Suresh C. Kothari

Affiliations:
  • Iowa State University, Ames, Iowa, USA


According to our database1, Suresh C. Kothari authored at least 47 papers between 1983 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Control flow equivalence method for establishing sanctity of compiling.
Comput. Secur., 2022

2019
DISCOVER: detecting algorithmic complexity vulnerabilities.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

Mockingbird: a framework for enabling targeted dynamic analysis of Java programs.
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019

2018
Projected control graph for computing relevant program behaviors.
Sci. Comput. Program., 2018

DynaDoc: Automated On-demand Context-Specific Documentation.
Proceedings of the IEEE Third International Workshop on Dynamic Software Documentation, 2018

COMB: computing relevant program behaviors.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

2017
Modeling lessons from verifying large software systems for safety and security.
Proceedings of the 2017 Winter Simulation Conference, 2017

Interactive visualization toolbox to detect sophisticated android malware.
Proceedings of the 14th IEEE Symposium on Visualization for Cyber Security, 2017

Transferring State-of-the-Art Immutability Analyses: Experimentation Toolbox and Accuracy Benchmark.
Proceedings of the 2017 IEEE International Conference on Software Testing, 2017

Human-on-the-Loop Automation for Detecting Software Side-Channel Vulnerabilities.
Proceedings of the Information Systems Security - 13th International Conference, 2017

Four languages and lots of macros: analyzing autotools build systems.
Proceedings of the 16th ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences, 2017

2016
Statically-Informed Dynamic Analysis Tools to Detect Algorithmic Complexity Vulnerabilities.
Proceedings of the 16th IEEE International Working Conference on Source Code Analysis and Manipulation, 2016

Human-machine resolution of Invisible Control Flow?
Proceedings of the 24th IEEE International Conference on Program Comprehension, 2016

Insights for Practicing Engineers from a Formal Verification Study of the Linux Kernel.
Proceedings of the 2016 IEEE International Symposium on Software Reliability Engineering Workshops, 2016

Let's verify Linux: accelerated learning of analytical reasoning through automation and collaboration.
Proceedings of the 38th International Conference on Software Engineering, 2016

Rethinking verification: accuracy, efficiency and scalability through human-machine collaboration.
Proceedings of the 38th International Conference on Software Engineering, 2016

Software engineering research lab to airplanes, orion and beyond: one professor's journey shaped by industry-university collaboration.
Proceedings of the 3rd International Workshop on Software Engineering Research and Industrial Practice, 2016

Projected Control Graph for Accurate and Efficient Analysis of Safety and Security Vulnerabilities.
Proceedings of the 23rd Asia-Pacific Software Engineering Conference, 2016

2015
Security Toolbox for Detecting Novel and Sophisticated Android Malware.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

FlowMiner: Automatic Summarization of Library Data-Flow for Malware Analysis.
Proceedings of the Information Systems Security - 11th International Conference, 2015

2014
Event-Flow Graphs for Efficient Path-Sensitive Analyses.
CoRR, 2014

A "Human-in-the-loop" approach for resolving complex software anomalies.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014

Atlas: a new way to explore software, build analysis tools.
Proceedings of the 36th International Conference on Software Engineering, 2014

2013
Computational modeling to detect software sabotage: A discussion of technical challenges and a demonstration of innovative technology.
Proceedings of the IEEE 24th International Symposium on Software Reliability Engineering, 2013

2003
Space and time efficient parallel algorithms and software for EST clustering.
IEEE Trans. Parallel Distributed Syst., 2003

2002
Parallel EST Clustering.
Proceedings of the 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 2002

Space and Time Efficient Parallel Algorithms and Software for EST Clustering.
Proceedings of the 31st International Conference on Parallel Processing (ICPP 2002), 2002

2000
ParAgent: A Domain-Specific Semi-automatic Parallelization Tool.
Proceedings of the High Performance Computing, 2000

1997
Parallel Implementation of Hydrostatic MM5.
Proceedings of the Eighth SIAM Conference on Parallel Processing for Scientific Computing, 1997

1995
CMP: A Memory-Constrained Scalability Metric.
Proceedings of the Seventh SIAM Conference on Parallel Processing for Scientific Computing, 1995

1994
Adaptation of the relaxation method for learning in bidirectional associative memory.
IEEE Trans. Neural Networks, 1994

A Memory Constrained Scalability Metric.
Proceedings of the 1994 International Conference on Parallel Processing, 1994

1993
Neural Networks for Pattern Recognition.
Adv. Comput., 1993

1992
Probabilistic Information Capacity of Hopfield Associative Memory.
Complex Syst., 1992

1990
On Optimal Parallelization of Sorting Networks.
Theor. Comput. Sci., 1990

Testing arbitrary subhypergraphs for the lossless join property.
Inf. Sci., 1990

1989
On Computing the Combinatorial Power of SW-Banyan Networks.
IEEE Trans. Computers, 1989

Optimal Designs of Linear Flow Systolic Architectures.
Proceedings of the International Conference on Parallel Processing, 1989

1988
The Kappa Network with Fault-Tolerant Destination Tag Algorithm.
IEEE Trans. Computers, 1988

A Multipath Network with Cross Links.
J. Parallel Distributed Comput., 1988

Performance analysis of multistage interconnection networks with redundant links.
Inf. Sci., 1988

Completeness Issues for Join Dependencies Derived from the Universal Relation Join Dependency.
Inf. Process. Lett., 1988

Performance Analysis of Multipath Mulistage Interconnection Networks.
Proceedings of the 1988 ACM SIGMETRICS conference on Measurement and modeling of computer systems, 1988

1987
Multistage Interconnection Networks for Multiprocessor Systems.
Adv. Comput., 1987

1985
General Algorithms for the Address Calculation of Lexicographically Ordered Tuples.
Inf. Process. Lett., 1985

1984
Generalized Linear Threshold Scheme.
Proceedings of the Advances in Cryptology, 1984

1983
A Condition Known to be Sufficient for Rearrangeability of the Benes Class of Interconnection Networks with 2x2 Switches Is Also Necessary.
Proceedings of the International Conference on Parallel Processing, 1983


  Loading...