Follow
Scott D. Stoller
Scott D. Stoller
Professor of Computer Science, Stony Brook University
Verified email at cs.stonybrook.edu - Homepage
Title
Cited by
Cited by
Year
{SLEUTH}: Real-time attack scenario reconstruction from {COTS} audit data
MN Hossain, SM Milajerdi, J Wang, B Eshete, R Gjomemo, R Sekar, ...
26th USENIX Security Symposium (USENIX Security 17), 487-504, 2017
2742017
Runtime analysis of atomicity for multithreaded programs
L Wang, SD Stoller
IEEE Transactions on Software Engineering 32 (2), 93-110, 2006
2202006
ACTION-EHR: Patient-centric blockchain-based electronic health record data management for cancer care
A Dubovitskaya, F Baig, Z Xu, R Shukla, PS Zambani, A Swaminathan, ...
Journal of medical Internet research 22 (8), e13598, 2020
2092020
Transverse spin relaxation in inhomogeneous magnetic fields
SD Stoller, W Happer, FJ Dyson
Physical Review A 44 (11), 7459, 1991
1861991
Mining attribute-based access control policies
Z Xu, SD Stoller
IEEE Transactions on Dependable and Secure Computing 12 (5), 533-545, 2014
1712014
Efficient policy analysis for administrative role based access control
SD Stoller, P Yang, CR Ramakrishnan, MI Gofman
Proceedings of the 14th ACM conference on Computer and communications …, 2007
1622007
Testing concurrent Java programs using randomized scheduling
SD Stoller
Electronic Notes in Theoretical Computer Science 70 (4), 142-157, 2002
1572002
Cryptographic support for fault-tolerant distributed computing
Y Minsky, R Van Renesse, FB Schneider, SD Stoller
Proceedings of the 7th workshop on ACM SIGOPS European workshop: Systems …, 1996
1541996
Runtime verification with state estimation
SD Stoller, E Bartocci, J Seyster, R Grosu, K Havelund, SA Smolka, ...
Runtime Verification: Second International Conference, RV 2011, San …, 2012
1502012
Model-checking multi-threaded distributed Java programs
SD Stoller
International SPIN Workshop on Model Checking of Software, 224-244, 2000
1472000
{Dependence-Preserving} data compaction for scalable forensic analysis
MN Hossain, J Wang, O Weisse, R Sekar, D Genkin, B He, SD Stoller, ...
27th USENIX Security Symposium (USENIX Security 18), 1723-1740, 2018
1442018
Policy analysis for administrative role-based access control
A Sasturkar, P Yang, SD Stoller, CR Ramakrishnan
Theoretical Computer Science 412 (44), 6208-6234, 2011
1402011
Accurate and efficient runtime detection of atomicity errors in concurrent programs
L Wang, SD Stoller
Proceedings of the eleventh ACM SIGPLAN symposium on Principles and practice …, 2006
1382006
Static caching for incremental computation
YA Liu, SD Stoller, T Teitelbaum
ACM Transactions on Programming Languages and Systems (TOPLAS) 20 (3), 546-585, 1998
1241998
Automated type-based analysis of data races and atomicity
A Sasturkar, R Agarwal, L Wang, SD Stoller
Proceedings of the tenth ACM SIGPLAN symposium on Principles and practice of …, 2005
1222005
Detecting global predicates in distributed systems with clocks
SD Stoller
Distributed Computing 13 (2), 85-98, 2000
1202000
Detecting potential deadlocks with static analysis and run-time monitoring
R Agarwal, L Wang, SD Stoller
Haifa Verification Conference, 191-207, 2005
1172005
From recursion to iteration: what are the optimizations?
YA Liu, SD Stoller
Proceedings of the 2000 ACM SIGPLAN workshop on Partial evaluation and …, 1999
1171999
Towards a framework and a benchmark for testing tools for multi‐threaded programs
Y Eytani, K Havelund, SD Stoller, S Ur
Concurrency and Computation: Practice and Experience 19 (3), 267-279, 2007
1042007
Adaptive Runtime Verification
E Bartocci, R Grosu, A Karmarkar, SA Smolka, SD Stoller, E Zadok, ...
Third International Conference on Runtime Verification (RV 2012), 0
101*
The system can't perform the operation now. Try again later.
Articles 1–20