Year |
Citation |
Score |
2020 |
Cai H, Ryder BG. A Longitudinal Study of Application Structure and Behaviors in Android Ieee Transactions On Software Engineering. 1-1. DOI: 10.1109/Tse.2020.2975176 |
0.382 |
|
2020 |
Elish KO, Cai H, Barton D, Yao D, Ryder BG. Identifying Mobile Inter-App Communication Risks Ieee Transactions On Mobile Computing. 19: 90-102. DOI: 10.1109/Tmc.2018.2889495 |
0.32 |
|
2020 |
Tian K, Yao D, Ryder BG, Tan G, Peng G. Detection of Repackaged Android Malware with Code-Heterogeneity Features Ieee Transactions On Dependable and Secure Computing. 17: 64-77. DOI: 10.1109/Tdsc.2017.2745575 |
0.371 |
|
2020 |
Tian K, Tan G, Ryder BG, Yao D(. Prioritizing data flows and sinks for app security transformation Computers & Security. 92: 101750. DOI: 10.1016/J.Cose.2020.101750 |
0.348 |
|
2019 |
Cai H, Meng N, Ryder B, Yao D. DroidCat: Effective Android Malware Detection and Categorization via App-Level Profiling Ieee Transactions On Information Forensics and Security. 14: 1455-1470. DOI: 10.1109/Tifs.2018.2879302 |
0.363 |
|
2016 |
Wei S, Xhakaj F, Ryder BG. Empirical study of the dynamic behavior of JavaScript objects Software - Practice and Experience. 46: 867-889. DOI: 10.1002/Spe.2334 |
0.432 |
|
2015 |
Wei S, Ryder BG. Adaptive context-sensitive analysis for JavaScript Leibniz International Proceedings in Informatics, Lipics. 37: 712-734. DOI: 10.4230/LIPIcs.ECOOP.2015.712 |
0.396 |
|
2015 |
Xu K, Yao D, Ryder BG, Tian K. Probabilistic Program Modeling for High-Precision Anomaly Classification Proceedings of the Computer Security Foundations Workshop. 2015: 497-511. DOI: 10.1109/CSF.2015.37 |
0.363 |
|
2015 |
Elish KO, Shu X, Yao D, Ryder BG, Jiang X. Profiling user-trigger dependence for Android malware detection Computers and Security. 49: 255-273. DOI: 10.1016/J.Cose.2014.11.001 |
0.347 |
|
2015 |
Shu X, Yao D(, Ryder BG. A formal framework for program anomaly detection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9404: 270-292. DOI: 10.1007/978-3-319-26362-5_13 |
0.338 |
|
2014 |
Wei S, Ryder BG. Taming the dynamic behavior of JavaScript Splash 2014 - Companion Publication of the 2014 Acm Sigplan Conference On Systems, Programming, and Applications: Software For Humanity. 61-62. DOI: 10.1145/2660252.2660393 |
0.346 |
|
2014 |
Wei S, Ryder BG. State-sensitive points-to analysis for the dynamic behavior of JavaScript objects Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8586: 1-26. DOI: 10.1007/978-3-662-44202-9_1 |
0.302 |
|
2012 |
Ryder BG, Wiedermann B. Language design and analyzability: A retrospective Software - Practice and Experience. 42: 3-18. DOI: 10.1002/Spe.1133 |
0.462 |
|
2011 |
Fisher M, Wloka J, Tip F, Ryder BG, Luchansky A. An evaluation of change-based coverage criteria Acm Sigplan/Sigsoft Workshop On Program Analysis For Software Tools and Engineering. 21-28. DOI: 10.1145/2024569.2024575 |
0.302 |
|
2010 |
Fisher M, Marrs L, Ryder BG. HI-C: Diagnosing object churn in framework-based applications Proceedings of the Acm Sigsoft Symposium On the Foundations of Software Engineering. 379-380. DOI: 10.1145/1882291.1882358 |
0.347 |
|
2010 |
Ryder BG, Zeller A. Introduction: The best papers of ISSTA Ieee Transactions On Software Engineering. 36: 451-452. DOI: 10.1109/Tse.2010.76 |
0.367 |
|
2010 |
Wloka J, Hoest EW, Ryder BG. Tool support for change-centric test development Ieee Software. 27: 66-71. DOI: 10.1109/Ms.2009.159 |
0.408 |
|
2010 |
Fisher M, Dufour B, Basu S, Ryder BG. Exploring the impact of context sensitivity on blended analysis Ieee International Conference On Software Maintenance, Icsm. DOI: 10.1109/ICSM.2010.5609695 |
0.414 |
|
2009 |
Geay E, Pistoia M, Tateishi T, Ryder BG, Dolby J. Modular string-sensitive permission analysis with demand-driven precision Proceedings - International Conference On Software Engineering. 177-187. DOI: 10.1109/ICSE.2009.5070519 |
0.37 |
|
2008 |
Dufour B, Ryder BG, Sevitsky G. A scalable technique for characterizing the usage of temporaries in framework-intensive Java applications Proceedings of the Acm Sigsoft Symposium On the Foundations of Software Engineering. 59-70. DOI: 10.1145/1453101.1453111 |
0.584 |
|
2007 |
Dufour B, Ryder BG, Sevitsky G. Blended analysis for performance understanding of framework-based applications 2007 Acm International Symposium On Software Testing and Analysis, Issta'07. 118-128. DOI: 10.1145/1273463.1273480 |
0.659 |
|
2007 |
Fu C, Ryder BG. Exception-chain analysis: Revealing exception handling architecture in Java server applications Proceedings - International Conference On Software Engineering. 230-239. DOI: 10.1109/ICSE.2007.35 |
0.312 |
|
2007 |
Chesley OC, Ren X, Ryder BG, Tip F. Crisp - A fault localization tool for Java programs Proceedings - International Conference On Software Engineering. 775-778. DOI: 10.1109/ICSE.2007.29 |
0.371 |
|
2007 |
Zhang W, Ryder BG. Automatic construction of accurate application call graph with library call abstraction for Java Journal of Software Maintenance and Evolution. 19: 231-252. DOI: 10.1002/Smr.351 |
0.418 |
|
2006 |
Ren X, Chesley OC, Ryder BG. Identifying failure causes in Java programs: An application of change impact analysis Ieee Transactions On Software Engineering. 32: 718-732. DOI: 10.1109/Tse.2006.90 |
0.451 |
|
2005 |
Fu C, Ryder BG. Navigating error recovery code in Java applications? Proceedings of the 2005 Oopsla Workshop On Eclipse Technology Exchange, Eclipse'05. 40-44. DOI: 10.1145/1117696.1117705 |
0.352 |
|
2005 |
Ryder BG, Soffa ML, Burnett M. The impact of software engineering research on modern progamming languages Acm Transactions On Software Engineering and Methodology. 14: 431-477. DOI: 10.1145/1101815.1101818 |
0.404 |
|
2005 |
Milanova A, Rountev A, Ryder BG. Parameterized object sensitivity for points-to analysis for java Acm Transactions On Software Engineering and Methodology. 14: 1-41. DOI: 10.1145/1044834.1044835 |
0.697 |
|
2005 |
Fu C, Milanova A, Ryder BG, Wonnacott DG. Robustness testing of Java server applications Ieee Transactions On Software Engineering. 31: 292-311. DOI: 10.1109/Tse.2005.51 |
0.705 |
|
2005 |
Chesley OC, Ren X, Ryder BG. Crisp: A debugging tool for java programs Ieee International Conference On Software Maintenance, Icsm. 2005: 401-410. DOI: 10.1109/ICSM.2005.37 |
0.38 |
|
2005 |
Milanova A, Ryder BG. Annotated inclusion constraints for precise flow analysis Ieee International Conference On Software Maintenance, Icsm. 2005: 187-196. DOI: 10.1109/ICSM.2005.24 |
0.412 |
|
2004 |
Landi W, Ryder BG. A safe approximate algorithm for interprocedural pointer aliasing Acm Sigplan Notices. 39: 476-489. DOI: 10.1145/989393.989440 |
0.345 |
|
2004 |
Milanova A, Rountev A, Ryder BG. Precise Call Graphs for C Programs with Function Pointers Automated Software Engineering. 11: 7-26. DOI: 10.1023/B:AUSE.0000008666.56394.a1 |
0.7 |
|
2004 |
Fu C, Ryder BG, Milanova A, Wonnacott D. Testing of java web services for robustness Issta 2004 - Proceedings of the Acm Sigsoft International Symposium On Software Testing and Analysis. 23-33. |
0.348 |
|
2003 |
Ryder BG, Soffa ML. Influences on the design of exception handling: ACM SIGSOFT project on the impact of software engineering research on programming language design Sigplan Notices. 38: 16-22. DOI: 10.1145/885638.885644 |
0.401 |
|
2003 |
Ryder BG, Soffa ML. Influences on the design of exception handling ACM SIGSOFT project on the impact of software engineering research on programming language design Acm Sigsoft Software Engineering Notes. 28: 29-35. DOI: 10.1145/882240.882258 |
0.401 |
|
2003 |
Rountev A, Milanova A, Ryder BG. Fragment class analysis for testing of polymorphism in Java software Proceedings - International Conference On Software Engineering. 210-220. DOI: 10.1109/Tse.2004.20 |
0.704 |
|
2003 |
Ryder BG. Dimensions of precision in reference analysis of object-oriented programming languages Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2622: 126-137. |
0.441 |
|
2002 |
Milanova A, Rountev A, Ryder BG. Precise call graph construction in the presence of function pointers Scam 2002 - Proceedings, 2nd Ieee International Workshop On Source Code Analysis and Manipulation. 155-162. DOI: 10.1109/SCAM.2002.1134115 |
0.685 |
|
2002 |
Milanova A, Rountev A, Ryder BG. Constructing precise object relation diagrams Conference On Software Maintenance. 586-595. |
0.712 |
|
2002 |
Milanova A, Rountev A, Ryder BG. Parameterized object sensitivity for points-to and side-effect analyses for Java Proceedings of the Acm Sigsoft 2002 International Symposium On Software Testing and Analysis. 1-11. |
0.72 |
|
2001 |
Ryder BG, Landi WA, Stocks PA, Zhang S, Altucher R. A Schema for Interprocedural Modification Side-Effect Analysis with Pointer Aliasing Acm Transactions On Programming Languages and Systems. 23: 105-186. DOI: 10.1145/383043.381532 |
0.45 |
|
2001 |
Chatterjee R, Ryder BG, Landi WA. Complexity of points-to analysis of Java in the presence of exceptions Ieee Transactions On Software Engineering. 27: 481-512. DOI: 10.1109/32.926173 |
0.488 |
|
2001 |
Arnold M, Hsiao M, Kremer U, Ryder BG. Exploring the interaction between Java's implicitly thrown exceptions and instruction scheduling International Journal of Parallel Programming. 29: 111-137. DOI: 10.1023/A:1007621602134 |
0.663 |
|
2001 |
Rountev A, Ryder BG. Points-to and side-effect analyses for programs built with precompiled libraries Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2027: 20-36. DOI: 10.1007/3-540-45306-7_3 |
0.687 |
|
2001 |
Ryder BG, Tip F. Change impact analysis for object-oriented programs Acm Sigplan/Sigsoft Workshop On Program Analysis For Software Tools and Engineering. 46-53. |
0.322 |
|
2001 |
Rountev A, Milanova A, Ryder BG. Points-to analysis for Java using annotated constraints Proceedings of the Conference On Object-Oriented Programming Systems, Languages, and Applications, Oopsla. 36: 43-55. |
0.711 |
|
2000 |
Ryder B. PLDI '99: Programming language design and implementation Sigplan Notices. 35: 9-10. DOI: 10.1145/345105.345106 |
0.39 |
|
2000 |
Ryder BG, Smith D, Kremer U, Gordon M, Shah N. A static study of java exceptions using JESP Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1781: 67-81. |
0.305 |
|
1999 |
Rountev A, Ryder BG, Landi W. Data-flow analysis of program fragments Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1687: 235-252. |
0.696 |
|
1998 |
Zhang S, Ryder BG, Landi WA. Experiments with Combined Analysis for Pointer Aliasing Sigplan Notices (Acm Special Interest Group On Programming Languages). 33: 11-18. |
0.397 |
|
1998 |
Chatterjee R, Ryder BG, Landi WA. Complexity of concrete type-inference in the presence of exceptions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1381: 57-74. |
0.314 |
|
1997 |
Ryder BG. A Position Paper on Compile-time Program Analysis Sigplan Notices (Acm Special Interest Group On Programming Languages). 32: 110-114. DOI: 10.1145/251595.251615 |
0.479 |
|
1996 |
Ryder B. The future of program analysis Acm Computing Surveys. 28: 174. DOI: 10.1145/242224.242450 |
0.458 |
|
1996 |
Pande HD, Ryder BG. Data-flow-based virtual function resolution Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1145: 238-254. |
0.383 |
|
1995 |
