default search action
Peter Aldous
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j4]Cyrille Artho, Quoc-Sang Phan, Peter Aldous, Alyas Almaawi, Lucas Bang, Lasse Berglund, Tevfik Bultan, Zhenbang Chen, Hayes Converse, Wei Dong, William Eiers, Milos Gligoric, Simon Goldsmith, Lars Grunske, Joshua Hooker, Ismet Burak Kadron, Timo Kehrer, Sarfraz Khurshid, Xuan-Bach Dinh Le, David Lo, Eric Mercer, Sasa Misailovic, Egor Namakonov, Hoang Lam Nguyen, Yannic Noller, Benjamin Ogles, Rohan Padhye, Pavel Parízek, Corina S. Pasareanu, Sheridan Jacob Powell, Seemanta Saha, Koushik Sen, Elena Sherman, Kyle Storey, Minxing Tang, Willem Visser, Ji Wang, Hengbiao Yu:
The Java Pathfinder Workshop 2019. ACM SIGSOFT Softw. Eng. Notes 45(2): 20-22 (2020)
2010 – 2019
- 2019
- [j3]Radha Nakade, Eric Mercer
, Peter Aldous
, Kyle Storey, Benjamin Ogles, Joshua Hooker, Sheridan Jacob Powell, Jay McCarthy:
Model-checking task-parallel programs for data-race. Innov. Syst. Softw. Eng. 15(3-4): 289-306 (2019) - [j2]Joshua Hooker, Peter Aldous, Eric Mercer, Benjamin Ogles, Kyle Storey, Sheridan Jacob Powell:
JPF-HJ: A Tool for Task Parallel Program Analysis. ACM SIGSOFT Softw. Eng. Notes 44(4): 19 (2019) - [c6]Benjamin Ogles
, Peter Aldous, Eric Mercer:
Proving Data Race Freedom in Task Parallel Programs Using a Weaker Partial Order. FMCAD 2019: 55-63 - 2018
- [j1]Joseph Jones, James Wasson, Sean Brown, Seth Poulsen
, Peter Aldous, Eric Mercer:
Memory safety in C by abstract interpretation. ACM SIGSOFT Softw. Eng. Notes 43(4): 56 (2018) - [c5]Kyle Storey, Sheridan Jacob Powell, Benjamin Ogles, Joshua Hooker, Peter Aldous
, Eric Mercer
:
Optimized Sound and Complete Data Race Detection in Structured Parallel Programs. LCPC 2018: 94-111 - [c4]Radha Nakade, Eric Mercer
, Peter Aldous
, Jay McCarthy:
Model-Checking Task Parallel Programs for Data-Race. NFM 2018: 367-382 - 2017
- [b1]Peter Aldous:
Noninterference in Expressive Low-Level Languages. University of Utah, USA, 2017 - 2016
- [c3]Peter Aldous, Matthew Might:
A Posteriori Taint-Tracking for Demonstrating Non-interference in Expressive Low-Level Languages. IEEE Symposium on Security and Privacy Workshops 2016: 179-184 - 2015
- [c2]Peter Aldous
, Matthew Might:
Static Analysis of Non-interference in Expressive Low-Level Languages. SAS 2015: 1-17 - 2013
- [c1]Shuying Liang, Andrew W. Keep, Matthew Might, Steven Lyde, Thomas Gilray, Petey Aldous
, David Van Horn
:
Sound and precise malware analysis for android via pushdown reachability and entry-point saturation. SPSM@CCS 2013: 21-32 - [i1]Shuying Liang, Andrew W. Keep, Matthew Might, Steven Lyde, Thomas Gilray, Petey Aldous, David Van Horn:
Sound and Precise Malware Analysis for Android via Pushdown Reachability and Entry-Point Saturation. CoRR abs/1311.4201 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:54 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint