
- [c92]Babak Yadegari, Jon Stephens, Saumya Debray:
Analysis of Exception-Based Control Transfers. CODASPY 2017: 205-216 - [c91]Michelle Mills Strout, Saumya Debray, Kate Isaacs, Barbara Kreaseck, Julio Cárdenas-Rodríguez, Bonnie L. Hurwitz, Kat Volk, Sam Badger, Jesse Bartels, Ian J. Bertolacci, Sabin Devkota, Anthony Encinas, Benjamin Gaska, Brandon Neth, Theo Sackos, Jon Stephens, Sarah Willer, Babak Yadegari:
Language-Agnostic Optimization and Parallelization for Interpreted Languages. LCPC 2017: 36-46 - [c90]Babak Yadegari, Saumya Debray:
Control Dependencies in Interpretive Systems. RV 2017: 312-329 - [i1]Sarah Zennou, Saumya K. Debray, Thomas Dullien, Arun Lakhotia:
Malware Analysis: From Large-Scale Data Triage to Targeted Attack Recognition (Dagstuhl Seminar 17281). Dagstuhl Reports 7(7): 44-53 (2017) - 2015
- [j31]Mila Dalla Preda, Roberto Giacobazzi, Saumya K. Debray:
Unveiling metamorphism by abstract interpretation of code properties. Theor. Comput. Sci. 577: 74-97 (2015) - [c89]Babak Yadegari, Saumya Debray:
Symbolic Execution of Obfuscated Code. CCS 2015: 732-744 - [c88]Jing Qiu, Babak Yadegari, Brian Johannesmeyer, Saumya Debray, Xiaohong Su:
Identifying and Understanding Self-Checksumming Defenses in Software. CODASPY 2015: 207-218 - [c87]Babak Yadegari, Brian Johannesmeyer, Ben Whitely, Saumya Debray:
A Generic Approach to Automatic Deobfuscation of Executable Code. IEEE Symposium on Security and Privacy 2015: 674-691 - 2014
- [c86]Jing Qiu, Babak Yadegari, Brian Johannesmeyer, Saumya Debray, Xiaohong Su:
A Framework for Understanding Dynamic Anti-Analysis Defenses. PPREW@ACSAC 2014: 2:1-2:9 - [c85]Babak Yadegari, Saumya Debray:
Bit-Level Taint Analysis. SCAM 2014: 255-264 - 2013
- [c84]Gen Lu, Saumya K. Debray:
Weaknesses in Defenses against Web-Borne Malware - (Short Paper). DIMVA 2013: 139-149 - [c83]Gen Lu, Karan Chadha, Saumya K. Debray:
A simple client-side defense against environment-dependent web-based malware. MALWARE 2013: 124-131 - 2012
- [c82]Rui Zhang, Saumya Debray, Richard T. Snodgrass:
Micro-specialization: dynamic code specialization of database management systems. CGO 2012: 63-73 - [c81]Rui Zhang, Richard T. Snodgrass, Saumya Debray:
Application of Micro-specialization to Query Evaluation Operators. ICDE Workshops 2012: 315-321 - [c80]Rui Zhang, Richard T. Snodgrass, Saumya Debray:
Micro-Specialization in DBMSes. ICDE 2012: 690-701 - [c79]Gen Lu, Kevin Coogan, Saumya K. Debray:
Automatic Simplification of Obfuscated JavaScript Code (Extended Abstract). ICISTM 2012: 348-359 - [c78]Gen Lu, Saumya K. Debray:
Automatic Simplification of Obfuscated JavaScript Code: A Semantics-Based Approach. SERE 2012: 31-40 - 2011
- [c77]Kevin Coogan, Gen Lu, Saumya K. Debray:
Deobfuscation of virtualization-obfuscated software: a semantics-based approach. CCS 2011: 275-284 - [c76]Kevin Coogan, Saumya K. Debray:
Equational Reasoning on x86 Assembly Code. SCAM 2011: 75-84 - 2010
- [c75]Mila Dalla Preda, Roberto Giacobazzi, Saumya K. Debray, Kevin Coogan, Gregg M. Townsend:
Modelling Metamorphism by Abstract Interpretation. SAS 2010: 218-235 - [c74]Saumya K. Debray, Jay Patel:
Reverse Engineering Self-Modifying Code: Unpacker Extraction. WCRE 2010: 131-140
2000 – 2009
- 2009
- [c73]Kevin Coogan, Saumya K. Debray, Tasneem Kaochar, Gregg M. Townsend:
Automatic Static Unpacking of Malware Binaries. WCRE 2009: 167-176 - [c72]Nithya Krishnamoorthy, Saumya K. Debray, Keith Fligg:
Static Detection of Disassembly Errors. WCRE 2009: 259-268 - 2008
- [j30]Mila Dalla Preda, Mihai Christodorescu, Somesh Jha, Saumya K. Debray:
A semantics-based approach to malware detection. ACM Trans. Program. Lang. Syst. 30(5): 25:1-25:54 (2008) - 2007
- [c71]Haifeng He, John Trimble, Somu Perianayagam, Saumya K. Debray, Gregory R. Andrews:
Code Compaction of an Operating System Kernel. CGO 2007: 283-298 - [c70]Haifeng He, Saumya K. Debray, Gregory R. Andrews:
The revenge of the overlay: automatic compaction of OS kernel code via on-demand code loading. EMSOFT 2007: 75-83 - [c69]Mila Dalla Preda, Mihai Christodorescu, Somesh Jha, Saumya K. Debray:
A semantics-based approach to malware detection. POPL 2007: 377-388 - [c68]Igor V. Popov, Saumya K. Debray, Gregory R. Andrews:
Binary Obfuscation Using Signals. USENIX Security Symposium 2007 - 2005
- [j29]Noah Snavely, Saumya K. Debray, Gregory R. Andrews:
Unpredication, Unscheduling, Unspeculation: Reverse Engineering Itanium Executables. IEEE Trans. Software Eng. 31(2): 99-115 (2005) - [c67]Bradley Dux, Anand Iyer, Saumya K. Debray, David Forrester, Stephen G. Kobourov:
Visualizing the Behavior of Dynamically Modifiable Code. IWPC 2005: 337-340 - [c66]Saumya K. Debray:
Code Compression. PADL 2005: 5-6 - [c65]Cullen Linn, Mohan Rajagopalan, Scott Baker, Christian S. Collberg, Saumya K. Debray, John H. Hartman:
Protecting Against Unexpected System Calls. USENIX Security Symposium 2005 - [c64]Sharath K. Udupa, Saumya K. Debray, Matias Madou:
Deobfuscation: Reverse Engineering Obfuscated Code. WCRE 2005: 45-54 - [c63]Matias Madou, Bertrand Anckaert, Patrick Moseley, Saumya K. Debray, Bjorn De Sutter, Koen De Bosschere:
Software Protection Through Dynamic Code Mutation. WISA 2005: 194-206 - 2004
- [c62]Christian S. Collberg, Edward Carter, Saumya K. Debray, Andrew Huntwork, John D. Kececioglu, Cullen Linn, Michael Stepp:
Dynamic path-based software watermarking. PLDI 2004: 107-118 - [c61]Saumya K. Debray:
Writing efficient programs: performance issues in an undergraduate CS curriculum. SIGCSE 2004: 275-279 - 2003
- [j28]Saumya K. Debray, William S. Evans:
Cold code decompression at runtime. Commun. ACM 46(8): 54-60 (2003) - [j27]Manel Fernández, Roger Espasa, Saumya K. Debray:
Load redundancy elimination on executable code. Concurr. Comput. Pract. Exp. 15(10): 979-997 (2003) - [c60]Cullen Linn, Saumya K. Debray:
Obfuscation of executable code to improve resistance to static disassembly. CCS 2003: 290-299 - [c59]Mohan Rajagopalan, Saumya K. Debray, Matti A. Hiltunen, Richard D. Schlichting:
Cassyopia: Compiler Assisted System Optimization. HotOS 2003: 103-108 - [c58]Noah Snavely, Saumya K. Debray, Gregory R. Andrews:
Unspeculation. ASE 2003: 205-214 - [c57]Patrick Moseley, Saumya K. Debray, Gregory R. Andrews:
Checking Program Profiles. SCAM 2003: 193-202 - [c56]Noah Snavely, Saumya K. Debray, Gregory R. Andrews:
Unscheduling, Unpredication, Unspeculation: Reverse Engineering Itanium Executables. WCRE 2003: 4-13 - 2002
- [c55]Saumya K. Debray, William S. Evans:
Profile-Guided Code Compression. PLDI 2002: 95-105 - [c54]Mohan Rajagopalan, Saumya K. Debray, Matti A. Hiltunen, Richard D. Schlichting:
Profile-Directed Optimization of Event-Based Programs. PLDI 2002: 106-116 - [c53]Saumya K. Debray:
Making compiler design relevant for students who will (most likely) never design a compiler. SIGCSE 2002: 341-345 - [c52]Benjamin Schwarz, Saumya K. Debray, Gregory R. Andrews:
Disassembly of Executable Code Revisited. WCRE 2002: 45-54 - 2001
- [j26]Robert Muth, Saumya K. Debray, Scott A. Watterson, Koenraad De Bosschere:
alto: a link-time optimizer for the Compaq Alpha. Softw. Pract. Exp. 31(1): 67-101 (2001) - [c51]Scott A. Watterson, Saumya K. Debray:
Goal-Directed Value Profiling. CC 2001: 319-333 - [c50]Manel Fernández, Roger Espasa, Saumya K. Debray:
Load Redundancy Elimination on Executable Code. Euro-Par 2001: 221-229 - [c49]Bjorn De Sutter, Bruno De Bus, Koenraad De Bosschere, Saumya K. Debray:
Combining Global Code and Data Compaction. LCTES/OM 2001: 29-38 - [c48]Bjorn De Sutter, Bruno De Bus, Koen De Bosschere, Saumya Debray:
Combining Global Code and Data Compaction. OM@PLDI 2001: 29-38 - 2000
- [j25]Saumya K. Debray, William S. Evans, Robert Muth, Bjorn De Sutter:
Compiler techniques for code compaction. ACM Trans. Program. Lang. Syst. 22(2): 378-415 (2000) - [c47]Saumya K. Debray, Timothy J. Hickey:
Constraint-Based Termination Analysis for Cyclic Active Database Rules. Computational Logic 2000: 1121-1136 - [c46]Robert Muth, Saumya K. Debray:
On the Complexity of Flow-Sensitive Dataflow Analyses. POPL 2000: 67-80 - [c45]Robert Muth, Scott A. Watterson, Saumya K. Debray:
Code Specialization Based on Value Profiles. SAS 2000: 340-359
1990 – 1999
- 1999
- [j24]Peter A. Bigot, Saumya K. Debray:
Return Value Placement and Tail Call Optimization in High Level Languages. J. Log. Program. 38(1): 1-29 (1999) - [c44]Saumya K. Debray, Robert Muth, Scott A. Watterson:
Link-Time Improvement of Scheme Programs. CC 1999: 76-90 - [p1]Saumya Debray:
Link-time Optimization of Multi-Language Programs. The Logic Programming Paradigm 1999: 109-126 - 1998
- [c43]Saumya K. Debray, Robert Muth, Matthew Weippert:
Alias Analysis of Executable Code. POPL 1998: 12-24 - 1997
- [j23]Peter A. Bigot, Saumya K. Debray:
A Simple Approach to Supporting Untagged Objects in Dynamically Typed Languages. J. Log. Program. 32(1): 25-47 (1997) - [j22]Saumya K. Debray, Todd A. Proebsting:
Interprocedural Control Flow Analysis of First-Order Programs with Tail-Call Optimization. ACM Trans. Program. Lang. Syst. 19(4): 568-585 (1997) - [c42]Andreas Kågedal, Saumya K. Debray:
A Practical Approach to Structure Reuse of Arrays in Single Assignment Languages. ICLP 1997: 18-32 - [c41]Saumya K. Debray, Pedro López-García, Manuel V. Hermenegildo:
Non-Failure Analysis for Logic Programs. ICLP 1997: 48-62 - [c40]Saumya K. Debray:
Resource-Bounded Partial Evaluation. PEPM 1997: 179-192 - [c39]Saumya K. Debray, Pedro López-García, Manuel V. Hermenegildo, Nai-Wei Lin:
Lower Bound Cost Estimation for Logic Programs. ILPS 1997: 291-305 - [c38]Robert Muth, Saumya K. Debray:
On the Complexity of Function Pointer May-Alias Analysis. TAPSOFT 1997: 381-392 - 1996
- [j21]Saumya K. Debray, David Gudeman, Peter A. Bigot:
Detection and Optimization of Suspension-Free Logic Programs. J. Log. Program. 29(1-3): 171-194 (1996) - [j20]Pedro López-García, Manuel V. Hermenegildo, Saumya K. Debray:
A Methodology for Granularity-Based Control of Parallelism in Logic Programs. J. Symb. Comput. 21(4): 715-734 (1996) - 1995
- [j19]Maurice Bruynooghe, Saumya K. Debray, Manuel V. Hermenegildo, Michael J. Maher:
Guest Editors' Introduction: Special Section: Ten Years of Logic Programming. J. Log. Program. 23(2): 87-88 (1995) - [j18]Roberto Giacobazzi, Saumya K. Debray, Giorgio Levi:
Generalized Semantics and Abstract Interpretation for Constraint Logic Programs. J. Log. Program. 25(3): 191-247 (1995) - [j17]Saumya K. Debray:
On the Complexity of Dataflow Analysis of Logic Programs. ACM Trans. Program. Lang. Syst. 17(2): 331-365 (1995) - [c37]Saumya K. Debray:
