Alex Aiken
Alex Aiken
Professor of Computer Science, Stanford University
Verified email at
TitleCited byYear
Winnowing: local algorithms for document fingerprinting
S Schleimer, DS Wilkerson, A Aiken
Proceedings of the 2003 ACM SIGMOD international conference on Management of …, 2003
A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities.
DA Wagner, JS Foster, EA Brewer, A Aiken
NDSS, 2000-02, 2000
Scalable statistical bug isolation
B Liblit, M Naik, AX Zheng, A Aiken, MI Jordan
Acm Sigplan Notices 40 (6), 15-26, 2005
Bug Isolation via Remote Program Sampling
A Aiken
Proceedings of the ACM SIGPLAN 2003 Conference on Programming Language …, 2003
Titanium: a high‐performance Java dialect
K Yelick, L Semenzato, G Pike, C Miyamoto, B Liblit, A Krishnamurthy, ...
Concurrency and Computation: Practice and Experience 10 (11‐13), 825-836, 1998
Sequoia: programming the memory hierarchy
K Fatahalian, DR Horn, TJ Knight, L Leem, M Houston, JY Park, M Erez, ...
Proceedings of the 2006 ACM/IEEE Conference on Supercomputing, 83, 2006
Effective static race detection for Java
M Naik, A Aiken, J Whaley
ACM Sigplan Notices 41 (6), 308-319, 2006
Static Detection of Security Vulnerabilities in Scripting Languages.
Y Xie, A Aiken
USENIX Security Symposium 15, 179-192, 2006
Flow-sensitive type qualifiers
JS Foster, T Terauchi, A Aiken
ACM SIGPLAN Notices 37 (5), 1-12, 2002
Type inclusion constraints and type inference
A Aiken, EL Wimmers
FPCA 93, 31-41, 1993
Legion: Expressing locality and independence with logical regions
M Bauer, S Treichler, E Slaughter, A Aiken
SC'12: Proceedings of the International Conference on High Performance …, 2012
Optimal loop parallelization
A Aiken, A Nicolau
Cornell University, 1988
A theory of type qualifiers
JS Foster, M Fähndrich, A Aiken
ACM SIGPLAN Notices 34 (5), 192-203, 1999
Behavior of database production rules: Termination, confluence, and observable determinism
A Aiken, J Widom, JM Hellerstein
ACM SIGMOD Record 21 (2), 59-68, 1992
Apposcopy: Semantics-based detection of android malware through static analysis
Y Feng, S Anand, I Dillig, A Aiken
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations …, 2014
Soft typing with conditional types
A Aiken, EL Wimmers, TK Lakshman
Proceedings of the 21st ACM SIGPLAN-SIGACT symposium on Principles of …, 1994
Attack-Resistant Trust Metrics for Public Key Certification.
R Levien, A Aiken
USENIX Security Symposium, 229-242, 1998
Secure information flow as a safety problem
T Terauchi, A Aiken
International Static Analysis Symposium, 352-367, 2005
Memory management with explicit regions
D Gay, A Aiken
ACM SIGPLAN Notices 33 (5), 313-323, 1998
Liszt: a domain specific language for building portable mesh-based PDE solvers
Z DeVito, N Joubert, F Palacios, S Oakley, M Medina, M Barrientos, ...
Proceedings of 2011 International Conference for High Performance Computing …, 2011
The system can't perform the operation now. Try again later.
Articles 1–20