Alex Aiken
Alex Aiken
Professor of Computer Science, Stanford University
Verified email at cs.stanford.edu - Homepage
Title
Cited by
Cited by
Year
Winnowing: local algorithms for document fingerprinting
S Schleimer, DS Wilkerson, A Aiken
Proceedings of the 2003 ACM SIGMOD international conference on Management of …, 2003
13862003
A first step towards automated detection of buffer overrun vulnerabilities.
DA Wagner, JS Foster, EA Brewer, A Aiken
NDSS 20 (0), 0, 2000
9752000
Scalable statistical bug isolation
B Liblit, M Naik, AX Zheng, A Aiken, MI Jordan
Acm Sigplan Notices 40 (6), 15-26, 2005
9222005
Bug Isolation via Remote Program Sampling
A Aiken
Proceedings of the ACM SIGPLAN 2003 Conference on Programming Language …, 2003
706*2003
Titanium: a high‐performance Java dialect
K Yelick, L Semenzato, G Pike, C Miyamoto, B Liblit, A Krishnamurthy, ...
Concurrency and Computation: Practice and Experience 10 (11‐13), 825-836, 1998
6711998
Sequoia: programming the memory hierarchy
K Fatahalian, DR Horn, TJ Knight, L Leem, M Houston, JY Park, M Erez, ...
Proceedings of the 2006 ACM/IEEE Conference on Supercomputing, 83, 2006
6152006
Effective static race detection for Java
M Naik, A Aiken, J Whaley
Proceedings of the 27th ACM SIGPLAN Conference on Programming Language …, 2006
6062006
Static Detection of Security Vulnerabilities in Scripting Languages.
Y Xie, A Aiken
USENIX Security Symposium 15, 179-192, 2006
4872006
Legion: Expressing locality and independence with logical regions
M Bauer, S Treichler, E Slaughter, A Aiken
SC'12: Proceedings of the International Conference on High Performance …, 2012
4592012
Flow-sensitive type qualifiers
JS Foster, T Terauchi, A Aiken
Proceedings of the ACM SIGPLAN 2002 Conference on Programming language …, 2002
4332002
Type inclusion constraints and type inference
A Aiken, EL Wimmers
Proceedings of the conference on Functional programming languages and …, 1993
4221993
A theory of type qualifiers
JS Foster, M Fähndrich, A Aiken
ACM SIGPLAN Notices 34 (5), 192-203, 1999
3641999
Apposcopy: Semantics-based detection of android malware through static analysis
Y Feng, S Anand, I Dillig, A Aiken
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations …, 2014
3622014
Optimal loop parallelization
A Aiken, A Nicolau
ACM SIGPLAN Notices 23 (7), 308-317, 1988
3581988
Behavior of database production rules: Termination, confluence, and observable determinism
A Aiken, J Widom, JM Hellerstein
Proceedings of the 1992 ACM SIGMOD international conference on Management of …, 1992
3161992
Soft typing with conditional types
A Aiken, EL Wimmers, TK Lakshman
Proceedings of the 21st ACM SIGPLAN-SIGACT symposium on Principles of …, 1994
3021994
Secure information flow as a safety problem
T Terauchi, A Aiken
International Static Analysis Symposium, 352-367, 2005
2922005
Attack-Resistant Trust Metrics for Public Key Certification.
R Levien, A Aiken
Usenix security symposium, 229-242, 1998
2831998
Liszt: a domain specific language for building portable mesh-based PDE solvers
Z DeVito, N Joubert, F Palacios, S Oakley, M Medina, M Barrientos, ...
Proceedings of 2011 International Conference for High Performance Computing …, 2011
2812011
Partial online cycle elimination in inclusion constraint graphs
M Fähndrich, JS Foster, Z Su, A Aiken
Proceedings of the ACM SIGPLAN 1998 conference on Programming language …, 1998
2611998
The system can't perform the operation now. Try again later.
Articles 1–20