default search action
Scott D. Stoller
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c124]Yanhong A. Liu, Scott D. Stoller:
Tutorial: Consensus Algorithms from Classical to Blockchain: Quickly Program, Configure, Run, and Check. ICDCSW 2024: 1-4 - [c123]Andreas Brandstätter, Scott A. Smolka, Scott D. Stoller, Ashish Tiwari, Radu Grosu:
Flock-Formation Control of Multi-Agent Systems using Imperfect Relative Distance Measurements. ICRA 2024: 12193-12200 - 2023
- [j35]Usama Mehmood, Shouvik Roy, Amol Damare, Radu Grosu, Scott A. Smolka, Scott D. Stoller:
A distributed simplex architecture for multi-agent systems. J. Syst. Archit. 134: 102784 (2023) - [j34]Yanhong A. Liu, Scott D. Stoller, Yi Tong, Bo Lin:
Integrating Logic Rules with Everything Else, Seamlessly. Theory Pract. Log. Program. 23(4): 678-695 (2023) - [c122]Joon-Young Gwak, Priti Prabhakar Wakodikar, Meng Wang, Guanhua Yan, Xiaokui Shu, Scott D. Stoller, Ping Yang:
Debugging Malware Classification Models Based on Event Logs with Explainable AI. ICDM (Workshops) 2023: 939-948 - [c121]Andreas Brandstätter, Scott A. Smolka, Scott D. Stoller, Ashish Tiwari, Radu Grosu:
Multi-Agent Spatial Predictive Control with Application to Drone Flocking. ICRA 2023: 1221-1227 - [c120]Scott D. Stoller:
WebSheets: A New Privacy-Centric Framework for Web Applications. SACMAT 2023: 3-4 - [c119]Yanhong A. Liu, Scott D. Stoller, Yi Tong, K. Tuncay Tekle:
Benchmarking for Integrating Logic Rules with Everything Else. ICLP 2023: 12-26 - [i33]Yanhong A. Liu, Scott D. Stoller, Yi Tong, Bo Lin:
Integrating Logic Rules with Everything Else, Seamlessly. CoRR abs/2305.19202 (2023) - 2022
- [j33]Yanhong A. Liu, Scott D. Stoller:
Recursive rules with aggregation: a simple unified semantics. J. Log. Comput. 32(8): 1659-1693 (2022) - [c118]Andreas Brandstätter, Scott A. Smolka, Scott D. Stoller, Ashish Tiwari, Radu Grosu:
Towards Drone Flocking Using Relative Distance Measurements. ISoLA (3) 2022: 97-109 - [c117]Yanhong A. Liu, Scott D. Stoller:
Recursive Rules with Aggregation: A Simple Unified Semantics. LFCS 2022: 156-179 - [c116]Usama Mehmood, Sanaz Sheikhi, Stanley Bak, Scott A. Smolka, Scott D. Stoller:
The Black-Box Simplex Architecture for Runtime Assurance of Autonomous CPS. NFM 2022: 231-250 - [c115]Amol Damare, Shouvik Roy, Scott A. Smolka, Scott D. Stoller:
A Barrier Certificate-Based Simplex Architecture with Application to Microgrids. RV 2022: 105-123 - [i32]Amol Damare, Shouvik Roy, Scott A. Smolka, Scott D. Stoller:
Runtime-Assured, Real-Time Neural Control of Microgrids. CoRR abs/2202.09710 (2022) - [i31]Andreas Brandstätter, Scott A. Smolka, Scott D. Stoller, Ashish Tiwari, Radu Grosu:
Multi-Agent Spatial Predictive Control with Application to Drone Flocking (Extended Version). CoRR abs/2203.16960 (2022) - [i30]Yanhong A. Liu, Scott D. Stoller, Yi Tong, Bo Lin, K. Tuncay Tekle:
Programming with rules and everything else, seamlessly. CoRR abs/2205.15204 (2022) - 2021
- [j32]Yanhong A. Liu, Scott D. Stoller:
Knowledge of uncertain worlds: programming with logical constraints. J. Log. Comput. 31(1): 193-212 (2021) - [j31]Luca Bortolussi, Francesca Cairoli, Nicola Paoletti, Scott A. Smolka, Scott D. Stoller:
Neural predictive monitoring and a comparison of frequentist and Bayesian approaches. Int. J. Softw. Tools Technol. Transf. 23(4): 615-640 (2021) - [c114]Shouvik Roy, Usama Mehmood, Radu Grosu, Scott A. Smolka, Scott D. Stoller, Ashish Tiwari:
Distributed Control for Flocking Maneuvers via Acceleration-Weighted Neighborhooding. ACC 2021: 2745-2750 - [c113]Usama Mehmood, Scott D. Stoller, Radu Grosu, Scott A. Smolka:
Collision-Free 3D Flocking Using the Distributed Simplex Architecture. Formal Methods in Outer Space 2021: 147-156 - [c112]Usama Mehmood, Stanley Bak, Scott A. Smolka, Scott D. Stoller:
Safe CPS from unsafe controllers. CAADCPS@CPSIoTWeek 2021: 26-28 - [c111]Usama Mehmood, Scott D. Stoller, Radu Grosu, Shouvik Roy, Amol Damare, Scott A. Smolka:
A Distributed Simplex Architecture for Multi-agent Systems. SETTA 2021: 239-257 - [i29]Usama Mehmood, Stanley Bak, Scott A. Smolka, Scott D. Stoller:
Safe CPS from Unsafe Controllers. CoRR abs/2102.12981 (2021) - 2020
- [j30]Yanhong A. Liu, Scott D. Stoller:
Founded semantics and constraint semantics of logic rules. J. Log. Comput. 30(8): 1609-1668 (2020) - [c110]Shouvik Roy, Usama Mehmood, Radu Grosu, Scott A. Smolka, Scott D. Stoller, Ashish Tiwari:
Learning Distributed Controllers for V-Formation. ACSOS 2020: 119-128 - [c109]Usama Mehmood, Shouvik Roy, Radu Grosu, Scott A. Smolka, Scott D. Stoller, Ashish Tiwari:
Neural Flocking: MPC-Based Supervised Learning of Flocking Controllers. FoSSaCS 2020: 1-16 - [c108]Thang Bui, Scott D. Stoller:
Learning Attribute-Based and Relationship-Based Access Control Policies with Unknown Values. ICISS 2020: 23-44 - [c107]Yanhong A. Liu, Scott D. Stoller:
Knowledge of Uncertain Worlds: Programming with Logical Constraints. LFCS 2020: 111-127 - [c106]Dung T. Phan, Radu Grosu, Nils Jansen, Nicola Paoletti, Scott A. Smolka, Scott D. Stoller:
Neural Simplex Architecture. NFM 2020: 97-114 - [c105]Luca Bortolussi, Francesca Cairoli, Nicola Paoletti, Scott A. Smolka, Scott D. Stoller:
Bayesian Neural Predictive Monitoring. OVERLAY 2020: 95-100 - [c104]Yanhong A. Liu, Scott D. Stoller:
Assurance of Distributed Algorithms and Systems: Runtime Checking of Safety and Liveness. RV 2020: 47-66 - [c103]Thang Bui, Scott D. Stoller:
A Decision Tree Learning Approach for Mining Relationship-Based Access Control Policies. SACMAT 2020: 167-178 - [e4]Jorge Lobo, Scott D. Stoller, Peng Liu:
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, SACMAT 2020, Barcelona, Spain, June 10-12, 2020. ACM 2020, ISBN 978-1-4503-7568-9 [contents] - [i28]Shouvik Roy, Usama Mehmood, Radu Grosu, Scott A. Smolka, Scott D. Stoller, Ashish Tiwari:
Learning Distributed Controllers for V-Formation. CoRR abs/2006.00680 (2020) - [i27]Yanhong A. Liu, Scott D. Stoller:
Recursive Rules with Aggregation: A Simple Unified Semantics. CoRR abs/2007.13053 (2020) - [i26]Thang Bui, Scott D. Stoller:
Learning Attribute-Based and Relationship-Based Access Control Policies with Unknown Values. CoRR abs/2008.08444 (2020) - [i25]Yanhong A. Liu, Scott D. Stoller:
Assurance of Distributed Algorithms and Systems: Runtime Checking of Safety and Liveness. CoRR abs/2008.09735 (2020) - [i24]Usama Mehmood, Scott D. Stoller, Radu Grosu, Shouvik Roy, Amol Damare, Scott A. Smolka:
A Distributed Simplex Architecture for Multi-Agent Systems. CoRR abs/2012.10153 (2020)
2010 – 2019
- 2019
- [j29]Thang Bui, Scott D. Stoller, Jiajie Li:
Greedy and evolutionary algorithms for mining relationship-based access control policies. Comput. Secur. 80: 317-333 (2019) - [c102]Luca Bortolussi, Francesca Cairoli, Nicola Paoletti, Scott D. Stoller:
Conformal Predictions for Hybrid System State Classification. From Reactive Systems to Cyber-Physical Systems 2019: 225-241 - [c101]Christopher Kane, Bo Lin, Saksham Chand, Scott D. Stoller, Yanhong A. Liu:
High-Level Cryptographic Abstractions. PLAS@CCS 2019: 31-43 - [c100]Scott D. Stoller, Yanhong A. Liu:
Algorithm Diversity for Resilient Systems. DBSec 2019: 359-378 - [c99]Yanhong A. Liu, Scott D. Stoller:
From Classical to Blockchain Consensus: What Are the Exact Algorithms? PODC 2019: 544-545 - [c98]Yanhong A. Liu, Saksham Chand, Scott D. Stoller:
Moderately Complex Paxos Made Simple: High-Level Executable Specification of Distributed Algorithms. PPDP 2019: 15:1-15:15 - [c97]Luca Bortolussi, Francesca Cairoli, Nicola Paoletti, Scott A. Smolka, Scott D. Stoller:
Neural Predictive Monitoring. RV 2019: 129-147 - [c96]Thang Bui, Scott D. Stoller, Hieu Le:
Efficient and Extensible Policy Mining for Relationship-Based Access Control. SACMAT 2019: 161-172 - [c95]Dung T. Phan, Nicola Paoletti, Timothy Zhang, Radu Grosu, Scott A. Smolka, Scott D. Stoller:
Neural state classification for hybrid systems. SNR 2019: 24-27 - [i23]Thang Bui, Scott D. Stoller, Hieu Le:
Efficient and Extensible Policy Mining for Relationship-Based Access Control. CoRR abs/1903.07530 (2019) - [i22]Scott D. Stoller, Yanhong A. Liu:
Algorithm Diversity for Resilient Systems. CoRR abs/1904.12409 (2019) - [i21]Dung T. Phan, Nicola Paoletti, Radu Grosu, Nils Jansen, Scott A. Smolka, Scott D. Stoller:
Neural Simplex Architecture. CoRR abs/1908.00528 (2019) - [i20]Shouvik Roy, Usama Mehmood, Radu Grosu, Scott A. Smolka, Scott D. Stoller, Ashish Tiwari:
Neural Flocking: MPC-based Supervised Learning of Flocking Controllers. CoRR abs/1908.09813 (2019) - [i19]Thang Bui, Scott D. Stoller:
A Decision Tree Learning Approach for Mining Relationship-Based Access Control Policies. CoRR abs/1909.12095 (2019) - [i18]Yanhong A. Liu, Scott D. Stoller:
Knowledge of Uncertain Worlds: Programming with Logical Constraints. CoRR abs/1910.10346 (2019) - 2018
- [j28]Scott D. Stoller, Thang Bui:
Mining hierarchical temporal roles with multiple metrics. J. Comput. Secur. 26(1): 121-142 (2018) - [c94]Dung T. Phan, Nicola Paoletti, Timothy Zhang, Radu Grosu, Scott A. Smolka, Scott D. Stoller:
Neural State Classification for Hybrid Systems. ATVA 2018: 422-440 - [c93]Thang Bui, Scott D. Stoller, Jiajie Li:
Mining Relationship-Based Access Control Policies from Incomplete and Noisy Data. FPS 2018: 267-284 - [c92]Yanhong A. Liu, Scott D. Stoller:
Founded Semantics and Constraint Semantics of Logic Rules. LFCS 2018: 221-241 - [c91]Usama Mehmood, Nicola Paoletti, Dung T. Phan, Radu Grosu, Shan Lin, Scott D. Stoller, Ashish Tiwari, Junxing Yang, Scott A. Smolka:
Declarative vs rule-based control for flocking dynamics. SAC 2018: 816-823 - [c90]Md Nahid Hossain, Junao Wang, R. Sekar, Scott D. Stoller:
Dependence-Preserving Data Compaction for Scalable Forensic Analysis. USENIX Security Symposium 2018: 1723-1740 - [i17]Md Nahid Hossain, Sadegh M. Milajerdi, Junao Wang, Birhanu Eshete, Rigel Gjomemo, R. Sekar, Scott D. Stoller, V. N. Venkatakrishnan:
SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data. CoRR abs/1801.02062 (2018) - [i16]Dung T. Phan, Nicola Paoletti, Timothy Zhang, Radu Grosu, Scott A. Smolka, Scott D. Stoller:
Neural State Classification for Hybrid Systems. CoRR abs/1807.09901 (2018) - 2017
- [j27]Dung T. Phan, Junxing Yang, Radu Grosu, Scott A. Smolka, Scott D. Stoller:
Collision avoidance for mobile robots with limited sensing and limited information about moving obstacles. Formal Methods Syst. Des. 51(1): 62-86 (2017) - [j26]Yanhong A. Liu, Scott D. Stoller, Bo Lin:
From Clarity to Efficiency for Distributed Algorithms. ACM Trans. Program. Lang. Syst. 39(3): 12:1-12:41 (2017) - [c89]Dung T. Phan, Junxing Yang, Matthew Clark, Radu Grosu, John D. Schierman, Scott A. Smolka, Scott D. Stoller:
A Component-Based Simplex Architecture for High-Assurance Cyber-Physical Systems. ACSD 2017: 49-58 - [c88]Thang Bui, Scott D. Stoller, Shikhar Sharma:
Fast Distributed Evaluation of Stateful Attribute-Based Access Control Policies. DBSec 2017: 101-119 - [c87]Thang Bui, Scott D. Stoller, Jiajie Li:
Mining Relationship-Based Access Control Policies. SACMAT 2017: 239-246 - [c86]Junxing Yang, Md. Ariful Islam, Abhishek Murthy, Scott A. Smolka, Scott D. Stoller:
A Simplex Architecture for Hybrid Systems Using Barrier Certificates. SAFECOMP 2017: 117-131 - [c85]Md Nahid Hossain, Sadegh M. Milajerdi, Junao Wang, Birhanu Eshete, Rigel Gjomemo, R. Sekar, Scott D. Stoller, V. N. Venkatakrishnan:
SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data. USENIX Security Symposium 2017: 487-504 - [i15]Dung T. Phan, Scott A. Smolka, Radu Grosu, Usama Mehmood, Scott D. Stoller, Junxing Yang:
Model Checking Cyber-Physical Systems using Particle Swarm Optimization. CoRR abs/1703.01257 (2017) - [i14]Yanhong A. Liu, Saksham Chand, Scott D. Stoller:
Moderately Complex Paxos Made Simple: High-Level Specification of Distributed Algorithm. CoRR abs/1704.00082 (2017) - [i13]Dung T. Phan, Junxing Yang, Matthew Clark, Radu Grosu, John D. Schierman, Scott A. Smolka, Scott D. Stoller:
A Component-Based Simplex Architecture for High-Assurance Cyber-Physical Systems. CoRR abs/1704.04759 (2017) - [i12]Thang Bui, Scott D. Stoller, Jiajie Li:
Mining Relationship-Based Access Control Policies. CoRR abs/1708.04749 (2017) - [i11]Usama Mehmood, Nicola Paoletti, Dung T. Phan, Radu Grosu, Shan Lin, Scott D. Stoller, Ashish Tiwari, Junxing Yang, Scott A. Smolka:
Declarative vs Rule-based Control for Flocking Dynamics. CoRR abs/1710.10013 (2017) - [i10]Dung T. Phan, Radu Grosu, Nicola Paoletti, Scott A. Smolka, Scott D. Stoller:
How to Learn a Model Checker. CoRR abs/1712.01935 (2017) - 2016
- [c84]Scott D. Stoller, Thang Bui:
Mining Hierarchical Temporal Roles with Multiple Metrics. DBSec 2016: 79-95 - [c83]Saksham Chand, Yanhong A. Liu, Scott D. Stoller:
Formal Verification of Multi-Paxos for Distributed Consensus. FM 2016: 119-136 - [c82]Yanhong A. Liu, Jon Brandvein, Scott D. Stoller, Bo Lin:
Demand-driven incremental object queries. PPDP 2016: 228-241 - [i9]Scott D. Stoller, Thang Bui:
Mining Hierarchical Temporal Roles with Multiple Metrics. CoRR abs/1603.02640 (2016) - [i8]Saksham Chand, Yanhong A. Liu, Scott D. Stoller:
Formal Verification of Multi-Paxos for Distributed Consensus. CoRR abs/1606.01387 (2016) - [i7]Yanhong A. Liu, Scott D. Stoller:
The Founded Semantics and Constraint Semantics of Logic Rules. CoRR abs/1606.06269 (2016) - [i6]Birhanu Eshete, Rigel Gjomemo, Md Nahid Hossain, Sadegh Momeni, R. Sekar, Scott D. Stoller, V. N. Venkatakrishnan, Junao Wang:
Attack Analysis Results for Adversarial Engagement 1 of the DARPA Transparent Computing Program. CoRR abs/1610.06936 (2016) - 2015
- [j25]Ping Yang, Mikhail I. Gofman, Scott D. Stoller, Zijiang Yang:
Policy analysis for administrative role based access control without separate administration. J. Comput. Secur. 23(1): 1-29 (2015) - [j24]Zhongyuan Xu, Scott D. Stoller:
Mining Attribute-Based Access Control Policies. IEEE Trans. Dependable Secur. Comput. 12(5): 533-545 (2015) - [c81]Scott D. Stoller:
An Administrative Model for Relationship-Based Access Control. DBSec 2015: 53-68 - [c80]Dung T. Phan, Junxing Yang, Denise Ratasich, Radu Grosu, Scott A. Smolka, Scott D. Stoller:
Collision Avoidance for Mobile Robots with Limited Sensing and Limited Information About the Environment. RV 2015: 201-215 - [i5]Hung Pham, Scott A. Smolka, Scott D. Stoller, Dung T. Phan, Junxing Yang:
A survey on unmanned aerial vehicle collision avoidance systems. CoRR abs/1508.07723 (2015) - [i4]Yanhong A. Liu, Jon Brandvein, Scott D. Stoller, Bo Lin:
Demand-Driven Incremental Object Queries. CoRR abs/1511.04583 (2015) - 2014
- [j23]Puneet Gupta, Scott D. Stoller, Zhongyuan Xu:
Abductive Analysis of Administrative Policies in Rule-Based Access Control. IEEE Trans. Dependable Secur. Comput. 11(5): 412-424 (2014) - [c79]Zhongyuan Xu, Scott D. Stoller:
Mining Attribute-Based Access Control Policies from Logs. DBSec 2014: 276-291 - [c78]Tushar Deshpande, Panagiotis Katsaros, Scott A. Smolka, Scott D. Stoller:
Stochastic Game-Based Analysis of the DNS Bandwidth Amplification Attack Using Probabilistic Model Checking. EDCC 2014: 226-237 - [c77]Radu Grosu, Doron A. Peled, C. R. Ramakrishnan, Scott A. Smolka, Scott D. Stoller, Junxing Yang:
Compositional Branching-Time Measurements. FPS@ETAPS 2014: 118-128 - [c76]Radu Grosu, Doron A. Peled, C. R. Ramakrishnan, Scott A. Smolka, Scott D. Stoller, Junxing Yang:
Using Statistical Model Checking for Measuring Systems. ISoLA (2) 2014: 223-238 - [i3]Zhongyuan Xu, Scott D. Stoller:
Mining Attribute-Based Access Control Policies from Logs. CoRR abs/1403.5715 (2014) - [i2]Yanhong A. Liu, Scott D. Stoller, Bo Lin:
From Clarity to Efficiency for Distributed Algorithms. CoRR abs/1412.8461 (2014) - 2013
- [c75]Zhongyuan Xu, Scott D. Stoller:
Mining parameterized role-based policies. CODASPY 2013: 255-266 - [c74]Kenan Kalajdzic, Ezio Bartocci, Scott A. Smolka, Scott D. Stoller, Radu Grosu:
Runtime Verification with Particle Filtering. RV 2013: 149-166 - [i1]Zhongyuan Xu, Scott D. Stoller:
Mining Attribute-based Access Control Policies. CoRR abs/1306.2401 (2013) - 2012
- [j22]Justin Seyster, Ketan Dixit, Xiaowan Huang, Radu Grosu, Klaus Havelund, Scott A. Smolka, Scott D. Stoller, Erez Zadok:
InterAspect: aspect-oriented instrumentation with GCC. Formal Methods Syst. Des. 41(3): 295-320 (2012) - [j21]Xiaowan Huang, Justin Seyster, Sean Callanan, Ketan Dixit, Radu Grosu, Scott A. Smolka, Scott D. Stoller, Erez Zadok:
Software monitoring with controllable overhead. Int. J. Softw. Tools Technol. Transf. 14(3): 327-347 (2012) - [c73]Yanhong A. Liu, Scott D. Stoller, Bo Lin, Michael Gorbovitski:
From clarity to efficiency for distributed algorithms. OOPSLA 2012: 395-410 - [c72]Michael Gorbovitski, Yanhong A. Liu, Scott D. Stoller, Tom Rothamel:
Composing transformations for instrumentation and optimization. PEPM 2012: 53-62 - [c71]Ezio Bartocci, Radu Grosu, Atul Karmarkar, Scott A. Smolka, Scott D. Stoller, Erez Zadok, Justin Seyster:
Adaptive Runtime Verification. RV 2012: 168-182 - [c70]Zhongyuan Xu, Scott D. Stoller:
Algorithms for mining meaningful roles. SACMAT 2012: 57-66 - [c69]Yanhong A. Liu, Scott D. Stoller, Bo Lin:
High-Level Executable Specifications of Distributed Algorithms. SSS 2012: 95-110 - 2011
- [j20]Scott D. Stoller, Ping Yang, Mikhail I. Gofman, C. R. Ramakrishnan:
Symbolic reachability analysis for parameterized administrative role-based access control. Comput. Secur. 30(2-3): 148-164 (2011) - [j19]Amit Sasturkar, Ping Yang, Scott D. Stoller, C. R. Ramakrishnan:
Policy analysis for Administrative Role-Based Access Control. Theor. Comput. Sci. 412(44): 6208-6234 (2011) - [c68]Zhichao Li, Radu Grosu, Koundinya Muppalla, Scott A. Smolka, Scott D. Stoller, Erez Zadok:
Model discovery for energy-aware computing systems: An experimental evaluation. IGCC 2011: 1-6 - [c67]Justin Seyster, Prabakar Radhakrishnan, Samriti Katoch, Abhinav Duggal, Scott D. Stoller, Erez Zadok:
Redflag: A Framework for Analysis of Kernel-Level Concurrency. ICA3PP (1) 2011: 66-79 - [c66]Puneet Gupta, Scott D. Stoller, Zhongyuan Xu:
Abductive Analysis of Administrative Policies in Rule-Based Access Control. ICISS 2011: 116-130 - [c65]Scott D. Stoller, Ezio Bartocci, Justin Seyster, Radu Grosu, Klaus Havelund, Scott A. Smolka, Erez Zadok:
Runtime Verification with State Estimation. RV 2011: 193-207 - [c64]Zhichao Li, Radu Grosu, Priya Sehgal, Scott A. Smolka, Scott D. Stoller, Erez Zadok:
On the energy consumption and performance of systems software. SYSTOR 2011: 8 - [r1]Scott D. Stoller:
Trust Management in Databases. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1326-1327 - 2010
- [j18]Rahul Agarwal, Saddek Bensalem, Eitan Farchi, Klaus Havelund, Yarden Nir-Buchbinder, Scott D. Stoller, Shmuel Ur, Liqiang Wang:
Detection of deadlock potentials in multithreaded programs. IBM J. Res. Dev. 54(5): 3 (2010) - [c63]Scott D. Stoller:
Trust management for Web Services. CNSM 2010: 262-265 - [c62]Michael Gorbovitski, Yanhong A. Liu, Scott D. Stoller, Tom Rothamel, K. Tuncay Tekle:
Alias analysis for optimization of dynamic languages. DLS 2010: 27-42 - [c61]Justin Seyster, Ketan Dixit, Xiaowan Huang, Radu Grosu, Klaus Havelund, Scott A. Smolka, Scott D. Stoller, Erez Zadok:
Aspect-Oriented Instrumentation with GCC. RV 2010: 405-420
2000 – 2009
- 2009
- [j17]Yanhong A. Liu, Scott D. Stoller:
From datalog rules to efficient programs with time and space guarantees. ACM Trans. Program. Lang. Syst. 31(6): 21:1-21:38 (2009) - [c60]Qichang Chen, Liqiang Wang, Zijiang Yang, Scott D. Stoller:
HAVE: Detecting Atomicity Violations via Integrated Dynamic and Static Analysis. FASE 2009: 425-439 - [c59]Yanhong A. Liu, Michael Gorbovitski, Scott D. Stoller:
A language and framework for invariant-driven transformations. GPCE 2009: 55-64 - [c58]Leena Unnikrishnan, Scott D. Stoller:
Parametric heap usage analysis for functional programs. ISMM 2009: 139-148 - [c57]Scott D. Stoller, Ping Yang, Mikhail I. Gofman, C. R. Ramakrishnan:
Symbolic reachability analysis for parameterized administrative role based access control. SACMAT 2009: 165-174 - [c56]Puneet Gupta, Scott D. Stoller:
Verification of Security Policy Enforcement in Enterprise Systems. SEC 2009: 202-213 - [c55]Mikhail I. Gofman, Ruiqi Luo, Ayla C. Solomon, Yingbin Zhang, Ping Yang, Scott D. Stoller:
RBAC-PAT: A Policy Analysis Tool for Role Based Access Control. TACAS 2009: 46-49 - 2008
- [c54]Sean Callanan, David J. Dean, Michael Gorbovitski, Radu Grosu, Justin Seyster, Scott A. Smolka, Scott D. Stoller, Erez Zadok:
Software monitoring with bounded overhead. IPDPS 2008: 1-8 - [c53]Michael Gorbovitski, Tom Rothamel, Yanhong A. Liu, Scott D. Stoller:
Efficient runtime invariant checking: a framework and case study. WODA 2008: 43-49 - [c52]Shmuel Ur, Scott D. Stoller, Eitan Farchi:
6th workshop on parallel and distributed systems: testing and debugging (PADTAD '08). ISSTA 2008: 309-310 - [c51]Michael Gorbovitski, K. Tuncay Tekle, Tom Rothamel, Scott D. Stoller, Yanhong A. Liu:
Analysis and Transformations for Efficient Query-Based Debugging. SCAM 2008: 174-183 - [c50]Scott D. Stoller:
Trust Management and Trust Negotiation in an Extension of SQL. TGC 2008: 186-200 - 2007
- [j16]Yaniv Eytani, Klaus Havelund, Scott D. Stoller, Shmuel Ur:
Towards a framework and a benchmark for testing tools for multi-threaded programs. Concurr. Comput. Pract. Exp. 19(3): 267-279 (2007) - [c49]Anu Singh, C. R. Ramakrishnan, I. V. Ramakrishnan, Scott D. Stoller, David Scott Warren:
Security policy analysis using deductive spreadsheets. FMSE 2007: 42-50 - [c48]Scott D. Stoller, Ping Yang, C. R. Ramakrishnan, Mikhail I. Gofman:
Efficient policy analysis for administrative role based access control. CCS 2007: 445-455 - 2006
- [j15]Scott D. Stoller, Ernie Cohen:
Optimistic synchronization-based state-space reduction. Formal Methods Syst. Des. 28(3): 263-289 (2006) - [j14]Liqiang Wang, Scott D. Stoller:
Runtime Analysis of Atomicity for Multithreaded Programs. IEEE Trans. Software Eng. 32(2): 93-110 (2006) - [c47]Amit Sasturkar, Ping Yang, Scott D. Stoller, C. R. Ramakrishnan:
Policy Analysis for Administrative Role Based Access Control. CSFW 2006: 124-138 - [c46]Rahul Agarwal, Scott D. Stoller:
Run-time detection of potential deadlocks for programs with locks, semaphores, and condition variables. PADTAD 2006: 51-60 - [c45]Yanhong A. Liu, Scott D. Stoller:
Querying Complex Graphs. PADL 2006: 199-214 - [c44]Katia Hristova, Tom Rothamel, Yanhong A. Liu, Scott D. Stoller:
Efficient type inference for secure information flow. PLAS 2006: 85-94 - [c43]Liqiang Wang, Scott D. Stoller:
Accurate and efficient runtime detection of atomicity errors in concurrent programs. PPoPP 2006: 137-146 - [e3]Byron Cook, Scott D. Stoller, Willem Visser:
Proceedings of the 3rd Workshop on Software Model Checking, SoftMC@CAV 2005, Edinburgh, UK, July 11, 2005. Electronic Notes in Theoretical Computer Science 144(3), Elsevier 2006 [contents] - 2005
- [j13]Scott D. Stoller, Willem Visser:
Foreword. Formal Methods Syst. Des. 26(2): 75-76 (2005) - [j12]Scott D. Stoller, Fred B. Schneider:
Automated Analysis of Fault-Tolerance in Distributed Systems. Formal Methods Syst. Des. 26(2): 183-196 (2005) - [j11]Yanhong A. Liu, Scott D. Stoller, Ning Li, Tom Rothamel:
Optimizing aggregate array computations in loops. ACM Trans. Program. Lang. Syst. 27(1): 91-125 (2005) - [c42]Rahul Agarwal, Liqiang Wang, Scott D. Stoller:
Detecting Potential Deadlocks with Static Analysis and Run-Time Monitoring. Haifa Verification Conference 2005: 191-207 - [c41]Rahul Agarwal, Amit Sasturkar, Liqiang Wang, Scott D. Stoller:
Optimized run-time race detection and atomicity checking using partial discovered types. ASE 2005: 233-242 - [c40]Michael Gorbovitski, Tom Rothamel, Yanhong A. Liu, Scott D. Stoller:
Implementing incrementalization across object abstraction. OOPSLA Companion 2005: 112-113 - [c39]Yanhong A. Liu, Scott D. Stoller, Michael Gorbovitski, Tom Rothamel, Yanni Ellen Liu:
Incrementalization across object abstraction. OOPSLA 2005: 473-486 - [c38]Liqiang Wang, Scott D. Stoller:
Static analysis of atomicity for programs with non-blocking synchronization. PPoPP 2005: 61-71 - [c37]Amit Sasturkar, Rahul Agarwal, Liqiang Wang, Scott D. Stoller:
Automated type-based analysis of data races and atomicity. PPoPP 2005: 83-94 - [c36]Byron Cook, Scott D. Stoller, Willem Visser:
Preface. SoftMC@CAV 2005: 1-2 - 2004
- [c35]Yanhong A. Liu, Tom Rothamel, Fuxiang Yu, Scott D. Stoller, Nanjun Hu:
Parametric regular path queries. PLDI 2004: 219-230 - [c34]Rahul Agarwal, Scott D. Stoller:
Type Inference for Parameterized Race-Free Java. VMCAI 2004: 149-160 - 2003
- [j10]Yanhong A. Liu, Scott D. Stoller:
Dynamic Programming via Static Incrementalization. High. Order Symb. Comput. 16(1-2): 37-62 (2003) - [j9]Yanhong A. Liu, Scott D. Stoller:
Eliminating dead code on recursive data. Sci. Comput. Program. 47(2-3): 221-242 (2003) - [c33]Klaus Havelund, Scott D. Stoller, Shmuel Ur:
Benchmark and Framework for Encouraging Research on Multi-Threaded Testing Tools . IPDPS 2003: 286 - [c32]Yanhong A. Liu, Scott D. Stoller:
Optimizing Ackermann's function by incrementalization. PEPM 2003: 85-91 - [c31]Yanhong A. Liu, Scott D. Stoller:
From datalog rules to efficient programs with time and space guarantees. PPDP 2003: 172-183 - [c30]Scott D. Stoller, Ernie Cohen:
Optimistic Synchronization-Based State-Space Reduction. TACAS 2003: 489-504 - [c29]Leena Unnikrishnan, Scott D. Stoller, Yanhong A. Liu:
Optimized Live Heap Bound Analysis. VMCAI 2003: 70-85 - [c28]Liqiang Wang, Scott D. Stoller:
Run-Time Analysis for Atomicity. RV@CAV 2003: 191-209 - [c27]Byron Cook, Scott D. Stoller, Willem Visser:
SoftMC 2003: Workshop on Software Model Checking. SoftMC@CAV 2003: 377 - [e2]Byron Cook, Scott D. Stoller, Willem Visser:
2003 Workshop on Software Model Checking, SoftMC 2003, Boulder, Colorado, USA, July 14, 2003. Electronic Notes in Theoretical Computer Science 89(3), Elsevier 2003 [contents] - 2002
- [j8]Scott D. Stoller:
Model-checking multi-threaded distributed Java programs. Int. J. Softw. Tools Technol. Transf. 4(1): 71-91 (2002) - [c26]Scott D. Stoller:
A Bound on Attacks on Authentication Protocols. IFIP TCS 2002: 588-600 - [c25]Scott D. Stoller:
Domain partitioning for open reactive systems. ISSTA 2002: 44-54 - [c24]Yanhong A. Liu, Scott D. Stoller:
Program optimization using indexed and recursive data structures. PEPM 2002: 108-118 - [c23]Scott D. Stoller:
Testing Concurrent Java Programs using Randomized Scheduling. RV@FLoC 2002: 142-157 - 2001
- [j7]Yanhong A. Liu, Scott D. Stoller, Tim Teitelbaum:
Strengthening invariants for efficient computation. Sci. Comput. Program. 41(2): 139-172 (2001) - [c22]Radu Grosu, Yanhong A. Liu, Scott A. Smolka, Scott D. Stoller, Jingyu Yan:
Automated Software Engineering Using Concurrent Class Machines. ASE 2001: 297- - [c21]Leena Unnikrishnan, Scott D. Stoller, Yanhong A. Liu:
Automatic Accurate Live Memory Analysis for Garbage-Collected Languages. LCTES/OM 2001: 102-111 - [c20]Scott D. Stoller:
A Bound on Attacks on Payment Protocols. LICS 2001: 61-70 - [c19]Leena Unnikrishnan, Scott D. Stoller, Yanhong A. Liu:
Automatic Accurate Live Memory Analysis for Garbage-Collected Languages. OM@PLDI 2001: 102-111 - [c18]Yanhong A. Liu, Ning Li, Scott D. Stoller:
Solving Regular Tree Grammar Based Constraints. SAS 2001: 213-233 - [c17]Scott D. Stoller, Yanhong A. Liu:
Transformations for Model Checking Distributed Java Programs. SPIN 2001: 192-199 - [c16]Scott D. Stoller, Willem Visser:
Preface. Workshop on Software Model Checking @ CAV 2001: 394 - [e1]Scott D. Stoller, Willem Visser:
Workshop on Software Model Checking 2001, in connection with CAV 2001, Paris, France, July 23, 2001. Electronic Notes in Theoretical Computer Science 55(3), Elsevier 2001 [contents] - 2000
- [j6]Scott D. Stoller:
Detecting Global Predicates in Distributed Systems with Clocks. Distributed Comput. 13(2): 85-98 (2000) - [j5]Scott D. Stoller:
Leader Election in Asynchronous Distributed Systems. IEEE Trans. Computers 49(3): 283-284 (2000) - [c15]Scott D. Stoller, Leena Unnikrishnan, Yanhong A. Liu:
Efficient Detection of Global Properties in Distributed Systems Using Partial-Order Methods. CAV 2000: 264-279 - [c14]Yanhong A. Liu, Scott D. Stoller:
From Recursion to Iteration: What are the Optimizations? PEPM 2000: 73-82 - [c13]Scott D. Stoller:
Model-Checking Multi-threaded Distributed Java Programs. SPIN 2000: 224-244
1990 – 1999
- 1999
- [j4]Yanhong A. Liu, Scott D. Stoller:
ETAPS '99 - Conference Report. ACM SIGPLAN Notices 34(6): 16-17 (1999) - [c12]Yanhong A. Liu, Scott D. Stoller:
Dynamic Programming via Static Incrementalization. ESOP 1999: 288-305 - [c11]Scott D. Stoller:
Lower and Upper Bounds for Attacks on Authentication Protocols. PODC 1999: 283 - [c10]Yanhong A. Liu, Scott D. Stoller:
Eliminating Dead Code on Recursive Data. SAS 1999: 211-231 - 1998
- [j3]Yanhong A. Liu, Scott D. Stoller, Tim Teitelbaum:
Static Caching for Incremental Computation. ACM Trans. Program. Lang. Syst. 20(3): 546-585 (1998) - [c9]Scott D. Stoller, Yanhong A. Liu:
Efficient Symbolic Detection of Global Properties in Distributed Systems. CAV 1998: 357-368 - [c8]Scott D. Stoller, Fred B. Schneider:
Automated Stream-Based Analysis of Fault-Tolerance. FTRTFT 1998: 113-122 - [c7]Yanhong A. Liu, Scott D. Stoller:
Loop Optimization for Aggregate Array Computations. ICCL 1998: 262-271 - 1997
- [b1]Scott D. Stoller:
A Method and Tool for Analyzing Faulty-Tolerance in Systems. Cornell University, USA, 1997 - [c6]Scott D. Stoller:
Detecting Global Predicates in Distributed Systems with Clocks. WDAG 1997: 185-199 - 1996
- [c5]Yanhong A. Liu, Scott D. Stoller, Tim Teitelbaum:
Discovering Auxiliary Information for Incremental Computation. POPL 1996: 157-170 - [c4]Yaron Minsky, Robbert van Renesse, Fred B. Schneider, Scott D. Stoller:
Cryptographic support for fault-tolerant distributed computing. ACM SIGOPS European Workshop 1996: 109-114 - 1995
- [j2]Scott D. Stoller, Fred B. Schneider:
Verifying Programs That Use Causally-Ordered Message-Passing. Sci. Comput. Program. 24(2): 105-128 (1995) - [c3]Scott D. Stoller, John DeTreville:
Storage Replication and Layout in Video-on-Demand Servers. NOSSDAV 1995: 330-341 - [c2]Scott D. Stoller, Fred B. Schneider:
Faster Possibility Detection by Combining Two Approaches. WDAG 1995: 318-332 - 1994
- [j1]Scott D. Stoller:
Addendum to "Proof Rules for Flush Channels". IEEE Trans. Software Eng. 20(8): 664 (1994) - [c1]Douglas J. Howe, Scott D. Stoller:
An Operational Approach to Combining Classical Set Theory and Functional Programming Languages. TACS 1994: 36-55
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint