Cited By
View all- Alhajri AJhumka A(2023)Addressing a Malicious Tampering Attack on the Default Isolation Level in DBMS2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)10.1109/TrustCom60117.2023.00371(2660-2667)Online publication date: 1-Nov-2023
- Leesatapornwongsa TRen XNath SRoychoudhury ACadar CKim M(2022)FlakeRepro: automated and efficient reproduction of concurrency-related flaky testsProceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering10.1145/3540250.3558956(1509-1520)Online publication date: 7-Nov-2022
- Li CChen RWang BYu TGao DYang MRyu SSmaragdakis Y(2022)Precise and efficient atomicity violation detection for interrupt-driven programs via staged path pruningProceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis10.1145/3533767.3534412(506-518)Online publication date: 18-Jul-2022
- Show More Cited By