Madhusudan Parthasarathy
Cited by
Cited by
Syntax-Guided Synthesis
R Alur, R Bodik, E Dallal, D Fisman, P Garg, G Juniwal, H Kress-Gazit, ...
Dependable Software Systems Engineering, 1-25, 2015
Visibly pushdown languages
R Alur, P Madhusudan
Proceedings of the thirty-sixth annual ACM symposium on Theory of computing …, 2004
Synthesis of interface specifications for Java classes
R Alur, P Černý, P Madhusudan, W Nam
Proceedings of the 32nd ACM SIGPLAN-SIGACT symposium on Principles of …, 2005
Adding nesting structure to words
R Alur, P Madhusudan
Journal of the ACM (JACM) 56 (3), 1-43, 2009
A temporal logic of nested calls and returns
R Alur, K Etessami, P Madhusudan
Tools and Algorithms for the Construction and Analysis of Systems: 10th …, 2004
ICE: A robust framework for learning invariants
P Garg, C Löding, P Madhusudan, D Neider
Computer Aided Verification: 26th International Conference, CAV 2014, Held …, 2014
CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks
P Bisht, P Madhusudan, VN Venkatakrishnan
ACM Transactions on Information and System Security (TISSEC) 13 (2), 1-39, 2010
Decision problems for timed automata: A survey
R Alur, M Parthasarathy
Departmental Papers (CIS), 93, 2004
Learning invariants using decision trees and implication counterexamples
P Garg, D Neider, P Madhusudan, D Roth
ACM Sigplan Notices 51 (1), 499-512, 2016
CANDID: preventing SQL injection attacks using dynamic candidate evaluations
S Bandhakavi, P Bisht, P Madhusudan, VN Venkatakrishnan
Proceedings of the 14th ACM conference on Computer and communications …, 2007
A robust class of context-sensitive languages
S La Torre, P Madhusudan, G Parlato
22nd Annual IEEE symposium on logic in computer science (LICS 2007), 161-170, 2007
VEX: Vetting Browser Extensions for Security Vulnerabilities.
S Bandhakavi, ST King, P Madhusudan, M Winslett
USENIX Security Symposium 10, 339-354, 2010
Symbolic compositional verification by learning assumptions
R Alur, P Madhusudan, W Nam
Computer Aided Verification: 17th International Conference, CAV 2005 …, 2005
PENELOPE: weaving threads to expose atomicity violations
F Sorrentino, A Farzan, P Madhusudan
Proceedings of the eighteenth ACM SIGSOFT international symposium on …, 2010
Open systems in reactive environments: Control and synthesis
O Kupferman, P Madhusudan, PS Thiagarajan, MY Vardi
CONCUR 2000—Concurrency Theory: 11th International Conference University …, 2000
Reducing context-bounded concurrent reachability to sequential reachability
S La Torre, P Madhusudan, G Parlato
Computer Aided Verification: 21st International Conference, CAV 2009 …, 2009
Context-bounded analysis of concurrent queue systems
S La Torre, P Madhusudan, G Parlato
Tools and Algorithms for the Construction and Analysis of Systems: 14th …, 2008
The tree width of auxiliary storage
P Madhusudan, G Parlato
ACM SIGPLAN Notices 46 (1), 283-294, 2011
Adding nesting structure to words
R Alur, P Madhusudan
Developments in Language Theory: 10th International Conference, DLT 2006 …, 2006
Natural proofs for structure, data, and separation
X Qiu, P Garg, A Ştefănescu, P Madhusudan
ACM SIGPLAN Notices 48 (6), 231-242, 2013
The system can't perform the operation now. Try again later.
Articles 1–20