Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Likely matches
- Venkatesh Prasad Ranganath
aka: Venkatesh-Prasad Ranganath
Kansas State University, Manhattan, KS, USA
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 39 matches
- 2020
- Venkatesh-Prasad Ranganath, Joydeep Mitra:
Are free Android app security analysis tools effective in detecting known vulnerabilities? Empir. Softw. Eng. 25(1): 178-219 (2020) - Joydeep Mitra, Venkatesh-Prasad Ranganath:
SeMA: Extending and Analyzing Storyboards to Develop Secure Android Apps. CoRR abs/2001.10052 (2020) - 2019
- Joydeep Mitra, Venkatesh-Prasad Ranganath:
SeMA: A Design Methodology for Building Secure Android Apps. ASE Workshops 2019: 19-22 - Joydeep Mitra, Venkatesh-Prasad Ranganath, Aditya Narkar:
BenchPress: Analyzing Android App Vulnerability Benchmark Suites. ASE Workshops 2019: 13-18 - Joydeep Mitra, Venkatesh-Prasad Ranganath:
SeMA: A Design Methodology for Building Secure Android Apps. CoRR abs/1902.10056 (2019) - Joydeep Mitra, Venkatesh-Prasad Ranganath:
BenchPress: Analyzing Android App Vulnerability Benchmark Suites. CoRR abs/1903.05170 (2019) - 2018
- Venkatesh-Prasad Ranganath, Daniel Andresen:
Why do Users Kill HPC Jobs? HiPC 2018: 276-283 - Venkatesh-Prasad Ranganath, Daniel Andresen:
Why do Users Kill HPC Jobs? CoRR abs/1805.01177 (2018) - Venkatesh-Prasad Ranganath, Joydeep Mitra:
Are Free Android App Security Analysis Tools Effective in Detecting Known Vulnerabilities? CoRR abs/1806.09059 (2018) - 2017
- Joydeep Mitra, Venkatesh-Prasad Ranganath:
Ghera: A Repository of Android App Vulnerability Benchmarks. PROMISE 2017: 43-52 - Joydeep Mitra, Venkatesh-Prasad Ranganath:
Ghera: A Repository of Android App Vulnerability Benchmarks. CoRR abs/1708.02380 (2017) - 2016
- Venkatesh-Prasad Ranganath:
Embrace dynamic artifacts. Perspectives on Data Science for Software Engineering 2016: 43-46 - Venkatesh-Prasad Ranganath:
While models are good, simple explanations are better. Perspectives on Data Science for Software Engineering 2016: 349-352 - 2015
- Sankardas Roy, Jordan DeLoach, Yuping Li, Nic Herndon, Doina Caragea, Xinming Ou, Venkatesh Prasad Ranganath, Hongmin Li, Nicolais Guevara:
Experimental Study with Real-world Data for Android App Security Analysis using Machine Learning. ACSAC 2015: 81-90 - Venkatesh-Prasad Ranganath, Yu Jin Kim, John Hatcliff, Robby:
Communication patterns for interconnecting and composing medical systems. EMBC 2015: 1711-1716 - Yu Jin Kim, Sam Procter, John Hatcliff, Venkatesh-Prasad Ranganath, Robby:
Ecosphere Principles for Medical Application Platforms. ICHI 2015: 193-198 - 2014
- Christian Bird, Venkatesh-Prasad Ranganath, Thomas Zimmermann, Nachiappan Nagappan, Andreas Zeller:
Extrinsic influence factors in software reliability: a study of 200, 000 windows machines. ICSE Companion 2014: 205-214 - Venkatesh-Prasad Ranganath, Pradip Vallathol, Pankaj Gupta:
Compatibility testing using patterns-based trace comparison. ASE 2014: 469-478 - 2013
- Venkatesh-Prasad Ranganath, Jithin Thomas:
Structural and temporal patterns-based features. DAPSE@ICSE 2013: 32-34 - 2012
- David Lo, G. Ramalingam, Venkatesh Prasad Ranganath, Kapil Vaswani:
Mining quantified temporal rules: Formalism, algorithms, and evaluation. Sci. Comput. Program. 77(6): 743-759 (2012) - 2011
- Jyotirmoy V. Deshmukh, G. Ramalingam, Venkatesh Prasad Ranganath, Kapil Vaswani:
Logical Concurrency Control from Sequential Proofs. Log. Methods Comput. Sci. 7(3) (2011) - 2010
- Jyotirmoy V. Deshmukh, G. Ramalingam, Venkatesh Prasad Ranganath, Kapil Vaswani:
Logical Concurrency Control from Sequential Proofs. ESOP 2010: 226-245 - 2009
- Sriram K. Rajamani, G. Ramalingam, Venkatesh Prasad Ranganath, Kapil Vaswani:
ISOLATOR: dynamically ensuring isolation in comcurrent programs. ASPLOS 2009: 181-192 - David Lo, Ganesan Ramalingam, Venkatesh Prasad Ranganath, Kapil Vaswani:
Mining Quantified Temporal Rules: Formalism, Algorithms, and Evaluation. WCRE 2009: 62-71 - 2007
- Venkatesh Prasad Ranganath, John Hatcliff:
Slicing concurrent Java programs using Indus and Kaveri. Int. J. Softw. Tools Technol. Transf. 9(5-6): 489-504 (2007) - Venkatesh Prasad Ranganath, Torben Amtoft, Anindya Banerjee, John Hatcliff, Matthew B. Dwyer:
A new foundation for control dependence and slicing for modern program structures. ACM Trans. Program. Lang. Syst. 29(5): 27 (2007) - 2006
- Arvind S. Krishna, Aniruddha S. Gokhale, Douglas C. Schmidt, Venkatesh Prasad Ranganath, John Hatcliff:
Towards highly optimized real-time middleware for software product-line architectures. SIGBED Rev. 3(1): 13-16 (2006) - Venkatesh Prasad Ranganath, Andrew L. King, Daniel Andresen:
Automatic Code Generation for LYE, a High-Performance Caching SOAP Implementation. SWWS 2006: 73-79 - Matthew B. Dwyer, John Hatcliff, Matthew Hoosier, Venkatesh Prasad Ranganath, Robby, Todd Wallentine:
Evaluating the Effectiveness of Slicing for Model Reduction of Concurrent Object-Oriented Programs. TACAS 2006: 73-89 - 2005
- Venkatesh Prasad Ranganath, Torben Amtoft, Anindya Banerjee, Matthew B. Dwyer, John Hatcliff:
A New Foundation for Control-Dependence and Slicing for Modern Program Structures. ESOP 2005: 77-93
skipping 9 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-23 10:21 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint