Barbara G. Ryder - Publications

Affiliations: 
Rutgers University, New Brunswick, New Brunswick, NJ, United States 
Area:
Computer Science

78 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Cai H, Ryder BG. A Longitudinal Study of Application Structure and Behaviors in Android Ieee Transactions On Software Engineering. 1-1. DOI: 10.1109/Tse.2020.2975176  0.382
2020 Elish KO, Cai H, Barton D, Yao D, Ryder BG. Identifying Mobile Inter-App Communication Risks Ieee Transactions On Mobile Computing. 19: 90-102. DOI: 10.1109/Tmc.2018.2889495  0.32
2020 Tian K, Yao D, Ryder BG, Tan G, Peng G. Detection of Repackaged Android Malware with Code-Heterogeneity Features Ieee Transactions On Dependable and Secure Computing. 17: 64-77. DOI: 10.1109/Tdsc.2017.2745575  0.371
2020 Tian K, Tan G, Ryder BG, Yao D(. Prioritizing data flows and sinks for app security transformation Computers & Security. 92: 101750. DOI: 10.1016/J.Cose.2020.101750  0.348
2019 Cai H, Meng N, Ryder B, Yao D. DroidCat: Effective Android Malware Detection and Categorization via App-Level Profiling Ieee Transactions On Information Forensics and Security. 14: 1455-1470. DOI: 10.1109/Tifs.2018.2879302  0.363
2016 Wei S, Xhakaj F, Ryder BG. Empirical study of the dynamic behavior of JavaScript objects Software - Practice and Experience. 46: 867-889. DOI: 10.1002/Spe.2334  0.432
2015 Wei S, Ryder BG. Adaptive context-sensitive analysis for JavaScript Leibniz International Proceedings in Informatics, Lipics. 37: 712-734. DOI: 10.4230/LIPIcs.ECOOP.2015.712  0.396
2015 Xu K, Yao D, Ryder BG, Tian K. Probabilistic Program Modeling for High-Precision Anomaly Classification Proceedings of the Computer Security Foundations Workshop. 2015: 497-511. DOI: 10.1109/CSF.2015.37  0.363
2015 Elish KO, Shu X, Yao D, Ryder BG, Jiang X. Profiling user-trigger dependence for Android malware detection Computers and Security. 49: 255-273. DOI: 10.1016/J.Cose.2014.11.001  0.347
2015 Shu X, Yao D(, Ryder BG. A formal framework for program anomaly detection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9404: 270-292. DOI: 10.1007/978-3-319-26362-5_13  0.338
2014 Wei S, Ryder BG. Taming the dynamic behavior of JavaScript Splash 2014 - Companion Publication of the 2014 Acm Sigplan Conference On Systems, Programming, and Applications: Software For Humanity. 61-62. DOI: 10.1145/2660252.2660393  0.346
2014 Wei S, Ryder BG. State-sensitive points-to analysis for the dynamic behavior of JavaScript objects Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8586: 1-26. DOI: 10.1007/978-3-662-44202-9_1  0.302
2012 Ryder BG, Wiedermann B. Language design and analyzability: A retrospective Software - Practice and Experience. 42: 3-18. DOI: 10.1002/Spe.1133  0.462
2011 Fisher M, Wloka J, Tip F, Ryder BG, Luchansky A. An evaluation of change-based coverage criteria Acm Sigplan/Sigsoft Workshop On Program Analysis For Software Tools and Engineering. 21-28. DOI: 10.1145/2024569.2024575  0.302
2010 Fisher M, Marrs L, Ryder BG. HI-C: Diagnosing object churn in framework-based applications Proceedings of the Acm Sigsoft Symposium On the Foundations of Software Engineering. 379-380. DOI: 10.1145/1882291.1882358  0.347
2010 Ryder BG, Zeller A. Introduction: The best papers of ISSTA Ieee Transactions On Software Engineering. 36: 451-452. DOI: 10.1109/Tse.2010.76  0.367
2010 Wloka J, Hoest EW, Ryder BG. Tool support for change-centric test development Ieee Software. 27: 66-71. DOI: 10.1109/Ms.2009.159  0.408
2010 Fisher M, Dufour B, Basu S, Ryder BG. Exploring the impact of context sensitivity on blended analysis Ieee International Conference On Software Maintenance, Icsm. DOI: 10.1109/ICSM.2010.5609695  0.414