Abstract Interpretation and Low-Level Code Optimization. PEPM 1995: 111-121 - [c36]Peter A. Bigot, Saumya K. Debray:
A Simple Approach to Supporting Untagged Objects in Dynamically Typed Languages. ILPS 1995: 257-271 - 1994
- [j16]Saumya K. Debray, Raghu Ramakrishnan:
Abstract Interpretation of Logic Programs using Magic Transformations. J. Log. Program. 18(2): 149-176 (1994) - [j15]Maurice Bruynooghe, Saumya K. Debray, Manuel V. Hermenegildo, Michael J. Maher:
Guest Editor's Introduction. J. Log. Program. 19/20: 1-3 (1994) - [c35]Peter A. Bigot, David Gudeman, Saumya K. Debray:
Output Value Placement in Moded Logic Programs. ICLP 1994: 175-189 - [c34]Pedro López-García, Manuel V. Hermenegildo, Saumya K. Debray:
Towards Granularity Based Control of Parallelism in Logic Programs. PASCO 1994: 133-144 - [c33]Koenraad De Bosschere, Saumya K. Debray, David Gudeman, Sampath Kannan:
Call Forwarding: A Simple Interprocedural Optimization Technique for Dynamically Typed Languages. POPL 1994: 409-420 - [c32]Saumya K. Debray, Pedro López-García, Manuel V. Hermenegildo, Nai-Wei Lin:
Estimating the Computational Cost of Logic Programs. SAS 1994: 255-265 - [c31]Saumya K. Debray, Mudita Jain:
A Simple Program Transformation for Parallelism. ILPS 1994: 305-319 - [c30]Saumya K. Debray, David Gudeman, Peter A. Bigot:
Detection and Optimization of Suspension-free Logic Programs. ILPS 1994: 487-501 - 1993
- [j14]Saumya K. Debray:
QD-Janus: a Sequential Implementation of Janus in Prolog. Softw. Pract. Exp. 23(12): 1337-1360 (1993) - [j13]Mic Bowman, Saumya K. Debray, Larry L. Peterson:
Reasoning About Naming Systems. ACM Trans. Program. Lang. Syst. 15(5): 795-825 (1993) - [j12]Saumya K. Debray, Nai-Wei Lin:
Cost Analysis of Logic Programs. ACM Trans. Program. Lang. Syst. 15(5): 826-875 (1993) - [c29]Roberto Giacobazzi, Giorgio Levi, Saumya K. Debray:
Joining Abstract and Concrete Computations in Constraint Logic Programming. AMAST 1993: 109-126 - [c28]Saumya K. Debray:
Implementing Logic Programming Systems: The Quiche-Eating Approach. ICLP-Workshops on Implementation of Logic Programming Systems 1993: 65-75 - [c27]Saumya K. Debray, Koenraad De Bosschere, David Gudeman:
Call Forwarding: A Simple Low-Level Code Optimization Technique. ICLP-Workshops on Implementation of Logic Programming Systems 1993: 77-88 - [c26]Saumya K. Debray:
On Copy Avoidance in Single Assignment Languages. ICLP 1993: 393-407 - [c25]Michael Codish, Saumya K. Debray, Roberto Giacobazzi:
Compositional Analysis of Modular Logic Programs. POPL 1993: 451-464 - [c24]Saumya K. Debray:
Static Analysis of Logic Programs. ILPS 1993: 43-44 - 1992
- [j11]Saumya K. Debray:
Efficient Dataflow Analysis of Logic Programs. J. ACM 39(4): 949-984 (1992) - [j10]Saumya K. Debray:
A Simple Code Improvement Scheme for Prolog. J. Log. Program. 13(1): 57-88 (1992) - [j9]Saumya K. Debray:
Guest Editor's Introduction. J. Log. Program. 13(2&3): 99-101 (1992) - [j8]Manuel V. Hermenegildo, Richard A. Warren, Saumya K. Debray:
Global Flow Analysis as a Practical Compilation Tool. J. Log. Program. 13(4): 349-366 (1992) - [c23]Roberto Giacobazzi, Saumya K. Debray, Giorgio Levi:
A Generalized Semantics for Constraint Logic Programs. FGCS 1992: 581-591 - [c22]Saumya K. Debray:
On the Complexity of Dataflow Analysis of Logic Programs. ICALP 1992: 509-520 - [c21]David Gudeman, Koenraad De Bosschere, Saumya K. Debray:
jc: An Efficient and Portable Sequential Implementation of Janus. JICSLP 1992: 399-413 - [c20]Saumya K. Debray, Sampath Kannan, Mukul Paithane:
Weighted Decision Trees. JICSLP 1992: 654-668 - [c19]Peter A. Bigot, Saumya K. Debray, Kim Marriott:
Understanding Finiteness Analysis Using Abstract Interpretation. JICSLP 1992: 735-749 - [c18]Saumya K. Debray:
Compiler Optimizations for Low-Level Redundancy Elimination: An Application of Meta-Level Prolog Primitives. META 1992: 120-134 - 1991
- [c17]Saumya K. Debray, Nai-Wei Lin:
Automatic Complexity Analysis of Logic Programs. ICLP 1991: 599-613 - 1990
- [j7]Saumya K. Debray, David Scott Warren:
Towards Banishing the Cut from Prolog. IEEE Trans. Software Eng. 16(3): 335-349 (1990) - [c16]Saumya K. Debray, Nai-Wei Lin:
Static Estimation of Query Sizes in Horn Programs. ICDT 1990: 514-528 - [c15]Saumya K. Debray, Nai-Wei Lin, Manuel V. Hermenegildo:
Task Granularity Analysis in Logic Programs. PLDI 1990: 174-188 - [e1]Saumya K. Debray, Manuel V. Hermenegildo:
Logic Programming, Proceedings of the 1990 North American Conference, Austin, Texas, USA, October 29 - November 1, 1990. MIT Press 1990, ISBN 0-262-54058-4 [contents]
1980 – 1989
- 1989
- [j6]Saumya K. Debray:
Flow Analysis of Dynamic Logic Programs. J. Log. Program. 7(2): 149-176 (1989) - [j5]Saumya K. Debray:
Static Inference of Modes and Data Dependencies in Logic Programs. ACM Trans. Program. Lang. Syst. 11(3): 418-450 (1989) - [j4]Saumya K. Debray, David Scott Warren:
Functional Computations in Logic Programs. ACM Trans. Program. Lang. Syst. 11(3): 451-481 (1989) - [c14]Saumya K. Debray:
A Simple Code Improvement Scheme for Prolog. ICLP 1989: 17-32 - 1988
- [j3]Saumya K. Debray, Prateek Mishra:
Denotational and Operational Semantics for Prolog. J. Log. Program. 5(1): 81-91 (1988) - [j2]Saumya K. Debray, David Scott Warren:
Automatic Mode Inference for Logic Programs. J. Log. Program. 5(3): 207-229 (1988) - [j1]Saumya K. Debray:
Profiling Prolog Programs. Softw. Pract. Exp. 18(9): 821-839 (1988) - [c13]Richard A. Warren, Manuel V. Hermenegildo, Saumya K. Debray:
On the Practicality of Global Flow Analysis of Logic Programs. ICLP/SLP 1988: 684-699 - [c12]Saumya K. Debray:
Static Analysis of Parallel Logic Programs. ICLP/SLP 1988: 711-732 - [c11]Saumya K. Debray:
Unfold/Fold Transformations and Loop Optimization of Logic Programs. PLDI 1988: 297-307 - [c10]Saumya K. Debray:
Efficient Dataflow Analysis of Logic Programs. POPL 1988: 260-273 - 1987
- [c9]Saumya K. Debray, Prateek Mishra:
Denotational and operational semantics for PROLOG. Formal Description of Programming Concepts 1987: 245-274 - [c8]Saumya K. Debray:
Flow Analysis of a Simple Class of Dynamic Logic Programs. SLP 1987: 307-316 - 1986
- [c7]David Scott Warren, Saumya K. Debray:
Detection and Optimization of Functional Computations in Prolog. ICLP 1986: 490-504 - [c6]Saumya K. Debray, David Scott Warren:
Automatic Mode Inference for Prolog Programs. SLP 1986: 78-88 - [c5]Saumya K. Debray:
Register Allocation in a Prolog Machine. SLP 1986: 267-275 - 1985
- [c4]Saumya K. Debray:
Optimizing Almost-Tail-Recursive Prolog Programs. FPCA 1985: 204-219 - 1984
- [c3]Saumya K. Debray, Ariel J. Frank, Scott A. Smolka:
On the Existence and Construction of Robust Communication Protocals for Unreliable Channels. FSTTCS 1984: 136-151 - [c2]Scott A. Smolka, Ariel J. Frank, Saumya K. Debray:
Testing Protocol Robustness the CCS Way. PSTV 1984: 93-108 - [c1]David Scott Warren, Mustaque Ahamad, Saumya K. Debray, Laxmikant V. Kalé:
Executing Distributed Prolog Programs on a Broadcast Network. SLP 1984: 12-21
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-27 20:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint