Qiskit: An open-source framework for quantum computing G Aleksandrowicz, T Alexander, P Barkoutsos, L Bello, Y Ben-Haim, ... Accessed on: Mar 16, 2019 | 969* | 2019 |
TAJ: effective taint analysis of web applications O Tripp, M Pistoia, SJ Fink, M Sridharan, O Weisman Proceedings of the 2009 ACM SIGPLAN Conference on Programming Languages …, 2009 | 517 | 2009 |
Method, system and computer program product for enforcing privacy policies L Koved, M Pistoia US Patent 7,877,812, 2011 | 314 | 2011 |
Static specification mining using automata-based abstractions S Shoham, E Yahav, S Fink, M Pistoia International Symposium on Software Testing and Analysis 2007 (Best Paper …, 2007 | 278 | 2007 |
Directed test generation for effective fault localization S Artzi, J Dolby, F Tip, M Pistoia Proceedings of the 19th international symposium on Software testing and …, 2010 | 190 | 2010 |
Andromeda: Accurate and Scalable Security Analysis of Web Applications O Tripp, M Pistoia, P Cousot, R Cousot, S Guarnieri Fundamental Approaches to Software Engineering: 16th International …, 2013 | 189 | 2013 |
Quantum equation of motion for computing molecular excitation energies on a noisy quantum processor PJ Ollitrault, A Kandala, CF Chen, PK Barkoutsos, A Mezzacapo, ... Physical Review Research 2 (4), 043140, 2020 | 185 | 2020 |
Saving the world wide web from vulnerable JavaScript S Guarnieri, M Pistoia, O Tripp, J Dolby, S Teilhet, R Berg Proceedings of the 2011 International Symposium on Software Testing and …, 2011 | 185 | 2011 |
System and method for supporting digital rights management in an enhanced Java™ 2 runtime environment L Koved, MM Mourad, JP Munson, G Pacifici, M Pistoia, AS Youssef US Patent 7,308,717, 2007 | 150 | 2007 |
Quantum orbital-optimized unitary coupled cluster methods in the strongly correlated regime: Can quantum algorithms outperform their classical equivalents? IO Sokolov, PK Barkoutsos, PJ Ollitrault, D Greenberg, J Rice, M Pistoia, ... The Journal of chemical physics 152 (12), 2020 | 147 | 2020 |
Access rights analysis for Java L Koved, M Pistoia, A Kershenbaum Proceedings of the 2002 ACM SIGPLAN Conference on Object-Oriented …, 2002 | 142 | 2002 |
More is less: Learning efficient video representations by big-little network and depthwise temporal aggregation DC Quanfu Fan, Chun-Fu (Richard) Chen, Hilde Kuehne, Marco Pistoia Proceedings of the Thirty-Third Conference on Neural Information Processing …, 2019 | 140* | 2019 |
F4F: taint analysis of framework-based web applications M Sridharan, S Artzi, M Pistoia, S Guarnieri, O Tripp, R Berg Proceedings of the 2011 ACM international conference on Object oriented …, 2011 | 140 | 2011 |
A survey of static analysis methods for identifying security vulnerabilities in software systems M Pistoia, S Chandra, SJ Fink, E Yahav IBM systems journal 46 (2), 265-288, 2007 | 134 | 2007 |
A survey of quantum computing for finance D Herman, C Googin, X Liu, A Galda, I Safro, Y Sun, M Pistoia, Y Alexeev arXiv preprint arXiv:2201.02773, 2022 | 123 | 2022 |
Learn quantum computation using qiskit A Asfaw, L Bello, Y Ben-Haim, S Bravyi, L Capelluto, AC Vazquez, ... URL: https://qiskit. org/textbook/ch-applications/qaoa. html, 2020 | 117* | 2020 |
Reducing qubit requirements for quantum simulations using molecular point group symmetries K Setia, R Chen, JE Rice, A Mezzacapo, M Pistoia, JD Whitfield Journal of Chemical Theory and Computation 16 (10), 6091-6097, 2020 | 110 | 2020 |
Automatic detection of inter-application permission leaks in android applications D Sbîrlea, MG Burke, S Guarnieri, M Pistoia, V Sarkar IBM Journal of Research and Development 57 (6), 10: 1-10: 12, 2013 | 110 | 2013 |
Practical fault localization for dynamic web applications S Artzi, J Dolby, F Tip, M Pistoia Proceedings of the 32nd ACM/IEEE International Conference on Software …, 2010 | 108 | 2010 |
Path-and index-sensitive string analysis based on monadic second-order logic T Tateishi, M Pistoia, O Tripp ACM Transactions on Software Engineering and Methodology (TOSEM) 22 (4), 1-33, 2013 | 100 | 2013 |