2009 Geay E, Pistoia M, Tateishi T, Ryder BG, Dolby J. Modular string-sensitive permission analysis with demand-driven precision Proceedings - International Conference On Software Engineering. 177-187. DOI: 10.1109/ICSE.2009.5070519  0.37
2008 Dufour B, Ryder BG, Sevitsky G. A scalable technique for characterizing the usage of temporaries in framework-intensive Java applications Proceedings of the Acm Sigsoft Symposium On the Foundations of Software Engineering. 59-70. DOI: 10.1145/1453101.1453111  0.584
2007 Dufour B, Ryder BG, Sevitsky G. Blended analysis for performance understanding of framework-based applications 2007 Acm International Symposium On Software Testing and Analysis, Issta'07. 118-128. DOI: 10.1145/1273463.1273480  0.659
2007 Fu C, Ryder BG. Exception-chain analysis: Revealing exception handling architecture in Java server applications Proceedings - International Conference On Software Engineering. 230-239. DOI: 10.1109/ICSE.2007.35  0.312
2007 Chesley OC, Ren X, Ryder BG, Tip F. Crisp - A fault localization tool for Java programs Proceedings - International Conference On Software Engineering. 775-778. DOI: 10.1109/ICSE.2007.29  0.371
2007 Zhang W, Ryder BG. Automatic construction of accurate application call graph with library call abstraction for Java Journal of Software Maintenance and Evolution. 19: 231-252. DOI: 10.1002/Smr.351  0.418
2006 Ren X, Chesley OC, Ryder BG. Identifying failure causes in Java programs: An application of change impact analysis Ieee Transactions On Software Engineering. 32: 718-732. DOI: 10.1109/Tse.2006.90  0.451
2005 Fu C, Ryder BG. Navigating error recovery code in Java applications? Proceedings of the 2005 Oopsla Workshop On Eclipse Technology Exchange, Eclipse'05. 40-44. DOI: 10.1145/1117696.1117705  0.352
2005 Ryder BG, Soffa ML, Burnett M. The impact of software engineering research on modern progamming languages Acm Transactions On Software Engineering and Methodology. 14: 431-477. DOI: 10.1145/1101815.1101818  0.404
2005 Milanova A, Rountev A, Ryder BG. Parameterized object sensitivity for points-to analysis for java Acm Transactions On Software Engineering and Methodology. 14: 1-41. DOI: 10.1145/1044834.1044835  0.697
2005 Fu C, Milanova A, Ryder BG, Wonnacott DG. Robustness testing of Java server applications Ieee Transactions On Software Engineering. 31: 292-311. DOI: 10.1109/Tse.2005.51  0.705
2005 Chesley OC, Ren X, Ryder BG. Crisp: A debugging tool for java programs Ieee International Conference On Software Maintenance, Icsm. 2005: 401-410. DOI: 10.1109/ICSM.2005.37  0.38
2005 Milanova A, Ryder BG. Annotated inclusion constraints for precise flow analysis Ieee International Conference On Software Maintenance, Icsm. 2005: 187-196. DOI: 10.1109/ICSM.2005.24  0.412
2004 Landi W, Ryder BG. A safe approximate algorithm for interprocedural pointer aliasing Acm Sigplan Notices. 39: 476-489. DOI: 10.1145/989393.989440  0.345
2004 Milanova A, Rountev A, Ryder BG. Precise Call Graphs for C Programs with Function Pointers Automated Software Engineering. 11: 7-26. DOI: 10.1023/B:AUSE.0000008666.56394.a1  0.7
2004 Fu C, Ryder BG, Milanova A, Wonnacott D. Testing of java web services for robustness Issta 2004 - Proceedings of the Acm Sigsoft International Symposium On Software Testing and Analysis. 23-33.  0.348
2003 Ryder BG, Soffa ML. Influences on the design of exception handling: ACM SIGSOFT project on the impact of software engineering research on programming language design Sigplan Notices. 38: 16-22. DOI: 10.1145/885638.885644  0.401
2003 Ryder BG, Soffa ML. Influences on the design of exception handling ACM SIGSOFT project on the impact of software engineering research on programming language design Acm Sigsoft Software Engineering Notes. 28: 29-35. DOI: 10.1145/882240.882258  0.401
2003 Rountev A, Milanova A, Ryder BG. Fragment class analysis for testing of polymorphism in Java software Proceedings - International Conference On Software Engineering. 210-220. DOI: 10.1109/Tse.2004.20  0.704
2003 Ryder BG. Dimensions of precision in reference analysis of object-oriented programming languages Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2622: 126-137.  0.441
2002 Milanova A, Rountev A, Ryder BG. Precise call graph construction in the presence of function pointers Scam 2002 - Proceedings, 2nd Ieee International Workshop On Source Code Analysis and Manipulation. 155-162. DOI: 10.1109/SCAM.2002.1134115  0.685
2002 Milanova A, Rountev A, Ryder BG. Constructing precise object relation diagrams Conference On Software Maintenance. 586-595.  0.712
2002 Milanova A, Rountev A, Ryder BG. Parameterized object sensitivity for points-to and side-effect analyses for Java Proceedings of the Acm Sigsoft 2002 International Symposium On Software Testing and Analysis. 1-11.  0.72
2001 Ryder BG, Landi WA, Stocks PA, Zhang S, Altucher R. A Schema for Interprocedural Modification Side-Effect Analysis with Pointer Aliasing Acm Transactions On Programming Languages and Systems. 23: 105-186. DOI: 10.1145/383043.381532  0.45
2001 Chatterjee R, Ryder BG, Landi WA. Complexity of points-to analysis of Java in the presence of exceptions Ieee Transactions On Software Engineering. 27: 481-512. DOI: 10.1109/32.926173  0.488
2001 Arnold M, Hsiao M, Kremer U, Ryder BG. Exploring the interaction between Java's implicitly thrown exceptions and instruction scheduling International Journal of Parallel Programming. 29: 111-137. DOI: 10.1023/A:1007621602134  0.663
2001 Rountev A, Ryder BG. Points-to and side-effect analyses for programs built with precompiled libraries Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2027: 20-36. DOI: 10.1007/3-540-45306-7_3  0.687
2001 Ryder BG, Tip F. Change impact analysis for object-oriented programs Acm Sigplan/Sigsoft Workshop On Program Analysis For Software Tools and Engineering. 46-53.  0.322
2001 Rountev A, Milanova A, Ryder BG. Points-to analysis for Java using annotated constraints Proceedings of the Conference On Object-Oriented Programming Systems, Languages, and Applications, Oopsla. 36: 43-55.  0.711
2000 Ryder B. PLDI '99: Programming language design and implementation Sigplan Notices. 35: 9-10. DOI: 10.1145/345105.345106  0.39
2000 Ryder BG, Smith D, Kremer U, Gordon M, Shah N. A static study of java exceptions using JESP Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1781: 67-81.  0.305
1999 Rountev A, Ryder BG, Landi W. Data-flow analysis of program fragments Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1687: 235-252.  0.696
1998 Zhang S, Ryder BG, Landi WA. Experiments with Combined Analysis for Pointer Aliasing Sigplan Notices (Acm Special Interest Group On Programming Languages). 33: 11-18.  0.397
1998 Chatterjee R, Ryder BG, Landi WA. Complexity of concrete type-inference in the presence of exceptions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1381: 57-74.  0.314
1997 Ryder BG. A Position Paper on Compile-time Program Analysis Sigplan Notices (Acm Special Interest Group On Programming Languages). 32: 110-114. DOI: 10.1145/251595.251615  0.479
1996 Ryder B. The future of program analysis Acm Computing Surveys. 28: 174. DOI: 10.1145/242224.242450  0.458
1996 Pande HD, Ryder BG. Data-flow-based virtual function resolution Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1145: 238-254.  0.383
1995 Masticola SP, Marlowe TJ, Ryder BG. Lattice Frameworks for Multisource and Bidirectional Data Flow Problems Acm Transactions On Programming Languages and Systems (Toplas). 17: 777-803. DOI: 10.1145/213978.213989  0.39
1995 Lee YF, Ryder BG, Fiuczynski ME. Region Analysis: A Parallel Elimination Method for Data Flow Analysis Ieee Transactions On Software Engineering. 21: 913-926. DOI: 10.1109/32.473220  0.494
1995 Sgro V, Ryder BG. Differences in algorithmic parallelism in control flow and call multigraphs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 892: 217-233.  0.363
1994 Pande HD, Landi WA, Ryder BG. Interprocedural def-use associations for C systems with single level pointers Ieee Transactions On Software Engineering. 20: 385-403. DOI: 10.1109/32.286418  0.409
1994 Lee YF, Ryder BG. Effectively exploiting parallelism in data flow analysis The Journal of Supercomputing. 8: 233-262. DOI: 10.1007/Bf01204730  0.394
1993 Masticola SP, Ryder BG. Non-concurrency Analysis Acm Sigplan Notices. 28: 129-138. DOI: 10.1145/173284.155346  0.425
1993 Landi W, Ryder BG, Zhang S. Interprocedural Modification Side Effect Analysis with Pointer Aliasing Acm Sigplan Notices. 28: 56-67. DOI: 10.1145/173262.155096  0.339
1993 Marlowe TJ, Landi WG, Ryder BG, Choi JD, Burke MG, Carini P. Pointer-Induced Aliasing: A Clarification Acm Sigplan Notices. 28: 67-70. DOI: 10.1145/165364.165387  0.355
1992 Landi W, Ryder BG. A Safe Approximate Algorithm for Interprocedural Aliasing Acm Sigplan Notices. 27: 235-248. DOI: 10.1145/143103.143137  0.346
1991 Masticola SP, Ryder BG. A model of Ada programs for static deadlock detection in polynomial times Acm Sigplan Notices. 26: 97-107. DOI: 10.1145/127695.122768  0.356
1991 Lee YF, Ryder BG, Marlowe TJ. Experiences with a parallel algorithm for data flow analysis The Journal of Supercomputing. 5: 163-188. DOI: 10.1007/Bf00127842  0.337
1990 Burke MG, Ryder BG. A Critical Analysis of Incremental Iterative Data Flow Analysis Algorithms Ieee Transactions On Software Engineering. 16: 723-728. DOI: 10.1109/32.56098  0.382
1990 Ryder BG, Landi W, Pande HD. Profiling an Incremental Data Flow Analysis Algorithm Ieee Transactions On Software Engineering. 16: 129-140. DOI: 10.1109/32.44377  0.393
1990 Marlowe TJ, Ryder BG. Properties of data flow frameworks - A unified model Acta Informatica. 28: 121-163. DOI: 10.1007/Bf01237234  0.31
1990 Berman AM, Paull MC, Ryder BG. Proving relative lower bounds for incremental algorithms Acta Informatica. 27: 665-683. DOI: 10.1007/Bf00259471  0.308
1988 Ryder BG, Paull MC. Incremental Data-Flow Analysis Algorithms Acm Transactions On Programming Languages and Systems (Toplas). 10: 1-50. DOI: 10.1145/42192.42193  0.445
1988 Ryder BG, Pendergrast JS. Experiments in Optimizing FP Ieee Transactions On Software Engineering. 14: 444-454. DOI: 10.1109/32.4668  0.303
1988 Ryder BG, Marlowe TJ, Paull MC. Conditions for incremental iteration: Examples and counterexamples Science of Computer Programming. 11: 1-15. DOI: 10.1016/0167-6423(88)90061-5  0.352
1987 Carroll M, Ryder BG. An Incremental Algorithm for Software Analysis Acm Sigplan Notices. 22: 171-179. DOI: 10.1145/390012.24228  0.412
1986 Ryder BG, Paull MC. Elimination Algorithms for Data Flow Analysis Acm Computing Surveys (Csur). 18: 277-316. DOI: 10.1145/27632.27649  0.383
1979 Ryder BG. Constructing the Call Graph of a Program Ieee Transactions On Software Engineering. 216-226. DOI: 10.1109/Tse.1979.234183  0.471
1974 Ryder BG. The pfort verifier Software - Practice and Experience. 4: 359-377. DOI: 10.1002/Spe.4380040405  0.471
1974 Ryder BG. PFORT VERIFIER Software - Practice and Experience. 4: 359-377.  0.372
Show low-probability matches.