关注
Scott D. Stoller
Scott D. Stoller
Professor of Computer Science, Stony Brook University
在 cs.stonybrook.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
{SLEUTH}: Real-time attack scenario reconstruction from {COTS} audit data
MN Hossain, SM Milajerdi, J Wang, B Eshete, R Gjomemo, R Sekar, ...
26th USENIX Security Symposium (USENIX Security 17), 487-504, 2017
2212017
Runtime analysis of atomicity for multithreaded programs
L Wang, SD Stoller
IEEE Transactions on Software Engineering 32 (2), 93-110, 2006
2152006
Transverse spin relaxation in inhomogeneous magnetic fields
SD Stoller, W Happer, FJ Dyson
Physical Review A 44 (11), 7459, 1991
1831991
Efficient policy analysis for administrative role based access control
SD Stoller, P Yang, CR Ramakrishnan, MI Gofman
Proceedings of the 14th ACM conference on Computer and communications …, 2007
1622007
ACTION-EHR: Patient-centric blockchain-based electronic health record data management for cancer care
A Dubovitskaya, F Baig, Z Xu, R Shukla, PS Zambani, A Swaminathan, ...
Journal of medical Internet research 22 (8), e13598, 2020
1612020
Mining attribute-based access control policies
Z Xu, SD Stoller
IEEE Transactions on Dependable and Secure Computing 12 (5), 533-545, 2014
1592014
Testing concurrent Java programs using randomized scheduling
SD Stoller
Electronic Notes in Theoretical Computer Science 70 (4), 142-157, 2002
1562002
Cryptographic support for fault-tolerant distributed computing
Y Minsky, R Van Renesse, FB Schneider, SD Stoller
Proceedings of the 7th workshop on ACM SIGOPS European workshop: Systems …, 1996
1541996
Model-checking multi-threaded distributed Java programs
SD Stoller
International SPIN Workshop on Model Checking of Software, 224-244, 2000
1472000
Runtime verification with state estimation
SD Stoller, E Bartocci, J Seyster, R Grosu, K Havelund, SA Smolka, ...
Runtime Verification: Second International Conference, RV 2011, San …, 2012
1442012
Policy analysis for administrative role-based access control
A Sasturkar, P Yang, SD Stoller, CR Ramakrishnan
Theoretical Computer Science 412 (44), 6208-6234, 2011
1392011
Accurate and efficient runtime detection of atomicity errors in concurrent programs
L Wang, SD Stoller
Proceedings of the eleventh ACM SIGPLAN symposium on Principles and practice …, 2006
1352006
{Dependence-Preserving} data compaction for scalable forensic analysis
MN Hossain, J Wang, O Weisse, R Sekar, D Genkin, B He, SD Stoller, ...
27th USENIX Security Symposium (USENIX Security 18), 1723-1740, 2018
1272018
Static caching for incremental computation
YA Liu, SD Stoller, T Teitelbaum
ACM Transactions on Programming Languages and Systems (TOPLAS) 20 (3), 546-585, 1998
1221998
Detecting global predicates in distributed systems with clocks
SD Stoller
Distributed Computing 13 (2), 85-98, 2000
1192000
Automated type-based analysis of data races and atomicity
A Sasturkar, R Agarwal, L Wang, SD Stoller
Proceedings of the tenth ACM SIGPLAN symposium on Principles and practice of …, 2005
1182005
Detecting potential deadlocks with static analysis and run-time monitoring
R Agarwal, L Wang, SD Stoller
Haifa Verification Conference, 191-207, 2005
1172005
From recursion to iteration: what are the optimizations?
YA Liu, SD Stoller
Proceedings of the 2000 ACM SIGPLAN workshop on Partial evaluation and …, 1999
1151999
Towards a framework and a benchmark for testing tools for multi‐threaded programs
Y Eytani, K Havelund, SD Stoller, S Ur
Concurrency and Computation: Practice and Experience 19 (3), 267-279, 2007
1022007
Adaptive Runtime Verification
E Bartocci, R Grosu, A Karmarkar, SA Smolka, SD Stoller, E Zadok, ...
Third International Conference on Runtime Verification (RV 2012), 0
97*
系统目前无法执行此操作,请稍后再试。
文章 1–20