default search action
James C. Davis 0001
Person information
- affiliation: Purdue University, West Lafayette, IN, USA
Other persons with the same name
- James C. Davis 0002 — Ohio State University, Columbus, OH, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Wenxin Jiang, Vishnu Banna, Naveen Vivek, Abhinav Goel, Nicholas Synovic, George K. Thiruvathukal, James C. Davis:
Challenges and practices of deep learning model reengineering: A case study on computer vision. Empir. Softw. Eng. 29(6): 142 (2024) - [j5]Jesse Chen, Dharun Anandayuvaraj, James C. Davis, Sazzadur Rahaman:
On the Contents and Utility of IoT Cybersecurity Guidelines. Proc. ACM Softw. Eng. 1(FSE): 1400-1423 (2024) - [c42]Lucas Franke, Huayu Liang, Aaron Brantly, James C. Davis, Chris Brown:
A First Look at the General Data Protection Regulation (GDPR) in Open-Source Software. ICSE Companion 2024: 268-269 - [c41]Purvish Jajal, Wenxin Jiang, Arav Tewari, Erik Kocinare, Joseph Woo, Anusha Sarraf, Yung-Hsiang Lu, George K. Thiruvathukal, James C. Davis:
Interoperability in Deep Learning: A User Survey and Failure Analysis of ONNX Model Converters. ISSTA 2024: 1466-1478 - [c40]Wenxin Jiang, Jerin Yasmin, Jason Jones, Nicholas Synovic, Jiashen Kuo, Nathaniel Bielanski, Yuan Tian, George K. Thiruvathukal, James C. Davis:
PeaTMOSS: A Dataset and Initial Analysis of Pre-Trained Models in Open-Source Software. MSR 2024: 431-443 - [c39]Taylor R. Schorlemmer, Kelechi G. Kalu, Luke Chigges, Kyung Myung Ko, Eman Abu Ishgair, Saurabh Bagchi, Santiago Torres-Arias, James C. Davis:
Signing in Four Public Software Package Registries: Quantity, Quality, and Influencing Factors. SP 2024: 1160-1178 - [c38]William P. Maxam III, James C. Davis:
An Interview Study on Third-Party Cyber Threat Hunting Processes in the U.S. Department of Homeland Security. USENIX Security Symposium 2024 - [i43]Lucas Franke, Huayu Liang, Aaron Brantly, James C. Davis, Chris Brown:
A First Look at the General Data Protection Regulation (GDPR) in Open-Source Software. CoRR abs/2401.14629 (2024) - [i42]Taylor R. Schorlemmer, Kelechi G. Kalu, Luke Chigges, Kyung Myung Ko, Eman Abdul-Muhd Abu Isghair, Saurabh Baghi, Santiago Torres-Arias, James C. Davis:
Signing in Four Public Software Package Registries: Quantity, Quality, and Influencing Factors. CoRR abs/2401.14635 (2024) - [i41]Wenxin Jiang, Jerin Yasmin, Jason Jones, Nicholas Synovic, Jiashen Kuo, Nathaniel Bielanski, Yuan Tian, George K. Thiruvathukal, James C. Davis:
PeaTMOSS: A Dataset and Initial Analysis of Pre-Trained Models in Open-Source Software. CoRR abs/2402.00699 (2024) - [i40]William P. Maxam III, James C. Davis:
An Interview Study on Third-Party Cyber Threat Hunting Processes in the U.S. Department of Homeland Security. CoRR abs/2402.12252 (2024) - [i39]Ben Arie Tanay, Lexy Arinze, Siddhant Sanjay Joshi, Kirsten A. Davis, James C. Davis:
An Exploratory Study on Upper-Level Computing Students' Use of Large Language Models as Tools in a Semester-Long Project. CoRR abs/2403.18679 (2024) - [i38]Siddhant Sanjay Joshi, Preeti Mukherjee, Kirsten A. Davis, James C. Davis:
Introducing Systems Thinking as a Framework for Teaching and Assessing Threat Modeling Competency. CoRR abs/2404.16632 (2024) - [i37]James C. Davis, Purvish Jajal, Wenxin Jiang, Taylor R. Schorlemmer, Nicholas Synovic, George K. Thiruvathukal:
Reusing Deep Learning Models: Challenges and Directions in Software Engineering. CoRR abs/2404.16688 (2024) - [i36]Vishal Purohit, Wenxin Jiang, Akshath R. Ravikiran, James C. Davis:
A Partial Replication of MaskFormer in TensorFlow on TPUs for the TensorFlow Model Garden. CoRR abs/2404.18801 (2024) - [i35]Kelechi G. Kalu, Tanya Singla, Chinenye Okafor, Santiago Torres-Arias, James C. Davis:
An Industry Interview Study of Software Signing for Supply Chain Security. CoRR abs/2406.08198 (2024) - [i34]Jason Jones, Wenxin Jiang, Nicholas Synovic, George K. Thiruvathukal, James C. Davis:
What do we know about Hugging Face? A systematic literature review and quantitative validation of qualitative claims. CoRR abs/2406.08205 (2024) - [i33]Dharun Anandayuvaraj, Matthew Campbell, Arav Tewari, James C. Davis:
Can Large Language Models Analyze Software Failures in the News? An End-to-End Automated Pipeline with FAIL. CoRR abs/2406.08221 (2024) - [i32]Chinenye Okafor, Taylor R. Schorlemmer, Santiago Torres-Arias, James C. Davis:
SoK: Analysis of Software Supply Chain Security by Establishing Secure Design Properties. CoRR abs/2406.10109 (2024) - [i31]Masudul Hasan Masud Bhuiyan, Berk Çakar, Ethan H. Burmane, James C. Davis, Cristian-Alexandru Staicu:
SoK: A Literature and Engineering Review of Regular Expression Denial of Service. CoRR abs/2406.11618 (2024) - [i30]Lucas Franke, Huayu Liang, Sahar Farzanehpour, Aaron Brantly, James C. Davis, Chris Brown:
An Exploratory Mixed-Methods Study on General Data Protection Regulation (GDPR) Compliance in Open-Source Software. CoRR abs/2406.14724 (2024) - [i29]Chinenye L. Okafor, James C. Davis, Santiago Torres-Arias:
DiVerify: Diversifying Identity Verification in Next-Generation Software Signing. CoRR abs/2406.15596 (2024) - [i28]Taylor R. Schorlemmer, Ethan H. Burmane, Kelechi G. Kalu, Santiago Torres-Arias, James C. Davis:
Establishing Provenance Before Coding: Traditional and Next-Gen Signing. CoRR abs/2407.03949 (2024) - [i27]Nick John Eliopoulos, Purvish Jajal, James C. Davis, Gaowen Liu, George K. Thiravathukal, Yung-Hsiang Lu:
Pruning One More Token is Enough: Leveraging Latency-Workload Non-Linearities for Vision Transformers on the Edge. CoRR abs/2407.05941 (2024) - 2023
- [j4]Xiao Hu, Ziteng Jiao, Ayden Kocher, Zhenyu Wu, Junjie Liu, James C. Davis, George K. Thiruvathukal, Yung-Hsiang Lu:
Evolution of Winning Solutions in the 2021 Low-Power Computer Vision Challenge. Computer 56(8): 28-37 (2023) - [j3]Abhinav Goel, Caleb Tung, Nick Eliopoulos, George K. Thiruvathukal, Amy Wang, Yung-Hsiang Lu, James C. Davis:
Tree-Based Unidirectional Neural Networks for Low-Power Computer Vision. IEEE Des. Test 40(3): 53-61 (2023) - [c37]Jayashree Srinivasan, Sai Ritvik Tanksalkar, Paschal C. Amusuo, James C. Davis, Aravind Machiry:
Towards Rehosting Embedded Applications as Linux Applications. DSN-S 2023: 94-99 - [c36]Wenxin Jiang, Nicholas Synovic, Matt Hyatt, Taylor R. Schorlemmer, Rohan Sethi, Yung-Hsiang Lu, George K. Thiruvathukal, James C. Davis:
An Empirical Study of Pre-Trained Model Reuse in the Hugging Face Deep Learning Model Registry. ICSE 2023: 2463-2475 - [c35]James C. Davis, Purvish Jajal, Wenxin Jiang, Taylor R. Schorlemmer, Nicholas Synovic, George K. Thiruvathukal:
Reusing Deep Learning Models: Challenges and Directions in Software Engineering. JVA 2023: 17-30 - [c34]Paschal C. Amusuo, Ricardo Andrés Calvo Méndez, Zhongwei Xu, Aravind Machiry, James C. Davis:
Systematically Detecting Packet Validation Vulnerabilities in Embedded Network Stacks. ASE 2023: 926-938 - [c33]Mingjie Shen, James C. Davis, Aravind Machiry:
Towards Automated Identification of Layering Violations in Embedded Applications (WIP). LCTES 2023: 143-147 - [c32]Wenxin Jiang, Nicholas Synovic, Purvish Jajal, Taylor R. Schorlemmer, Arav Tewari, Bhavesh Pareek, George K. Thiruvathukal, James C. Davis:
PTMTorrent: A Dataset for Mining Open-source Pre-trained Model Packages. MSR 2023: 57-61 - [c31]Tanmay Singla, Dharun Anandayuvaraj, Kelechi G. Kalu, Taylor R. Schorlemmer, James C. Davis:
An Empirical Study on Using Large Language Models to Analyze Software Supply Chain Security Failures. SCORED@CCS 2023: 5-15 - [c30]Dharun Anandayuvaraj, Pujita Thulluri, Justin Figueroa, Harshit Shandilya, James C. Davis:
Incorporating Failure Knowledge into Design Decisions for IoT Systems: A Controlled Experiment on Novices. SERP4IoT 2023: 33-37 - [c29]Kelechi G. Kalu, Taylor R. Schorlemmer, Sophie Chen, Kyle A. Robinson, Erik Kocinare, James C. Davis:
Reflecting on the Use of the Policy-Process-Product Theory in Empirical Software Engineering. ESEC/SIGSOFT FSE 2023: 2112-2116 - [c28]Sk Adnan Hassan, Zainab Aamir, Dongyoon Lee, James C. Davis, Francisco Servant:
Improving Developers' Understanding of Regex Denial of Service Tools through Anti-Patterns and Fix Strategies. SP 2023: 1238-1255 - [i26]Efe Barlas, Xin Du, James C. Davis:
Exploiting Input Sanitization for Regex Denial of Service. CoRR abs/2303.01996 (2023) - [i25]Diego Montes, Pongpatapee Peerapatanapokin, Jeff Schultz, Chengjun Guo, Wenxin Jiang, James C. Davis:
Discrepancies among Pre-trained Deep Neural Networks: A New Threat to Model Zoo Reliability. CoRR abs/2303.02551 (2023) - [i24]Wenxin Jiang, Nicholas Synovic, Matt Hyatt, Taylor R. Schorlemmer, Rohan Sethi, Yung-Hsiang Lu, George K. Thiruvathukal, James C. Davis:
An Empirical Study of Pre-Trained Model Reuse in the Hugging Face Deep Learning Model Registry. CoRR abs/2303.02552 (2023) - [i23]Louis G. Michael IV, James Donohue, James C. Davis, Dongyoon Lee, Francisco Servant:
Regexes are Hard: Decision-making, Difficulties, and Risks in Programming Regular Expressions. CoRR abs/2303.02555 (2023) - [i22]Wenxin Jiang, Vishnu Banna, Naveen Vivek, Abhinav Goel, Nicholas Synovic, George K. Thiruvathukal, James C. Davis:
Challenges and Practices of Deep Learning Model Reengineering: A Case Study on Computer Vision. CoRR abs/2303.07476 (2023) - [i21]Wenxin Jiang, Nicholas Synovic, Purvish Jajal, Taylor R. Schorlemmer, Arav Tewari, Bhavesh Pareek, George K. Thiruvathukal, James C. Davis:
PTMTorrent: A Dataset for Mining Open-source Pre-trained Model Packages. CoRR abs/2303.08934 (2023) - [i20]Purvish Jajal, Wenxin Jiang, Arav Tewari, Joseph Woo, Yung-Hsiang Lu, George K. Thiruvathukal, James C. Davis:
Analysis of Failures and Risks in Deep Learning Model Converters: A Case Study in the ONNX Ecosystem. CoRR abs/2303.17708 (2023) - [i19]Tanmay Singla, Dharun Anandayuvaraj, Kelechi G. Kalu, Taylor R. Schorlemmer, James C. Davis:
An Empirical Study on Using Large Language Models to Analyze Software Supply Chain Security Failures. CoRR abs/2308.04898 (2023) - [i18]Paschal C. Amusuo, Ricardo Andrés Calvo Méndez, Zhongwei Xu, Aravind Machiry, James C. Davis:
Systematically Detecting Packet Validation Vulnerabilities in Embedded Network Stacks. CoRR abs/2308.10965 (2023) - [i17]Kelechi G. Kalu, Taylor R. Schorlemmer, Sophie Chen, Kyle A. Robinson, Erik Kocinare, James C. Davis:
Reflecting on the Use of the Policy-Process-Product Theory in Empirical Software Engineering. CoRR abs/2308.12387 (2023) - [i16]Mingjie Shen, Akul Abhilash Pillai, Brian A. Yuan, James C. Davis, Aravind Machiry:
An Empirical Study on the Use of Static Analysis Tools in Open Source Embedded Software. CoRR abs/2310.00205 (2023) - [i15]Wenxin Jiang, Chingwo Cheung, George K. Thiruvathukal, James C. Davis:
Exploring Naming Conventions (and Defects) of Pre-trained Deep Learning Models in Hugging Face and Other Model Hubs. CoRR abs/2310.01642 (2023) - [i14]Jesse Chen, Dharun Anandayuvaraj, James C. Davis, Sazzadur Rahaman:
A Unified Taxonomy and Evaluation of IoT Security Guidelines. CoRR abs/2310.01653 (2023) - [i13]Wenxin Jiang, Jason Jones, Jerin Yasmin, Nicholas Synovic, Rajeev Sashti, Sophie Chen, George K. Thiruvathukal, Yuan Tian, James C. Davis:
PeaTMOSS: Mining Pre-Trained Models in Open-Source Software. CoRR abs/2310.03620 (2023) - [i12]Paschal C. Amusuo, Kyle A. Robinson, Santiago Torres-Arias, Laurent Simon, James C. Davis:
Preventing Supply Chain Vulnerabilities in Java with a Fine-Grained Permission Manager. CoRR abs/2310.14117 (2023) - 2022
- [c27]Abhinav Goel, Caleb Tung, Xiao Hu, George K. Thiruvathukal, James C. Davis, Yung-Hsiang Lu:
Efficient Computer Vision on Edge Devices with Pipeline-Parallel Hierarchical Neural Networks. ASP-DAC 2022: 532-537 - [c26]Efe Barlas, Xin Du, James C. Davis:
Exploiting Input Sanitization for Regex Denial of Service. ICSE 2022: 883-895 - [c25]Abhinav Goel, Caleb Tung, Nick Eliopoulos, Xiao Hu, George K. Thiruvathukal, James C. Davis, Yung-Hsiang Lu:
Directed Acyclic Graph-based Neural Networks for Tunable Low-Power Computer Vision. ISLPED 2022: 30:1-30:6 - [c24]Nicholas M. Synovic, Matt Hyatt, Rohan Sethi, Sohini Thota, Shilpika, Allan J. Miller, Wenxin Jiang, Emmanuel S. Amobi, Austin Pinderski, Konstantin Läufer, Nicholas J. Hayward, Neil Klingensmith, James C. Davis, George K. Thiruvathukal:
Snapshot Metrics Are Not Enough: Analyzing Software Repositories with Longitudinal Metrics. ASE 2022: 167:1-167:4 - [c23]Dharun Anandayuvaraj, James C. Davis:
Reflecting on Recurring Failures in IoT Development. ASE 2022: 185:1-185:5 - [c22]Chinenye Okafor, Taylor R. Schorlemmer, Santiago Torres-Arias, James C. Davis:
SoK: Analysis of Software Supply Chain Security by Establishing Secure Design Properties. SCORED@CCS 2022: 15-24 - [c21]Wenxin Jiang, Nicholas Synovic, Rohan Sethi, Aryan Indarapu, Matt Hyatt, Taylor R. Schorlemmer, George K. Thiruvathukal, James C. Davis:
An Empirical Study of Artifacts and Security Risks in the Pre-trained Model Supply Chain. SCORED@CCS 2022: 105-114 - [c20]Nikhil Krishna Gopalakrishna, Dharun Anandayuvaraj, Annan Detti, Forrest Lee Bland, Sazzadur Rahaman, James C. Davis:
"If security is required": Engineering and Security Practices for Machine Learning-based IoT Devices. SERP4IoT 2022: 1-8 - [c19]Diego Montes, Pongpatapee Peerapatanapokin, Jeff Schultz, Chengjun Guo, Wenxin Jiang, James C. Davis:
Discrepancies among pre-trained deep neural networks: a new threat to model zoo reliability. ESEC/SIGSOFT FSE 2022: 1605-1609 - [c18]Paschal C. Amusuo, Aishwarya Sharma, Siddharth R. Rao, Abbey Vincent, James C. Davis:
Reflections on software failure analysis. ESEC/SIGSOFT FSE 2022: 1615-1620 - [c17]Qiang Xu, James C. Davis, Y. Charlie Hu, Abhilash Jindal:
An Empirical Study on the Impact of Deep Parameters on Mobile App Energy Usage. SANER 2022: 844-855 - [c16]Jakob Veselsky, Jack West, Isaac Ahlgren, George K. Thiruvathukal, Neil Klingensmith, Abhinav Goel, Wenxin Jiang, James C. Davis, Kyuin Lee, Younghyun Kim:
Establishing trust in vehicle-to-vehicle coordination: a sensor fusion approach. HotMobile 2022: 128 - [i11]Dharun Anandayuvaraj, James C. Davis:
Reflecting on Recurring Failures in IoT Development. CoRR abs/2206.13560 (2022) - [i10]Dharun Anandayuvaraj, Pujita Thulluri, Justin Figueroa, Harshit Shandilya, James C. Davis:
Towards a Failure-Aware SDLC for Internet of Things. CoRR abs/2206.13562 (2022) - [i9]Nicholas Synovic, Matt Hyatt, Rohan Sethi, Sohini Thota, Shilpika, Allan J. Miller, Wenxin Jiang, Emmanuel S. Amobi, Austin Pinderski, Konstantin Läufer, Nicholas J. Hayward, Neil Klingensmith, James C. Davis, George K. Thiruvathukal:
Snapshot Metrics Are Not Enough: Analyzing Software Repositories with Longitudinal Metrics. CoRR abs/2207.11767 (2022) - [i8]Paschal C. Amusuo, Aishwarya Sharma, Siddharth R. Rao, Abbey Vincent, James C. Davis:
Reflections on Software Failure Analysis. CoRR abs/2209.02930 (2022) - [i7]Sk Adnan Hassan, Zainab Aamir, Dongyoon Lee, James C. Davis, Francisco Servant:
Improving Developers' Understanding of Regex Denial of Service Tools through Anti-Patterns and Fix Strategies. CoRR abs/2212.07979 (2022) - 2021
- [j2]Ayaan M. Kazerouni, James C. Davis, Arinjoy Basak, Clifford A. Shaffer, Francisco Servant, Stephen H. Edwards:
Fast and accurate incremental feedback for students' software tests using selective mutation analysis. J. Syst. Softw. 175: 110905 (2021) - [c15]Abhinav Goel, Caleb Tung, Xiao Hu, Haobo Wang, James C. Davis, George K. Thiruvathukal, Yung-Hsiang Lu:
Low-Power Multi-Camera Object Re-Identification using Hierarchical Neural Networks. ISLPED 2021: 1-6 - [c14]Jordan Winkler, Abhimanyu Agarwal, Caleb Tung, Dario Rios Ugalde, Young Jin Jung, James C. Davis:
A replication of 'DeepBugs: a learning approach to name-based bug detection'. ESEC/SIGSOFT FSE 2021: 1604 - [c13]James C. Davis, Francisco Servant, Dongyoon Lee:
Using Selective Memoization to Defeat Regular Expression Denial of Service (ReDoS). SP 2021: 1-17 - [i6]James C. Davis, Louis G. Michael IV, Christy A. Coghlan, Francisco Servant, Dongyoon Lee:
Why Aren't Regular Expressions a Lingua Franca? An Empirical Study on the Re-use and Portability of Regular Expressions. CoRR abs/2105.04397 (2021) - [i5]Abhinav Goel, Caleb Tung, Xiao Hu, Haobo Wang, James C. Davis, George K. Thiruvathukal, Yung-Hsiang Lu:
Low-Power Multi-Camera Object Re-Identification using Hierarchical Neural Networks. CoRR abs/2106.10588 (2021) - [i4]Vishnu Banna, Akhil Chinnakotla, Zhengxin Yan, Anirudh Vegesana, Naveen Vivek, Kruthi Krishnappa, Wenxin Jiang, Yung-Hsiang Lu, George K. Thiruvathukal, James C. Davis:
An Experience Report on Machine Learning Reproducibility: Guidance for Practitioners and TensorFlow Model Garden Contributors. CoRR abs/2107.00821 (2021) - [i3]Abhinav Goel, Caleb Tung, Xiao Hu, George K. Thiruvathukal, James C. Davis, Yung-Hsiang Lu:
Efficient Computer Vision on Edge Devices with Pipeline-Parallel Hierarchical Neural Networks. CoRR abs/2109.13356 (2021) - 2020
- [b1]James C. Davis:
On the Impact and Defeat of Regular Expression Denial of Service. Virginia Tech, Blacksburg, VA, USA, 2020 - [j1]Lukas Rupprecht, James C. Davis, Constantine Arnold, Yaniv Gur, Deepavali Bhagwat:
Improving Reproducibility of Data Science Pipelines through Transparent Provenance Capture. Proc. VLDB Endow. 13(12): 3354-3368 (2020) - [c12]Alan Cha, Erik Wittern, Guillaume Baudart, James C. Davis, Louis Mandel, Jim Alain Laredo:
A principled approach to GraphQL query cost analysis. ESEC/SIGSOFT FSE 2020: 257-268 - [i2]Alan Cha, Erik Wittern, Guillaume Baudart, James C. Davis, Louis Mandel, Jim Alain Laredo:
A Principled Approach to GraphQL Query Cost Analysis. CoRR abs/2009.05632 (2020)
2010 – 2019
- 2019
- [c11]Erik Wittern, Alan Cha, James C. Davis, Guillaume Baudart, Louis Mandel:
An Empirical Study of GraphQL Schemas. ICSOC 2019: 3-19 - [c10]Louis G. Michael IV, James Donohue, James C. Davis, Dongyoon Lee, Francisco Servant:
Regexes are Hard: Decision-Making, Difficulties, and Risks in Programming Regular Expressions. ASE 2019: 415-426 - [c9]James C. Davis, Daniel Moyer, Ayaan M. Kazerouni, Dongyoon Lee:
Testing Regex Generalizability And Its Implications: A Large-Scale Many-Language Measurement Study. ASE 2019: 427-439 - [c8]Lukas Rupprecht, James C. Davis, Constantine Arnold, Alexander L. R. Lubbock, Darren R. Tyson, Deepavali Bhagwat:
Ursprung: Provenance for Large-Scale Analytics Environments. SIGMOD Conference 2019: 1989-1992 - [c7]James C. Davis, Louis G. Michael IV, Christy A. Coghlan, Francisco Servant, Dongyoon Lee:
Why aren't regular expressions a lingua franca? an empirical study on the re-use and portability of regular expressions. ESEC/SIGSOFT FSE 2019: 443-454 - [c6]James C. Davis:
Rethinking Regex engines to address ReDoS. ESEC/SIGSOFT FSE 2019: 1256-1258 - [c5]Xinwei Fu, Talha Ghaffar, James C. Davis, Dongyoon Lee:
EdgeWise: A Better Stream Processing Engine for the Edge. USENIX ATC 2019: 929-946 - [i1]Erik Wittern, Alan Cha, James C. Davis, Guillaume Baudart, Louis Mandel:
An Empirical Study of GraphQL Schemas. CoRR abs/1907.13012 (2019) - 2018
- [c4]James C. Davis, Christy A. Coghlan, Francisco Servant, Dongyoon Lee:
The impact of regular expression denial of service (ReDoS) in practice: an empirical study at the ecosystem scale. ESEC/SIGSOFT FSE 2018: 246-256 - [c3]James C. Davis, Eric R. Williamson, Dongyoon Lee:
A Sense of Time for JavaScript and Node.js: First-Class Timeouts as a Cure for Event Handler Poisoning. USENIX Security Symposium 2018: 343-359 - 2017
- [c2]James C. Davis, Gregor Kildow, Dongyoon Lee:
The Case of the Poisoned Event Handler: Weaknesses in the Node.js Event-Driven Architecture. EUROSEC 2017: 8:1-8:6 - [c1]James C. Davis, Arun Thekumparampil, Dongyoon Lee:
Node.fz: Fuzzing the Server-Side Event-Driven Architecture. EuroSys 2017: 145-160
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 20:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint