Select a letter below to browse by last name or type
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Showing results 33 to 52 of 101 < previous   next >
Issue DateTitleAuthor(s)
2006Efficient detection and exploitation of infeasible paths for software timing analysisSuhendra, V. ; Mitra, T. ; Roychoudhury, A. ; Chen, T. 
2011Engineering multi-tenant Software-as-a-Service systemsSengupta, B.; Roychoudhury, A. 
2007Exploiting branch constraints without exhaustive path enumerationChen, T. ; Mitra, T. ; Roychoudhury, A. ; Suhendra, V. 
2013Expressing and checking intended changes via software change contractsYi, J.; Qi, D.; Tan, S.H.; Roychoudhury, A. 
2009Fair model checking with process counter abstractionSun, J. ; Liu, Y. ; Roychoudhury, A. ; Liu, S. ; Dong, J.S. 
2009Footprinter: Round-trip engineering via scenario and state based modelsGoel, A. ; Sengupta, B.; Roychoudhury, A. 
10-Jul-2020Fuzz Testing based Data Augmentation to Improve Robustness of Deep Neural NetworksGao, Xiang ; Saha, Ripon; Prasad, Mukul ; Abhik Roychoudhury 
2009Generating test programs to cover pipeline interactionsThanh, N.D.; Roychoudhury, A. ; Mitra, T. ; Mishra, P.
2010Golden implementation driven software debuggingBanerjee, A. ; Roychoudhury, A. ; Harlie, J.A. ; Liang, Z. 
2006Handling constraints in multi-objective GA for embedded system designChakraborty, B. ; Chen, T. ; Mitra, T. ; Roychoudhury, A. 
2007Hierarchical dynamic slicingWang, T. ; Roychoudhury, A. 
2004Impact of java memory model on out-of-order multiprocessorsMitra, T. ; Roychoudhury, A. ; Shen, Q.
2004Inductively verifying invariant properties of parameterized systemsRoychoudhury, A. ; Ramakrishnan, I.V.
2012Inferring class level specifications for distributed systemsKumar, S. ; Khoo, S.-C. ; Roychoudhury, A. ; Lo, D.
2013Integrated timing analysis of application and operating systems codeChong, L.K.; Ballabriga, C.; Pham, V.-T.; Chattopadhyay, S.; Roychoudhury, A. 
2006Interacting process classesGoel, A. ; Meng, S.; Roychoudhury, A. ; Thiagarajan, P.S. 
2008Java memory model aware software validationDe, A.; Roychoudhury, A. ; D'Souza, D.
1-Feb-2020KLEESPECTRE: Detecting Information Leakage through Speculative Cache Attacks via Symbolic Execution.Wang, Guanhua ; Chattopadhyay, Sudipta ; Biswas, Arnab Kumar ; Mitra, Tulika ; Roychoudhury, Abhik 
2012Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): PrefaceRoychoudhury, A. ; D'Souza, M.
2011Locating failure-inducing environment changesQi, D.; Ngo, M.N.; Sun, T.; Roychoudhury, A.