Scott D. Stoller
Scott D. Stoller
Professor of Computer Science, Stony Brook University
Verified email at - Homepage
Cited by
Cited by
{SLEUTH}: Real-time attack scenario reconstruction from {COTS} audit data
MN Hossain, SM Milajerdi, J Wang, B Eshete, R Gjomemo, R Sekar, ...
26th USENIX Security Symposium (USENIX Security 17), 487-504, 2017
Runtime analysis of atomicity for multithreaded programs
L Wang, SD Stoller
IEEE Transactions on Software Engineering 32 (2), 93-110, 2006
Transverse spin relaxation in inhomogeneous magnetic fields
SD Stoller, W Happer, FJ Dyson
Physical Review A 44 (11), 7459, 1991
ACTION-EHR: Patient-centric blockchain-based electronic health record data management for cancer care
A Dubovitskaya, F Baig, Z Xu, R Shukla, PS Zambani, A Swaminathan, ...
Journal of medical Internet research 22 (8), e13598, 2020
Efficient policy analysis for administrative role based access control
SD Stoller, P Yang, CR Ramakrishnan, MI Gofman
Proceedings of the 14th ACM conference on Computer and communications …, 2007
Mining attribute-based access control policies
Z Xu, SD Stoller
IEEE Transactions on Dependable and Secure Computing 12 (5), 533-545, 2014
Testing concurrent Java programs using randomized scheduling
SD Stoller
Electronic Notes in Theoretical Computer Science 70 (4), 142-157, 2002
Cryptographic support for fault-tolerant distributed computing
Y Minsky, R Van Renesse, FB Schneider, SD Stoller
Proceedings of the 7th workshop on ACM SIGOPS European workshop: Systems …, 1996
Model-checking multi-threaded distributed Java programs
SD Stoller
International SPIN Workshop on Model Checking of Software, 224-244, 2000
Runtime verification with state estimation
SD Stoller, E Bartocci, J Seyster, R Grosu, K Havelund, SA Smolka, ...
Runtime Verification: Second International Conference, RV 2011, San …, 2012
Policy analysis for administrative role-based access control
A Sasturkar, P Yang, SD Stoller, CR Ramakrishnan
Theoretical Computer Science 412 (44), 6208-6234, 2011
Accurate and efficient runtime detection of atomicity errors in concurrent programs
L Wang, SD Stoller
Proceedings of the eleventh ACM SIGPLAN symposium on Principles and practice …, 2006
{Dependence-Preserving} data compaction for scalable forensic analysis
MN Hossain, J Wang, O Weisse, R Sekar, D Genkin, B He, SD Stoller, ...
27th USENIX Security Symposium (USENIX Security 18), 1723-1740, 2018
Static caching for incremental computation
YA Liu, SD Stoller, T Teitelbaum
ACM Transactions on Programming Languages and Systems (TOPLAS) 20 (3), 546-585, 1998
Detecting global predicates in distributed systems with clocks
SD Stoller
Distributed Computing 13 (2), 85-98, 2000
Automated type-based analysis of data races and atomicity
A Sasturkar, R Agarwal, L Wang, SD Stoller
Proceedings of the tenth ACM SIGPLAN symposium on Principles and practice of …, 2005
Detecting potential deadlocks with static analysis and run-time monitoring
R Agarwal, L Wang, SD Stoller
Haifa Verification Conference, 191-207, 2005
From recursion to iteration: what are the optimizations?
YA Liu, SD Stoller
Proceedings of the 2000 ACM SIGPLAN workshop on Partial evaluation and …, 1999
Towards a framework and a benchmark for testing tools for multi‐threaded programs
Y Eytani, K Havelund, SD Stoller, S Ur
Concurrency and Computation: Practice and Experience 19 (3), 267-279, 2007
Adaptive Runtime Verification
E Bartocci, R Grosu, A Karmarkar, SA Smolka, SD Stoller, E Zadok, ...
Third International Conference on Runtime Verification (RV 2012), 0
The system can't perform the operation now. Try again later.
Articles 1–20