Spreadsheet data manipulation using examples S Gulwani, WR Harris, R Singh Communications of the ACM 55 (8), 97-105, 2012 | 405 | 2012 |
Spreadsheet table transformations from examples WR Harris, S Gulwani ACM SIGPLAN Notices 46 (6), 317-328, 2011 | 220 | 2011 |
Security challenges in automotive hardware/software architecture design F Sagstetter, M Lukasiewycz, S Steinhorst, M Wolf, A Bouard, WR Harris, ... 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE), 458-463, 2013 | 182 | 2013 |
Enforcing Kernel Security Invariants with Data Flow Integrity. C Song, B Lee, K Lu, W Harris, T Kim, W Lee NDSS, 2016 | 178 | 2016 |
Enforcing unique code target property for control-flow integrity H Hu, C Qian, C Yagemann, SPH Chung, WR Harris, T Kim, W Lee Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 151 | 2018 |
Efficient Protection of {Path-Sensitive} Control Security R Ding, C Qian, C Song, B Harris, T Kim, W Lee 26th USENIX Security Symposium (USENIX Security 17), 131-148, 2017 | 141 | 2017 |
Automated table transformations from examples S Gulwani, WR Harris US Patent 8,484,550, 2013 | 84 | 2013 |
Flexjava: Language support for safe and modular approximate programming J Park, H Esmaeilzadeh, X Zhang, M Naik, W Harris Proceedings of the 2015 10th Joint Meeting on Foundations of Software …, 2015 | 82 | 2015 |
Alternation for termination WR Harris, A Lal, AV Nori, SK Rajamani Static Analysis: 17th International Symposium, SAS 2010, Perpignan, France …, 2010 | 78 | 2010 |
Program analysis via satisfiability modulo path programs WR Harris, S Sankaranarayanan, F Ivančić, A Gupta Proceedings of the 37th annual ACM SIGPLAN-SIGACT symposium on Principles of …, 2010 | 72 | 2010 |
Automated verification of query equivalence using satisfiability modulo theories Q Zhou, J Arulraj, S Navathe, W Harris, D Xu Proceedings of the VLDB Endowment 12 (11), 1276-1288, 2019 | 53 | 2019 |
DIFC programs by automatic instrumentation WR Harris, S Jha, T Reps Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 39 | 2010 |
Complexity verification using guided theorem enumeration A Srikanth, B Sahin, WR Harris ACM SIGPLAN Notices 52 (1), 639-652, 2017 | 35 | 2017 |
Program verification through symbolic enumeration of control path programs S Sankaranarayanan, F Ivancic, WR Harris, A Gupta, G Balakrishnan US Patent 8,402,440, 2013 | 31 | 2013 |
Secure programming via visibly pushdown safety games WR Harris, S Jha, T Reps Computer Aided Verification: 24th International Conference, CAV 2012 …, 2012 | 22 | 2012 |
Verifying information flow control over unbounded processes WR Harris, NA Kidd, S Chaki, S Jha, T Reps FM 2009: Formal Methods: Second World Congress, Eindhoven, The Netherlands …, 2009 | 20 | 2009 |
SPES: A symbolic approach to proving query equivalence under bag semantics Q Zhou, J Arulraj, SB Navathe, W Harris, J Wu 2022 IEEE 38th International Conference on Data Engineering (ICDE), 2735-2748, 2022 | 19 | 2022 |
Proving UNSAT in zero knowledge N Luo, T Antonopoulos, WR Harris, R Piskac, E Tromer, X Wang Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 15 | 2022 |
Declarative, temporal, and practical programming with capabilities WR Harris, S Jha, T Reps, J Anderson, RNM Watson 2013 IEEE Symposium on Security and Privacy, 18-32, 2013 | 15 | 2013 |
Determination of organic carbon and carbonates in soils JU Anderson, W Harris Soil Science Society of America Journal 31 (3), 341-343, 1967 | 14 | 1967 |