default search action
Jim Laredo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Saurabh Pujar, Yunhui Zheng, Luca Buratti, Burn L. Lewis, Yunchung Chen, Jim Laredo, Alessandro Morari, Edward A. Epstein, Tsungnan Lin, Bo Yang, Zhong Su:
Analyzing source code vulnerabilities in the D2A dataset with ML ensembles and C-BERT. Empir. Softw. Eng. 29(2): 48 (2024) - 2023
- [j6]Sahil Suneja, Yufan Zhuang, Yunhui Zheng, Jim Laredo, Alessandro Morari, Udayan Khurana:
Incorporating Signal Awareness in Source Code Modeling: An Application to Vulnerability Detection. ACM Trans. Softw. Eng. Methodol. 32(6): 145:1-145:40 (2023) - [c37]Sahil Suneja, Yufan Zhuang, Yunhui Zheng, Jim Laredo, Alessandro Morari, Udayan Khurana:
Code Vulnerability Detection via Signal-Aware Learning. EuroS&P 2023: 506-523 - [c36]Michelle Brachman, Qian Pan, Hyo Jin Do, Casey Dugan, Arunima Chaudhary, James M. Johnson, Priyanshu Rai, Tathagata Chakraborti, Thomas Gschwind, Jim Alain Laredo, Christoph Miksovic, Paolo Scotton, Kartik Talamadupula, Gegi Thomas:
Follow the Successful Herd: Towards Explanations for Improved Use and Mental Models of Natural Language Systems. IUI 2023: 220-239 - 2022
- [c35]Michelle Brachman, Christopher Bygrave, Tathagata Chakraborti, Arunima Chaudhary, Zhining Ding, Casey Dugan, David Gros, Thomas Gschwind, James M. Johnson, Jim Laredo, Christoph Miksovic, Qian Pan, Priyanshu Rai, Ramkumar Ramalingam, Paolo Scotton, Nagarjuna Surabathina, Kartik Talamadupula:
A Goal-Driven Natural Language Interface for Creating Application Integration Workflows. AAAI 2022: 13155-13157 - [c34]Saurabh Pujar, Yunhui Zheng, Luca Buratti, Burn L. Lewis, Alessandro Morari, Jim Laredo, Kevin Postlethwait, Christoph Görn:
Varangian: A Git Bot for Augmented Static Analysis. MSR 2022: 766-767 - [c33]Yangruibo Ding, Sahil Suneja, Yunhui Zheng, Jim Laredo, Alessandro Morari, Gail E. Kaiser, Baishakhi Ray:
VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements. SANER 2022: 959-970 - 2021
- [c32]Sahil Suneja, Yunhui Zheng, Yufan Zhuang, Jim Alain Laredo, Alessandro Morari:
Towards Reliable AI for Source Code Understanding. SoCC 2021: 403-411 - [c31]Yunhui Zheng, Saurabh Pujar, Burn L. Lewis, Luca Buratti, Edward A. Epstein, Bo Yang, Jim Laredo, Alessandro Morari, Zhong Su:
D2A: A Dataset Built for AI-Based Vulnerability Detection Methods Using Differential Analysis. ICSE (SEIP) 2021: 111-120 - [c30]Georgios Mavroudeas, Guillaume Baudart, Alan Cha, Martin Hirzel, Jim Alain Laredo, Malik Magdon-Ismail, Louis Mandel, Erik Wittern:
Learning GraphQL Query Cost. ASE 2021: 1146-1150 - [c29]Sahil Suneja, Yunhui Zheng, Yufan Zhuang, Jim Alain Laredo, Alessandro Morari:
Probing model signal-awareness via prediction-preserving input minimization. ESEC/SIGSOFT FSE 2021: 945-955 - [i13]Yunhui Zheng, Saurabh Pujar, Burn L. Lewis, Luca Buratti, Edward A. Epstein, Bo Yang, Jim Laredo, Alessandro Morari, Zhong Su:
D2A: A Dataset Built for AI-Based Vulnerability Detection Methods Using Differential Analysis. CoRR abs/2102.07995 (2021) - [i12]Georgios Mavroudeas, Guillaume Baudart, Alan Cha, Martin Hirzel, Jim Alain Laredo, Malik Magdon-Ismail, Louis Mandel, Erik Wittern:
Learning GraphQL Query Costs (Extended Version). CoRR abs/2108.11139 (2021) - [i11]Yufan Zhuang, Sahil Suneja, Veronika Thost, Giacomo Domeniconi, Alessandro Morari, Jim Laredo:
Software Vulnerability Detection via Deep Learning over Disaggregated Code Graph Representation. CoRR abs/2109.03341 (2021) - [i10]Sahil Suneja, Yufan Zhuang, Yunhui Zheng, Jim Laredo, Alessandro Morari:
Data-Driven and SE-assisted AI Model Signal-Awareness Enhancement and Introspection. CoRR abs/2111.05827 (2021) - [i9]Yangruibo Ding, Sahil Suneja, Yunhui Zheng, Jim Laredo, Alessandro Morari, Gail E. Kaiser, Baishakhi Ray:
VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements. CoRR abs/2112.10893 (2021) - 2020
- [c28]Alan Cha, Erik Wittern, Guillaume Baudart, James C. Davis, Louis Mandel, Jim Alain Laredo:
A principled approach to GraphQL query cost analysis. ESEC/SIGSOFT FSE 2020: 257-268 - [i8]Sahil Suneja, Yunhui Zheng, Yufan Zhuang, Jim Laredo, Alessandro Morari:
Learning to map source code to software vulnerability using code-as-a-graph. CoRR abs/2006.08614 (2020) - [i7]Luca Buratti, Saurabh Pujar, Mihaela A. Bornea, J. Scott McCarley, Yunhui Zheng, Gaetano Rossiello, Alessandro Morari, Jim Laredo, Veronika Thost, Yufan Zhuang, Giacomo Domeniconi:
Exploring Software Naturalness through Neural Language Models. CoRR abs/2006.12641 (2020) - [i6]Alan Cha, Erik Wittern, Guillaume Baudart, James C. Davis, Louis Mandel, Jim Alain Laredo:
A Principled Approach to GraphQL Query Cost Analysis. CoRR abs/2009.05632 (2020) - [i5]Yunhui Zheng, Sahil Suneja, Yufan Zhuang, Alessandro Morari, Jim Laredo:
Probing Model Signal-Awareness via Prediction-Preserving Input Minimization. CoRR abs/2011.14934 (2020)
2010 – 2019
- 2018
- [j5]Petr Novotný, Qi Zhang, Richard Hull, Salman Baset, Jim Laredo, Roman Vaculín, Daniel L. Ford, Donna N. Dillenberger:
Permissioned blockchain technologies for academic publishing. Inf. Serv. Use 38(3): 159-171 (2018) - [c27]Erik Wittern, Alan Cha, Jim Alain Laredo:
Generating GraphQL-Wrappers for REST(-like) APIs. ICWE 2018: 65-83 - [i4]Erik Wittern, Alan Cha, Jim Alain Laredo:
Generating GraphQL-Wrappers for REST(-like) APIs. CoRR abs/1809.08319 (2018) - [i3]Petr Novotný, Qi Zhang, Richard Hull, Salman Baset, Jim Laredo, Roman Vaculín, Daniel L. Ford, Donna N. Dillenberger:
Permissioned Blockchain Technologies for Academic Publishing. CoRR abs/1809.08529 (2018) - 2017
- [c26]Erik Wittern, Annie T. T. Ying, Yunhui Zheng, Jim Alain Laredo, Julian Dolby, Christopher C. Young, Aleksander Slominski:
Opportunities in Software Engineering Research for Web API Consumption. WAPI@ICSE 2017: 7-10 - [c25]Erik Wittern, Annie T. T. Ying, Yunhui Zheng, Julian Dolby, Jim Alain Laredo:
Statically checking web API requests in JavaScript. ICSE 2017: 244-254 - [i2]Erik Wittern, Annie T. T. Ying, Yunhui Zheng, Julian Dolby, Jim Alain Laredo:
Statically Checking Web API Requests in JavaScript. CoRR abs/1702.03906 (2017) - [i1]Erik Wittern, Annie T. T. Ying, Yunhui Zheng, Jim Alain Laredo, Julian Dolby, Christopher C. Young, Aleksander Slominski:
Opportunities in Software Engineering Research for Web API Consumption. CoRR abs/1705.06586 (2017) - 2016
- [j4]Maja Vukovic, Jim Laredo, Vinod Muthusamy, Aleksander Slominski, Roman Vaculín, Wei Tan, Vijay K. Naik, Ignacio Silva-Lepe, Arun Kumar, Biplav Srivastava, Joel W. Branch:
Riding and thriving on the API hype cycle. Commun. ACM 59(3): 35-37 (2016) - [j3]Erik Wittern, Vinod Muthusamy, Jim Laredo, Maja Vukovic, Aleksander Slominski, Shriram Rajagopalan, Hani Jamjoom, Arjun Natarajan:
API Harmony: Graph-based search and selection of APIs in the cloud. IBM J. Res. Dev. 60(2-3) (2016) - 2014
- [c24]Maja Vukovic, Jim Laredo, Sriram Rajagopal:
API Terms and Conditions as a Service. IEEE SCC 2014: 386-393 - [c23]Erik Wittern, Jim Laredo, Maja Vukovic, Vinod Muthusamy, Aleksander Slominski:
A Graph-Based Data Model for API Ecosystem Insights. ICWS 2014: 41-48 - 2013
- [j2]Jakob Rogstadius, Maja Vukovic, C. A. Teixeira, Vassilis Kostakos, Evangelos Karapanos, Jim Laredo:
CrisisTracker: Crowdsourced social media curation for disaster awareness. IBM J. Res. Dev. 57(5) (2013) - [c22]Maja Vukovic, Jim Laredo, Yaoping Ruan, Milton Hernandez, Sriram Rajagopal:
Assessing service deployment readiness using enterprise crowdsourcing. IM 2013: 984-989 - 2012
- [c21]Supreet Mandala, Maja Vukovic, Jim Laredo, Yaoping Ruan, Milton Hernandez:
Hybrid Role Mining for Security Service Solution. IEEE SCC 2012: 210-217 - [c20]Maja Vukovic, Jim Laredo, Valentina Salapura:
h-IQ: Human Intelligence for Quality of Service Delivery Data. IEEE SCC 2012: 586-593 - [c19]Rahul P. Akolkar, Tom Chefalas, Jim Laredo, Chang-Shing Perng, Anca Sailer, Frank Schaffa, Ignacio Silva-Lepe, Tao Tao:
Towards cloud services marketplaces. CNSM 2012: 179-183 - [c18]Kumar Bhaskaran, Milton Hernandez, Jim Laredo, Laura Luan, Yaoping Ruan, Maja Vukovic, Paul Driscoll, Daniel Miller, Alan Skinner, Girish Verma, Prema Vivekanandan, Leanne Chen, Gregory Gaskill:
Privileged identity management in enterprise service-hosting environments. NOMS 2012: 736-749 - [c17]Mattias Marder, Kumar Bhaskaran, Milton Hernandez, Jim Laredo, Daniela Rosu, Yaoping Ruan, Paul Driscoll, Alan Skinner:
Integrated user activity monitoring for regulatory services. NOMS 2012: 750-763 - [c16]Rahul P. Akolkar, Tom Chefalas, Jim Laredo, Chang-Shing Perng, Anca Sailer, Frank Schaffa, Ignacio Silva-Lepe, Tao Tao:
The Future of Service Marketplaces in the Cloud. SERVICES 2012: 262-269 - 2011
- [c15]Sai Zeng, Jim Alain Laredo, Sameep Mehta, Himanshu Chauhan, Ashish Verma, Douglas Williams, Beth Browne:
An Evidence Based Analytical Approach for Process Automation: Case Study in Finance and Administration Process Delivery Services. ICEBE 2011: 286-292 - [c14]Jim Laredo, Maja Vukovic, Sriram Rajagopal:
Service for Crowd-Driven Gathering of Non-Discoverable Knowledge. ICSOC Workshops 2011: 283-294 - [c13]Jakob Rogstadius, Vassilis Kostakos, Aniket Kittur, Boris Smus, Jim Laredo, Maja Vukovic:
An Assessment of Intrinsic and Extrinsic Motivation on Task Performance in Crowdsourcing Markets. ICWSM 2011 - 2010
- [c12]Mariana Lopez, Maja Vukovic, Jim Laredo:
PeopleCloud Service for Enterprise Crowdsourcing. IEEE SCC 2010: 538-545 - [c11]Maja Vukovic, Jim Laredo, Sriram Rajagopal:
Challenges and Experiences in Deploying Enterprise Crowdsourcing Service. ICWE 2010: 460-467 - [c10]Polychronis Ypodimatopoulos, Maja Vukovic, Jim Laredo, Sriram Rajagopal:
Server Hunt: Using Enterprise Social Networks for Knowledge Discovery in IT Inventory Management. SERVICES 2010: 195-196
2000 – 2009
- 2009
- [j1]Christopher Ward, Shimon Agassi, Kamal Bhattacharya, O. Biran, R. Cocchiara, M. E. Factor, C. T. Hayashi, T. Hochberg, B. Kearney, Jim Laredo, David Loewenstern, A. E. Rodecap, J. K. Skoog, Larisa Shwartz, M. Thompson, R. Thompson, Yaron Wolfsthal:
Toward transforming business continuity services. IBM J. Res. Dev. 53(6): 7 (2009) - [c9]Maja Vukovic, Mariana Lopez, Jim Laredo:
PeopleCloud for the Globally Integrated Enterprise. ICSOC/ServiceWave Workshops 2009: 109-114 - [c8]Liliana Pasquale, Jim Laredo, Heiko Ludwig, Kamal Bhattacharya, Bruno Wassermann:
Distributed Cross-Domain Configuration Management. ICSOC/ServiceWave 2009: 622-636 - [c7]Bruno Wassermann, Heiko Ludwig, Jim Laredo, Kamal Bhattacharya, Liliana Pasquale:
Distributed Cross-Domain Change Management. ICWS 2009: 59-66 - [c6]Jim Laredo, Jeaha Yang, Jun-Jang Jeng, Gabriela Perez:
SIMPLE: Template Based Service Integration. SERVICES I 2009: 465-466 - [c5]Heiko Ludwig, Jim Laredo, Kamal Bhattacharya, Liliana Pasquale, Bruno Wassermann:
REST-based management of loosely coupled services. WWW 2009: 931-940 - 2008
- [c4]Thomas Kwok, Jim Laredo, Sridhar Maradugu:
A Web Services Integration to Manage Invoice Identification, Metadata Extraction, Storage and Retrieval in a Multi-tenancy SaaS Application. ICEBE 2008: 359-366 - [c3]Jim Alain Laredo, Ravi Ranjan:
Continuous Improvement through Iterative Development in a Multi-Geography. ICGSE 2008: 232-236 - [c2]Shiwa S. Fu, Jeaha Yang, Jim Laredo, Ying Huang, Henry Chang, Santhosh Kumaran, Jen-Yao Chung, Yury Kosov:
Solution Templates Tool for Enterprise Business Applications Integration. SUTC 2008: 314-319 - 2007
- [c1]Markus Stolze, Kuo Zhang, Ying Huang, Noi Sukaviriya, Brian White Eagle, Jim Laredo:
The Stakeholder Matrix: Supporting the Modeling of Responsibility in Situation-Oriented Directories. CEC/EEE 2007: 571-576
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint