default search action
Brian Demsky
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c42]Ahamed Al Nahian, Brian Demsky:
FlowProf: Profiling Multi-threaded Programs using Information-Flow. CC 2024: 137-149 - 2022
- [c41]Hamed Gorjiara, Guoqing Harry Xu, Brian Demsky:
Yashme: detecting persistency races. ASPLOS 2022: 830-845 - [c40]Hamed Gorjiara, Weiyu Luo, Alex Lee, Guoqing Harry Xu, Brian Demsky:
Checking robustness to weak persistency models. PLDI 2022: 490-505 - [c39]Rahmadi Trimananda, Weiyu Luo, Brian Demsky, Guoqing Harry Xu:
Stateful Dynamic Partial Order Reduction for Model Checking Event-Driven Applications that Do Not Terminate. VMCAI 2022: 400-424 - 2021
- [c38]Hamed Gorjiara, Guoqing Harry Xu, Brian Demsky:
Jaaru: efficiently model checking persistent memory programs. ASPLOS 2021: 415-428 - [c37]Weiyu Luo, Brian Demsky:
C11Tester: a race detector for C/C++ atomics. ASPLOS 2021: 630-646 - [i4]Weiyu Luo, Brian Demsky:
C11Tester: A Race Detector for C/C++ Atomics Technical Report. CoRR abs/2102.07901 (2021) - [i3]Rahmadi Trimananda, Weiyu Luo, Brian Demsky, Guoqing Harry Xu:
Stateful Dynamic Partial Order Reduction for Model Checking Event-Driven Applications that Do Not Terminate. CoRR abs/2111.05290 (2021) - 2020
- [j12]Hamed Gorjiara, Guoqing Harry Xu, Brian Demsky:
Satune: synthesizing efficient SAT encoders. Proc. ACM Program. Lang. 4(OOPSLA): 146:1-146:32 (2020) - [c36]Rahmadi Trimananda, Janus Varmarken, Athina Markopoulou, Brian Demsky:
Packet-Level Signatures for Smart Home Devices. NDSS 2020 - [c35]Rahmadi Trimananda, Seyed Amir Hossein Aqajari, Jason Chuang, Brian Demsky, Guoqing Harry Xu, Shan Lu:
Understanding and automatically detecting conflicting interactions between smart home IoT applications. ESEC/SIGSOFT FSE 2020: 1215-1227 - [i2]Rahmadi Trimananda, Ali Younis, Thomas Kwa, Brian Demsky, Harry Xu:
Securing Smart Home Edge Devices against Compromised Cloud Servers. CoRR abs/2006.11657 (2020)
2010 – 2019
- 2019
- [c34]Christian Navasca, Cheng Cai, Khanh Nguyen, Brian Demsky, Shan Lu, Miryung Kim, Guoqing Harry Xu:
Gerenuk: thin computation over big native data using speculative program transformation. SOSP 2019: 538-553 - [i1]Rahmadi Trimananda, Janus Varmarken, Athina Markopoulou, Brian Demsky:
PingPong: Packet-Level Signatures for Smart Home Device Events. CoRR abs/1907.11797 (2019) - 2018
- [j11]Peizhao Ou, Brian Demsky:
Towards understanding the costs of avoiding out-of-thin-air results. Proc. ACM Program. Lang. 2(OOPSLA): 136:1-136:29 (2018) - [c33]Khanh Nguyen, Lu Fang, Christian Navasca, Guoqing Xu, Brian Demsky, Shan Lu:
Skyway: Connecting Managed Heaps in Distributed Big Data Systems. ASPLOS 2018: 56-69 - [c32]Rahmadi Trimananda, Ali Younis, Bojun Wang, Bin Xu, Brian Demsky, Guoqing Harry Xu:
Vigilia: Securing Smart Home Edge Computing. SEC 2018: 74-89 - 2017
- [c31]Byron Hawkins, Brian Demsky:
ZenIDS: introspective intrusion detection for PHP applications. ICSE 2017: 232-243 - [c30]Peizhao Ou, Brian Demsky:
Checking Concurrent Data Structures Under the C/C++11 Memory Model. PPoPP 2017: 45-59 - 2016
- [j10]Brian Norris, Brian Demsky:
A Practical Approach for Model Checking C/C++11 Code. ACM Trans. Program. Lang. Syst. 38(3): 10:1-10:51 (2016) - [c29]Byron Hawkins, Brian Demsky, Michael B. Taylor:
BlackBox: lightweight security monitoring for COTS binaries. CGO 2016: 261-272 - [c28]Khanh Nguyen, Lu Fang, Guoqing Xu, Brian Demsky, Shan Lu, Sanazsadat Alamian, Onur Mutlu:
Yak: A High-Performance Big-Data-Friendly Garbage Collector. OSDI 2016: 349-365 - 2015
- [c27]Byron Hawkins, Brian Demsky, Derek Bruening, Qin Zhao:
Optimizing binary translation of dynamically generated code. CGO 2015: 68-78 - [c26]Brian Demsky, Patrick Lam:
SATCheck: SAT-directed stateless model checking for SC and TSO. OOPSLA 2015: 20-36 - [c25]Peizhao Ou, Brian Demsky:
AutoMO: automatic inference of memory order parameters for C/C++11. OOPSLA 2015: 221-240 - [c24]Khanh Nguyen, Lu Fang, Guoqing Xu, Brian Demsky:
Speculative region-based memory management for big data systems. PLOS@SOSP 2015: 27-32 - [c23]Lu Fang, Khanh Nguyen, Guoqing Xu, Brian Demsky, Shan Lu:
Interruptible tasks: treating memory pressure as interrupts for highly scalable data-parallel programs. SOSP 2015: 394-409 - 2014
- [c22]Hans-Juergen Boehm, Brian Demsky:
Outlawing ghosts: avoiding out-of-thin-air results. MSPC@PLDI 2014: 7:1-7:6 - [c21]Loi Luu, Shweta Shinde, Prateek Saxena, Brian Demsky:
A model counter for constraints over unbounded strings. PLDI 2014: 565-576 - 2013
- [j9]Brian Demsky, Patrick Lam:
Views: Synthesizing fine-grained concurrency control. ACM Trans. Softw. Eng. Methodol. 22(1): 4:1-4:33 (2013) - [c20]Yong Hun Eom, Brian Demsky:
Sinfer: Inferring information flow lattices for checking self-stabilization. ISSRE 2013: 258-267 - [c19]Brian Norris, Brian Demsky:
CDSchecker: checking concurrent data structures written with C/C++ atomics. OOPSLA 2013: 131-150 - 2012
- [c18]Jin Zhou, Brian Demsky:
Memory management for many-core processors with software configurable locality policies. ISMM 2012: 3-14 - [c17]Yong Hun Eom, Brian Demsky:
Self-stabilizing Java. PLDI 2012: 287-298 - [c16]Yong Hun Eom, Stephen Yang, James Christopher Jenista, Brian Demsky:
DOJ: dynamically parallelizing object-oriented programs. PPoPP 2012: 85-96 - 2011
- [j8]Brian Demsky:
Using Discrete Event Simulation to Analyze Contention Managers. Int. J. Parallel Program. 39(6): 783-808 (2011) - [j7]Brian Demsky, Navid Farri Tehrany:
Integrating file operations into transactional memory. J. Parallel Distributed Comput. 71(10): 1293-1304 (2011) - [j6]Brian Demsky:
Cross-application data provenance and policy enforcement. ACM Trans. Inf. Syst. Secur. 14(1): 6:1-6:22 (2011) - [j5]Alokika Dash, Brian Demsky:
Integrating Caching and Prefetching Mechanisms in a Distributed Transactional Memory. IEEE Trans. Parallel Distributed Syst. 22(8): 1284-1298 (2011) - [j4]Brian Demsky, Sivaji Sundaramurthy:
Bristlecone: Language Support for Robust Software Applications. IEEE Trans. Software Eng. 37(1): 4-23 (2011) - [c15]James Christopher Jenista, Yong Hun Eom, Brian Demsky:
Using Disjoint Reachability for Parallelization. CC 2011: 198-224 - [c14]James Christopher Jenista, Yong Hun Eom, Brian Demsky:
OoOJava: software out-of-order execution. PPoPP 2011: 57-68 - 2010
- [j3]Alex Edwards, Sean Tucker, Brian Demsky:
AFID: an automated approach to collecting software faults. Autom. Softw. Eng. 17(3): 347-372 (2010) - [c13]Brian Demsky, Patrick Lam:
Views: object-inspired concurrency control. ICSE (1) 2010: 395-404 - [c12]Alokika Dash, Brian Demsky:
Automatically Generating Symbolic Prefetches for Distributed Transactional Memories. Middleware 2010: 355-375 - [c11]Jin Zhou, Brian Demsky:
Bamboo: a data-centric, object-oriented approach to many-core software. PLDI 2010: 388-399 - [c10]Alokika Dash, Brian Demsky:
Symbolic prefetching in transactional distributed shared memory. PPoPP 2010: 331-332 - [c9]Brian Demsky, Jin Zhou, William Montaz:
Recovery Tasks: An Automated Approach to Failure Recovery. RV 2010: 229-244 - [p1]Jin Zhou, Brian Demsky:
Automatically Tuning Task-Based Programs for Multicore Processors. Software Automatic Tuning, From Concepts to State-of-the-Art Results 2010: 315-334
2000 – 2009
- 2009
- [j2]Brian Demsky, Martin C. Rinard:
Automatic Extraction of Heap Reference Properties in Object-Oriented Programs. IEEE Trans. Software Eng. 35(3): 305-324 (2009) - [c8]Alokika Dash, Brian Demsky:
Software transactional distributed shared memory. PPoPP 2009: 297-298 - 2008
- [c7]Brian Demsky, Alokika Dash:
Bristlecone: A Language for Robust Software Systems. ECOOP 2008: 490-515 - [c6]Alex Edwards, Sean Tucker, Sébastien Worms, Rahul Vaidya, Brian Demsky:
AFID: an automated fault identification tool. ISSTA 2008: 179-188 - 2006
- [b1]Brian Demsky:
Data structure repair using goal-directed reasoning. Massachusetts Institute of Technology, Cambridge, MA, USA, 2006 - [j1]Brian Demsky, Martin C. Rinard:
Goal-Directed Reasoning for Specification-Based Data Structure Repair. IEEE Trans. Software Eng. 32(12): 931-951 (2006) - [c5]Brian Demsky, Michael D. Ernst, Philip J. Guo, Stephen McCamant, Jeff H. Perkins, Martin C. Rinard:
Inference and enforcement of data structure consistency specifications. ISSTA 2006: 233-244 - 2005
- [c4]Brian Demsky, Martin C. Rinard:
Data structure repair using goal-directed reasoning. ICSE 2005: 176-185 - 2003
- [c3]Brian Demsky, Martin C. Rinard:
Static Specification Analysis for Termination of Specification-Based Data Structure Repair. ISSRE 2003: 71-84 - [c2]Brian Demsky, Martin C. Rinard:
Automatic detection and repair of errors in data structures. OOPSLA 2003: 78-95 - 2002
- [c1]Brian Demsky, Martin C. Rinard:
Role-based exploration of object-oriented programs. ICSE 2002: 313-334
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:39 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint