Tevfik Bultan

Affiliations: 
Computer Science University of California, Santa Barbara, Santa Barbara, CA, United States 
Google:
"Tevfik Bultan"
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Bocić I, Bultan T, Rosner N. (2018) Inductive verification of data model invariants in web applications using first-order logic Automated Software Engineering. 26: 379-416
Bocić I, Bultan T. (2016) Efficient data model verification with many-sorted logic Proceedings - 2015 30th Ieee/Acm International Conference On Automated Software Engineering, Ase 2015. 42-52
Basu S, Bultan T. (2016) On deciding synchronizability for asynchronously communicating systems Theoretical Computer Science. 656: 60-75
Basu S, Bultan T. (2016) Automated choreography repair Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9633: 13-30
Nijjar J, Bocić I, Bultan T. (2015) Data model property inference, verification, and repair for web applications Acm Transactions On Software Engineering and Methodology. 24
Lü J, Rosenblum DS, Bultan T, et al. (2015) Roundtable: The future of software engineering for internet computing Ieee Software. 32: 91-97
Aydin A, Bang L, Bultan T. (2015) Automata-based model counting for string constraints Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9206: 255-272
Bocić I, Bultan T. (2015) Data model bugs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9058: 393-399
Aydin A, Alkhalaf M, Bultan T. (2014) Automated test generation from vulnerability signatures Proceedings - Ieee 7th International Conference On Software Testing, Verification and Validation, Icst 2014. 193-202
Yu F, Alkhalaf M, Bultan T, et al. (2014) Automata-based symbolic string analysis for vulnerability detection Formal Methods in System Design. 44: 44-70
See more...