Masticola SP, Marlowe TJ, Ryder BG. Lattice Frameworks for Multisource and Bidirectional Data Flow Problems Acm Transactions On Programming Languages and Systems (Toplas). 17: 777-803. DOI: 10.1145/213978.213989 |
0.39 |
|
1995 |
Lee YF, Ryder BG, Fiuczynski ME. Region Analysis: A Parallel Elimination Method for Data Flow Analysis Ieee Transactions On Software Engineering. 21: 913-926. DOI: 10.1109/32.473220 |
0.494 |
|
1995 |
Sgro V, Ryder BG. Differences in algorithmic parallelism in control flow and call multigraphs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 892: 217-233. |
0.363 |
|
1994 |
Pande HD, Landi WA, Ryder BG. Interprocedural def-use associations for C systems with single level pointers Ieee Transactions On Software Engineering. 20: 385-403. DOI: 10.1109/32.286418 |
0.409 |
|
1994 |
Lee YF, Ryder BG. Effectively exploiting parallelism in data flow analysis The Journal of Supercomputing. 8: 233-262. DOI: 10.1007/Bf01204730 |
0.394 |
|
1993 |
Masticola SP, Ryder BG. Non-concurrency Analysis Acm Sigplan Notices. 28: 129-138. DOI: 10.1145/173284.155346 |
0.425 |
|
1993 |
Landi W, Ryder BG, Zhang S. Interprocedural Modification Side Effect Analysis with Pointer Aliasing Acm Sigplan Notices. 28: 56-67. DOI: 10.1145/173262.155096 |
0.339 |
|
1993 |
Marlowe TJ, Landi WG, Ryder BG, Choi JD, Burke MG, Carini P. Pointer-Induced Aliasing: A Clarification Acm Sigplan Notices. 28: 67-70. DOI: 10.1145/165364.165387 |
0.355 |
|
1992 |
Landi W, Ryder BG. A Safe Approximate Algorithm for Interprocedural Aliasing Acm Sigplan Notices. 27: 235-248. DOI: 10.1145/143103.143137 |
0.346 |
|
1991 |
Masticola SP, Ryder BG. A model of Ada programs for static deadlock detection in polynomial times Acm Sigplan Notices. 26: 97-107. DOI: 10.1145/127695.122768 |
0.356 |
|
1991 |
Lee YF, Ryder BG, Marlowe TJ. Experiences with a parallel algorithm for data flow analysis The Journal of Supercomputing. 5: 163-188. DOI: 10.1007/Bf00127842 |
0.337 |
|
1990 |
Burke MG, Ryder BG. A Critical Analysis of Incremental Iterative Data Flow Analysis Algorithms Ieee Transactions On Software Engineering. 16: 723-728. DOI: 10.1109/32.56098 |
0.382 |
|
1990 |
Ryder BG, Landi W, Pande HD. Profiling an Incremental Data Flow Analysis Algorithm Ieee Transactions On Software Engineering. 16: 129-140. DOI: 10.1109/32.44377 |
0.393 |
|
1990 |
Marlowe TJ, Ryder BG. Properties of data flow frameworks - A unified model Acta Informatica. 28: 121-163. DOI: 10.1007/Bf01237234 |
0.31 |
|
1990 |
Berman AM, Paull MC, Ryder BG. Proving relative lower bounds for incremental algorithms Acta Informatica. 27: 665-683. DOI: 10.1007/Bf00259471 |
0.308 |
|
1988 |
Ryder BG, Paull MC. Incremental Data-Flow Analysis Algorithms Acm Transactions On Programming Languages and Systems (Toplas). 10: 1-50. DOI: 10.1145/42192.42193 |
0.445 |
|
1988 |
Ryder BG, Pendergrast JS. Experiments in Optimizing FP Ieee Transactions On Software Engineering. 14: 444-454. DOI: 10.1109/32.4668 |
0.303 |
|
1988 |
Ryder BG, Marlowe TJ, Paull MC. Conditions for incremental iteration: Examples and counterexamples Science of Computer Programming. 11: 1-15. DOI: 10.1016/0167-6423(88)90061-5 |
0.352 |
|
1987 |
Carroll M, Ryder BG. An Incremental Algorithm for Software Analysis Acm Sigplan Notices. 22: 171-179. DOI: 10.1145/390012.24228 |
0.412 |
|
1986 |
Ryder BG, Paull MC. Elimination Algorithms for Data Flow Analysis Acm Computing Surveys (Csur). 18: 277-316. DOI: 10.1145/27632.27649 |
0.383 |
|
1979 |
Ryder BG. Constructing the Call Graph of a Program Ieee Transactions On Software Engineering. 216-226. DOI: 10.1109/Tse.1979.234183 |
0.471 |
|
1974 |
Ryder BG. The pfort verifier Software - Practice and Experience. 4: 359-377. DOI: 10.1002/Spe.4380040405 |
0.471 |
|
1974 |
Ryder BG. PFORT VERIFIER Software - Practice and Experience. 4: 359-377. |
0.372 |
|
Show low-probability matches. |