Subodh Sharma
Subodh Sharma
Verified email at - Homepage
Cited by
Cited by
Zeus: analyzing safety of smart contracts.
S Kalra, S Goel, M Dhawan, S Sharma
Ndss, 1-12, 2018
ISP: a tool for model checking MPI programs
SS Vakkalanka, S Sharma, G Gopalakrishnan, RM Kirby
Proceedings of the 13th ACM SIGPLAN Symposium on Principles and practice of …, 2008
Precise predictive analysis for discovering communication deadlocks in MPI programs
V Forejt, D Kroening, G Narayanaswamy, S Sharma
FM 2014: Formal Methods: 19th International Symposium, Singapore, May 12-16 …, 2014
Unfolding-based partial order reduction
C Rodríguez, M Sousa, S Sharma, D Kroening
arXiv preprint arXiv:1507.00980, 2015
Privacy and security of Aadhaar: a computer science perspective
S Agrawal, S Banerjee, S Sharma
Economic and Political Weekly, 93-102, 2017
MCC: A runtime verification tool for MCAPI user applications
S Sharma, G Gopalakrishnan, E Mercer, J Holt
2009 Formal Methods in Computer-Aided Design, 41-44, 2009
A formal approach to detect functionally irrelevant barriers in MPI programs
S Sharma, S Vakkalanka, G Gopalakrishnan, RM Kirby, R Thakur, ...
European Parallel Virtual Machine/Message Passing Interface Users’ Group …, 2008
Reliable decentralized oracle with mechanisms for verification and disputation
L Ma, K Kaneko, S Sharma, K Sakurai
2019 Seventh International Symposium on Computing and Networking Workshops …, 2019
Dynamic symbolic verification of MPI programs
D Khanna, S Sharma, C Rodríguez, R Purandare
Formal Methods: 22nd International Symposium, FM 2018, Held as Part of the …, 2018
Accelerated test execution using gpus
A Rajan, S Sharma, P Schrammel, D Kroening
Proceedings of the 29th ACM/IEEE international conference on Automated …, 2014
A survey of MPI related debuggers and tools
SV Sharma, G Gopalakrishnan, RM Kirby
Researchgate-Article, 2007
Suppressing chain size of blockchain-based information sharing for swarm robotic systems
Y Nishida, K Kaneko, S Sharma, K Sakurai
2018 Sixth International Symposium on Computing and Networking Workshops …, 2018
POLLUX: safely upgrading dependent application libraries
S Kalra, A Goel, D Khanna, M Dhawan, S Sharma, R Purandare
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016
A sound reduction of persistent-sets for deadlock detection in MPI applications
S Sharma, G Gopalakrishnan, G Bronevetsky
Brazilian Symposium on Formal Methods, 194-209, 2012
Development and validation of serious games for teaching cybersecurity
S Kulshrestha, S Agrawal, D Gaurav, M Chaturvedi, S Sharma, R Bose
Serious Games: Joint International Conference, JCSG 2021, Virtual Event …, 2021
Privacy concerns with Aadhaar
S Banerjee, S Sharma
Communications of the ACM 62 (11), 80-80, 2019
PACKUARIUM: network packet visualization using mixed reality for detecting bot IoT device of DDoS attack
K Kaneko, Y Tsutsumi, S Sharma, Y Okada
Advances in Internet, Data and Web Technologies: The 8th International …, 2020
Some resources for teaching concurrency
G Gopalakrishnan, Y Yang, S Vakkalanka, A Vo, S Aananthakrishnan, ...
Proceedings of the 7th Workshop on Parallel and Distributed Systems: Testing …, 2009
Thread-modular analysis of release-acquire concurrency
D Sharma, S Sharma
Static Analysis: 28th International Symposium, SAS 2021, Chicago, IL, USA …, 2021
An offline alternative for Aadhaar-based biometric authenti-cation
S Banerjee, S Sharma
Ideas for India. https://www. ideasforindia. in/topics/productivity …, 2018
The system can't perform the operation now. Try again later.
Articles 1–20