default search action
Neha Rungta
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Joseph W. Cutler, Craig Disselkoen, Aaron Eline, Shaobo He, Kyle Headley, Michael Hicks, Kesha Hietala, Eleftherios Ioannidis, John H. Kastner, Anwar Mamat, Darin McAdams, Matt McCutchen, Neha Rungta, Emina Torlak, Andrew Wells:
Cedar: A New Language for Expressive, Fast, Safe, and Analyzable Authorization. Proc. ACM Program. Lang. 8(OOPSLA1): 670-697 (2024) - [j17]Loris D'Antoni, Shuo Ding, Amit Goel, Mathangi Ramesh, Neha Rungta, Chungha Sung:
Automatically Reducing Privilege for Access Control Policies. Proc. ACM Program. Lang. 8(OOPSLA2): 763-790 (2024) - [c44]Craig Disselkoen, Aaron Eline, Shaobo He, Kyle Headley, Michael Hicks, Kesha Hietala, John H. Kastner, Anwar Mamat, Matt McCutchen, Neha Rungta, Bhakti Shah, Emina Torlak, Andrew Wells:
How We Built Cedar: A Verification-Guided Approach. SIGSOFT FSE Companion 2024: 351-357 - [i2]Joseph W. Cutler, Craig Disselkoen, Aaron Eline, Shaobo He, Kyle Headley, Michael Hicks, Kesha Hietala, Eleftherios Ioannidis, John H. Kastner, Anwar Mamat, Darin McAdams, Matt McCutchen, Neha Rungta, Emina Torlak, Andrew Wells:
Cedar: A New Language for Expressive, Fast, Safe, and Analyzable Authorization (Extended Version). CoRR abs/2403.04651 (2024) - [i1]Craig Disselkoen, Aaron Eline, Shaobo He, Kyle Headley, Michael Hicks, Kesha Hietala, John H. Kastner, Anwar Mamat, Matt McCutchen, Neha Rungta, Bhakti Shah, Emina Torlak, Andrew Wells:
How We Built Cedar: A Verification-Guided Approach. CoRR abs/2407.01688 (2024) - 2023
- [c43]Aleksandr Fedchin, Tyler Dean, Jeffrey S. Foster, Eric Mercer, Zvonimir Rakamaric, Giles Reger, Neha Rungta, Robin Salkeld, Lucas Wagner, Cassidy Waldrip:
A Toolkit for Automated Testing of Dafny. NFM 2023: 397-413 - 2022
- [c42]Neha Rungta:
A Billion SMT Queries a Day (Invited Paper). CAV (1) 2022: 3-18 - [c41]Ahmed Irfan, Sorawee Porncharoenwase, Zvonimir Rakamaric, Neha Rungta, Emina Torlak:
Testing Dafny (experience paper). ISSTA 2022: 556-567 - [c40]Aleksandar Chakarov, Aleksandr Fedchin, Zvonimir Rakamaric, Neha Rungta:
Better Counterexamples for Dafny. TACAS (1) 2022: 404-411 - [e3]Alberto Griggio, Neha Rungta:
22nd Formal Methods in Computer-Aided Design, FMCAD 2022, Trento, Italy, October 17-21, 2022. IEEE 2022, ISBN 978-3-85448-053-2 [contents] - 2020
- [c39]John Backes, Ulises Berrueco, Tyler Bray, Daniel Brim, Byron Cook, Andrew Gacek, Ranjit Jhala, Kasper Søe Luckow, Sean McLaughlin, Madhav Menon, Daniel Peebles, Ujjwal Pugalia, Neha Rungta, Cole Schlesinger, Adam Schodde, Anvesh Tanuku, Carsten Varming, Deepa Viswanathan:
Stratified Abstraction of Access Control Policies. CAV (1) 2020: 165-176 - [c38]Malik Bouchet, Byron Cook, Bryant Cutler, Anna Druzkina, Andrew Gacek, Liana Hadarean, Ranjit Jhala, Brad Marshall, Daniel Peebles, Neha Rungta, Cole Schlesinger, Chriss Stephens, Carsten Varming, Andy Warfield:
Block public access: trust safety verification of access control policies. ESEC/SIGSOFT FSE 2020: 281-291
2010 – 2019
- 2019
- [j16]John Backes, Pauline Bolignano, Byron Cook, Andrew Gacek, Kasper Søe Luckow, Neha Rungta, Martin Schäf, Cole Schlesinger, Rima Tanash, Carsten Varming, Michael W. Whalen:
One-Click Formal Methods. IEEE Softw. 36(6): 61-65 (2019) - [c37]John Backes, Sam Bayless, Byron Cook, Catherine Dodge, Andrew Gacek, Alan J. Hu, Temesghen Kahsai, Bill Kocik, Evgenii Kotelnikov, Jure Kukovec, Sean McLaughlin, Jason Reed, Neha Rungta, John Sizemore, Mark A. Stalzer, Preethi Srinivasan, Pavle Subotic, Carsten Varming, Blake Whaley:
Reachability Analysis for AWS-Based Networks. CAV (2) 2019: 231-241 - 2018
- [j15]Neha Rungta:
Verification column. ACM SIGLOG News 5(1): 19 (2018) - [c36]John Backes, Pauline Bolignano, Byron Cook, Catherine Dodge, Andrew Gacek, Kasper Søe Luckow, Neha Rungta, Oksana Tkachuk, Carsten Varming:
Semantic-based Automated Reasoning for AWS Access Policies using SMT. FMCAD 2018: 1-9 - 2017
- [j14]Neha Rungta:
Verification column. ACM SIGLOG News 4(2): 54 (2017) - [p1]Guillaume Brat, Sébastien Combéfis, Dimitra Giannakopoulou, Charles Pecheur, Franco Raimondi, Neha Rungta:
Formal Analysis of Multiple Coordinated HMI Systems. Handbook of Formal Methods in Human-Computer Interaction 2017: 405-431 - 2016
- [j13]Taolue Chen, Giuseppe Primiero, Franco Raimondi, Neha Rungta:
A Computationally Grounded, Weighted Doxastic Logic. Stud Logica 104(4): 679-703 (2016) - [j12]Neha Rungta:
Verification column. ACM SIGLOG News 3(2): 68 (2016) - [j11]Neha Rungta:
Verification column. ACM SIGLOG News 3(3): 66 (2016) - [j10]Eric Mercer, Neha Rungta, Douglas J. Gillan:
Guest Editorial Special Issue on Systematic Approaches to Human-Machine Interface: Improving Resilience, Robustness, and Stability. IEEE Trans. Hum. Mach. Syst. 46(2): 169-173 (2016) - [c35]Neha Rungta, Eric G. Mercer, Franco Raimondi, Bjorn C. Krantz, Richard Stocker, Andrew Wallace:
Modeling complex air traffic management systems. MiSE@ICSE 2016: 41-47 - [c34]Michele Bottone, Giuseppe Primiero, Franco Raimondi, Neha Rungta:
From Raw Data to Agent Perceptions for Simulation, Verification, and Monitoring. Intelligent Environments (Workshops) 2016: 66-75 - [c33]Benjamin Hillery, Eric Mercer, Neha Rungta, Suzette Person:
Exact Heap Summaries for Symbolic Execution. VMCAI 2016: 206-225 - 2015
- [j9]Neha Rungta:
Verification column. ACM SIGLOG News 2(2): 28 (2015) - [j8]Rody Kersten, Suzette Person, Neha Rungta, Oksana Tkachuk:
Improving Coverage of Test Cases Generated by Symbolic PathFinder for Programs with Loops. ACM SIGSOFT Softw. Eng. Notes 40(1): 1-5 (2015) - [c32]Richard Stocker, Neha Rungta, Eric Mercer, Franco Raimondi, Jon Holbrook, Colleen Cardoza, Michael A. Goodrich:
An Approach to Quantify Workload in a System of Agents. AAMAS 2015: 1041-1050 - [c31]Michael W. Whalen, Suzette Person, Neha Rungta, Matt Staats, Daniela Grijincu:
A Flexible and Non-intrusive Approach for Computing Complex Structural Coverage Metrics. ICSE (1) 2015: 506-516 - [c30]Anitha Murugesan, Michael W. Whalen, Neha Rungta, Oksana Tkachuk, Suzette Person, Mats Per Erik Heimdahl, Dongjiang You:
Are We There Yet? Determining the Adequacy of Formalized Requirements and Test Suites. NFM 2015: 279-294 - 2014
- [j7]Manish Jain, Albert Xin Jiang, Takashi Kido, Keiki Takadama, Eric G. Mercer, Neha Rungta, Mark Waser, Alan Wagner, Jennifer L. Burke, Donald A. Sofge, William F. Lawless, Mohan Sridharan, Nick Hawes, Tim Hwang:
Reports of the 2014 AAAI Spring Symposium Series. AI Mag. 35(3): 70-76 (2014) - [j6]Benjamin Hillery, Eric Mercer, Neha Rungta, Suzette Person:
Towards a lazier symbolic pathfinder. ACM SIGSOFT Softw. Eng. Notes 39(1): 1-5 (2014) - [j5]Eric Noonan, Eric Mercer, Neha Rungta:
Vector-clock based partial order reduction for JPF. ACM SIGSOFT Softw. Eng. Notes 39(1): 1-5 (2014) - [j4]Guowei Yang, Suzette Person, Neha Rungta, Sarfraz Khurshid:
Directed Incremental Symbolic Execution. ACM Trans. Softw. Eng. Methodol. 24(1): 3:1-3:42 (2014) - [c29]William J. Clancey, Chin Seah, Charlotte Linde, Michael G. Shafto, Neha S. Rungta:
Work Practice Simulation of Complex Human-Automation Systems: The Brahms Generalized überlingen Model. AAAI Spring Symposia 2014 - [c28]Eric G. Mercer, Michael A. Goodrich, Neha Rungta, Ellen J. Bass:
Preface. AAAI Spring Symposia 2014 - [c27]Giuseppe Primiero, Franco Raimondi, Neha Rungta:
Model checking degrees of belief in a system of agents. AAMAS 2014: 133-140 - [c26]Neha Rungta, Oksana Tkachuk, Suzette Person, Jason Biatek, Michael W. Whalen, Joseph Castle, Karen Gundy-Burlet:
Helping system engineers bridge the peaks. TwinPeaks 2014: 9-13 - [c25]Anita Sarma, Joshua Branchaud, Matthew B. Dwyer, Suzette Person, Neha Rungta:
Development context driven change awareness and analysis framework. ICSE Companion 2014: 404-407 - [c24]Guowei Yang, Sarfraz Khurshid, Suzette Person, Neha Rungta:
Property differencing for incremental checking. ICSE 2014: 1059-1070 - [c23]Lingming Zhang, Guowei Yang, Neha Rungta, Suzette Person, Sarfraz Khurshid:
Feedback-driven dynamic invariant discovery. ISSTA 2014: 362-372 - [e2]Neha Rungta, Oksana Tkachuk:
2014 International Symposium on Model Checking of Software, SPIN 2014, Proceedings, San Jose, CA, USA, July 21-23, 2014. ACM 2014, ISBN 978-1-4503-2452-6 [contents] - 2013
- [j3]Corina S. Pasareanu, Willem Visser, David H. Bushnell, Jaco Geldenhuys, Peter C. Mehlitz, Neha Rungta:
Symbolic PathFinder: integrating symbolic execution with model checking for Java bytecode analysis. Autom. Softw. Eng. 20(3): 391-425 (2013) - [j2]Suzette Person, Neha Rungta:
Maintaining the health of software monitors. Innov. Syst. Softw. Eng. 9(4): 257-269 (2013) - [c22]Neha Rungta, Guillaume Brat, William J. Clancey, Charlotte Linde, Franco Raimondi, Chin Seah, Michael G. Shafto:
Aviation safety: modeling and analyzing complex interactions between humans and automated systems. ATACCS 2013: 27-37 - [c21]Josie Hunter, Franco Raimondi, Neha Rungta, Richard Stocker:
A synergistic and extensible framework for multi-agent system verification. AAMAS 2013: 869-876 - [c20]Peter C. Mehlitz, Neha Rungta, Willem Visser:
A hands-on Java PathFinder tutorial. ICSE 2013: 1493-1495 - [c19]Baishakhi Ray, Miryung Kim, Suzette Person, Neha Rungta:
Detecting and characterizing semantic inconsistencies in ported code. ASE 2013: 367-377 - [c18]John D. Backes, Suzette Person, Neha Rungta, Oksana Tkachuk:
Regression Verification Using Impact Summaries. SPIN 2013: 99-116 - [e1]Guillaume Brat, Neha Rungta, Arnaud Venet:
NASA Formal Methods, 5th International Symposium, NFM 2013, Moffett Field, CA, USA, May 14-16, 2013. Proceedings. Lecture Notes in Computer Science 7871, Springer 2013, ISBN 978-3-642-38087-7 [contents] - 2012
- [j1]Eric Mercer, Suzette Person, Neha Rungta:
Computing and visualizing the impact of change with Java PathFinder extensions. ACM SIGSOFT Softw. Eng. Notes 37(6): 1-5 (2012) - [c17]Neha Rungta, Suzette Person, Joshua Branchaud:
A change impact analysis to characterize evolving program behaviors. ICSM 2012: 109-118 - 2011
- [c16]Corina S. Pasareanu, Neha Rungta, Willem Visser:
Symbolic execution with mixed concrete-symbolic solving. ISSTA 2011: 34-44 - [c15]Saint Wesonga, Eric G. Mercer, Neha Rungta:
Guided test visualization: Making sense of errors in concurrent programs. ASE 2011: 624-627 - [c14]Suzette Person, Guowei Yang, Neha Rungta, Sarfraz Khurshid:
Directed incremental symbolic execution. PLDI 2011: 504-515 - [c13]Topher Fischer, Eric Mercer, Neha Rungta:
Symbolically modeling concurrent MCAPI executions. PPoPP 2011: 307-308 - [c12]Dimitra Giannakopoulou, Neha Rungta, Michael Feary:
Automated test case generation for an autopilot requirement prototype. SMC 2011: 1825-1830 - 2010
- [c11]Neha Rungta, Eric Mercer:
Slicing and dicing bugs in concurrent programs. ICSE (2) 2010: 195-198 - [c10]Corina S. Pasareanu, Neha Rungta:
Symbolic PathFinder: symbolic execution of Java bytecode. ASE 2010: 179-180
2000 – 2009
- 2009
- [c9]Neha Rungta, Eric G. Mercer:
Clash of the Titans: tools and techniques for hunting bugs in concurrent programs. PADTAD 2009 - [c8]Neha Rungta, Eric G. Mercer:
Guided model checking for programs with polymorphism. PEPM 2009: 21-30 - [c7]Neha Rungta, Eric G. Mercer, Willem Visser:
Efficient Testing of Concurrent Programs with Abstraction-Guided Symbolic Execution. SPIN 2009: 174-191 - 2008
- [c6]Neha Rungta, Eric G. Mercer:
A Meta Heuristic for Effectively Detecting Concurrency Errors. Haifa Verification Conference 2008: 23-37 - 2007
- [c5]Neha Rungta, Hyrum Carroll, Eric G. Mercer, Randall J. Roper, Mark J. Clement, Quinn Snell:
Analyzing Gene Relationships for Down Syndrome with Labeled Transition Graphs. FMCAD 2007: 216-219 - [c4]Neha Rungta, Eric G. Mercer:
Hardness for Explicit State Software Model Checking Benchmarks. SEFM 2007: 247-256 - [c3]Neha Rungta, Eric G. Mercer:
Generating Counter-Examples Through Randomized Guided Search. SPIN 2007: 39-57 - 2006
- [c2]Neha Rungta, Eric G. Mercer:
An Improved Distance Heuristic Function for Directed Software Model Checking. FMCAD 2006: 60-67 - 2005
- [c1]Neha Rungta, Eric G. Mercer:
A context-sensitive structural heuristic for guided search model checking. ASE 2005: 410-413
Coauthor Index
aka: Eric G. Mercer
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-22 19:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint