default search action
Tevfik Bultan
Person information
- affiliation: University of California, Santa Barbara, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j41]Ismet Burak Kadron, Yannic Noller, Rohan Padhye, Tevfik Bultan, Corina S. Pasareanu, Koushik Sen:
Fuzzing, Symbolic Execution, and Expert Guidance for Better Testing. IEEE Softw. 41(1): 98-104 (2024) - [i7]Laboni Sarker, Mara Downing, Achintya Desai, Tevfik Bultan:
Syntactic Robustness for LLM-based Code Generation. CoRR abs/2404.01535 (2024) - [i6]Md Shafiuzzaman, Achintya Desai, Laboni Sarker, Tevfik Bultan:
UEFI Vulnerability Signature Generation using Static and Symbolic Analysis. CoRR abs/2407.07166 (2024) - 2023
- [j40]Seemanta Saha, Surendra Ghentiyala, Shihua Lu, Lucas Bang, Tevfik Bultan:
Obtaining Information Leakage Bounds via Approximate Model Counting. Proc. ACM Program. Lang. 7(PLDI): 1488-1509 (2023) - [c117]William Eiers, Ganesh Sankaran, Tevfik Bultan:
Quantitative Policy Repair for Access Control on the Cloud. ISSTA 2023: 564-575 - [c116]Seemanta Saha, Laboni Sarker, Md Shafiuzzaman, Chaofan Shou, Albert Li, Ganesh Sankaran, Tevfik Bultan:
Rare Path Guided Fuzzing. ISSTA 2023: 1295-1306 - [c115]Mara Downing, Tevfik Bultan:
The Case for Scalable Quantitative Neural Network Analysis. SE4SafeML@SIGSOFT FSE 2023: 22-25 - 2022
- [c114]Seemanta Saha, Mara Downing, Tegan Brennan, Tevfik Bultan:
PREACH: A Heuristic for Probabilistic Reachability to Identify Hard to Reach Statements. ICSE 2022: 1706-1717 - [c113]William Eiers, Ganesh Sankaran, Albert Li, Emily O'Mahony, Benjamin Prince, Tevfik Bultan:
Quantifying Permissiveness of Access Control Policies. ICSE 2022: 1805-1817 - [c112]Ismet Burak Kadron, Chaofan Shou, Emily O'Mahony, Yilmaz Vural, Tevfik Bultan:
Targeted Black-Box Side-Channel Mitigation for IoT✱. IOT 2022: 49-56 - [c111]William Eiers, Ganesh Sankaran, Albert Li, Emily O'Mahony, Benjamin Prince, Tevfik Bultan:
Quacky: Quantitative Access Control Permissiveness Analyzer✱. ASE 2022: 163:1-163:5 - [c110]Ismet Burak Kadron, Tevfik Bultan:
TSA: a tool to detect and quantify network side-channels. ESEC/SIGSOFT FSE 2022: 1760-1764 - [i5]Seemanta Saha, Laboni Sarker, Md Shafiuzzaman, Chaofan Shou, Albert Li, Ganesh Sankaran, Tevfik Bultan:
Rare-Seed Generation for Fuzzing. CoRR abs/2212.09004 (2022) - 2021
- [c109]Chaofan Shou, Ismet Burak Kadron, Qi Su, Tevfik Bultan:
CorbFuzz: Checking Browser Security Policies with Fuzzing. ASE 2021: 215-226 - [i4]Chaofan Shou, Ismet Burak Kadron, Qi Su, Tevfik Bultan:
CorbFuzz: Checking Browser Security Policies with Fuzzing. CoRR abs/2109.00398 (2021) - 2020
- [j39]Cyrille Artho, Quoc-Sang Phan, Peter Aldous, Alyas Almaawi, Lucas Bang, Lasse Berglund, Tevfik Bultan, Zhenbang Chen, Hayes Converse, Wei Dong, William Eiers, Milos Gligoric, Simon Goldsmith, Lars Grunske, Joshua Hooker, Ismet Burak Kadron, Timo Kehrer, Sarfraz Khurshid, Xuan-Bach Dinh Le, David Lo, Eric Mercer, Sasa Misailovic, Egor Namakonov, Hoang Lam Nguyen, Yannic Noller, Benjamin Ogles, Rohan Padhye, Pavel Parízek, Corina S. Pasareanu, Sheridan Jacob Powell, Seemanta Saha, Koushik Sen, Elena Sherman, Kyle Storey, Minxing Tang, Willem Visser, Ji Wang, Hengbiao Yu:
The Java Pathfinder Workshop 2019. ACM SIGSOFT Softw. Eng. Notes 45(2): 20-22 (2020) - [c108]Tegan Brennan, Seemanta Saha, Tevfik Bultan:
JVM fuzzing for JIT-induced side-channel detection. ICSE 2020: 1011-1023 - [c107]Ismet Burak Kadron, Nicolás Rosner, Tevfik Bultan:
Feedback-driven side-channel analysis for networked applications. ISSTA 2020: 260-271 - [c106]Tegan Brennan, Nicolás Rosner, Tevfik Bultan:
JIT Leaks: Inducing Timing Side Channels through Just-In-Time Compilation. SP 2020: 1207-1222
2010 – 2019
- 2019
- [j38]Ivan Bocic, Tevfik Bultan, Nicolás Rosner:
Inductive verification of data model invariants in web applications using first-order logic. Autom. Softw. Eng. 26(2): 379-416 (2019) - [j37]Seemanta Saha, William Eiers, Ismet Burak Kadron, Lucas Bang, Tevfik Bultan:
Incremental Attack Synthesis. ACM SIGSOFT Softw. Eng. Notes 44(4): 16 (2019) - [c105]William Eiers, Seemanta Saha, Tegan Brennan, Tevfik Bultan:
Subformula Caching for Model Counting and Quantitative Program Analysis. ASE 2019: 453-464 - [c104]Nicolás Rosner, Ismet Burak Kadron, Lucas Bang, Tevfik Bultan:
Profit: Detecting and Quantifying Side Channels in Networked Applications. NDSS 2019 - [c103]Tevfik Bultan:
Quantifying Information Leakage Using Model Counting Constraint Solvers. VSTTE 2019: 30-35 - [e9]Joanne M. Atlee, Tevfik Bultan, Jon Whittle:
Proceedings of the 41st International Conference on Software Engineering, ICSE 2019, Montreal, QC, Canada, May 25-31, 2019. IEEE / ACM 2019, ISBN 978-1-7281-0869-8 [contents] - [e8]Joanne M. Atlee, Tevfik Bultan, Jon Whittle:
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, ICSE 2019, Montreal, QC, Canada, May 25-31, 2019. IEEE / ACM 2019, ISBN 978-1-7281-1764-5 [contents] - [i3]Seemanta Saha, William Eiers, Ismet Burak Kadron, Lucas Bang, Tevfik Bultan:
Incremental Adaptive Attack Synthesis. CoRR abs/1905.05322 (2019) - [i2]Seemanta Saha, Ismet Burak Kadron, William Eiers, Lucas Bang, Tevfik Bultan:
Attack Synthesis for Strings using Meta-Heuristics. CoRR abs/1907.11710 (2019) - 2018
- [j36]Tevfik Bultan:
Side-Channel Analysis via Symbolic Execution and Model Counting. ACM SIGSOFT Softw. Eng. Notes 43(4): 55 (2018) - [j35]Seemanta Saha, Ismet Burak Kadron, William Eiers, Lucas Bang, Tevfik Bultan:
Attack Synthesis for Strings using Meta-Heuristics. ACM SIGSOFT Softw. Eng. Notes 43(4): 56 (2018) - [c102]Nestan Tsiskaridze, Lucas Bang, Joseph McMahan, Tevfik Bultan, Timothy Sherwood:
Information Leakage in Arbiter Protocols. ATVA 2018: 404-421 - [c101]Lucas Bang, Nicolás Rosner, Tevfik Bultan:
Online Synthesis of Adaptive Side-Channel Attacks Based On Noisy Observations. EuroS&P 2018: 307-322 - [c100]Chun-Han Lin, Fang Yu, Jie-Hong Roland Jiang, Tevfik Bultan:
Static detection of API call vulnerabilities in iOS executables. ICSE (Companion Volume) 2018: 394-395 - [c99]Tegan Brennan, Seemanta Saha, Tevfik Bultan:
Symbolic path cost analysis for side-channel detection. ICSE (Companion Volume) 2018: 424-425 - [c98]Tegan Brennan, Seemanta Saha, Tevfik Bultan, Corina S. Pasareanu:
Symbolic path cost analysis for side-channel detection. ISSTA 2018: 27-37 - [c97]Abdulbaki Aydin, William Eiers, Lucas Bang, Tegan Brennan, Miroslav Gavrilov, Tevfik Bultan, Fang Yu:
Parameterized model counting for string and numeric constraints. ESEC/SIGSOFT FSE 2018: 400-410 - 2017
- [b1]Tevfik Bultan, Fang Yu, Muath Alkhalaf, Abdulbaki Aydin:
String Analysis for Software Verification and Security. Springer 2017, ISBN 978-3-319-68668-4, pp. 1-166 - [j34]Tevfik Bultan, Andreas Zeller:
Guest editorial: emerging areas in automated software engineering research. Autom. Softw. Eng. 24(4): 863-864 (2017) - [c96]Quoc-Sang Phan, Lucas Bang, Corina S. Pasareanu, Pasquale Malacaria, Tevfik Bultan:
Synthesis of Adaptive Side-Channel Attacks. CSF 2017: 328-342 - [c95]Ivan Bocic, Tevfik Bultan:
Symbolic model extraction for web application verification. ICSE 2017: 724-734 - [c94]Tegan Brennan, Nestan Tsiskaridze, Nicolás Rosner, Abdulbaki Aydin, Tevfik Bultan:
Constraint normalization and parameterized caching for quantitative program analysis. ESEC/SIGSOFT FSE 2017: 535-546 - [e7]Tevfik Bultan, Koushik Sen:
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10 - 14, 2017. ACM 2017, ISBN 978-1-4503-5076-1 [contents] - [i1]Quoc-Sang Phan, Lucas Bang, Corina S. Pasareanu, Pasquale Malacaria, Tevfik Bultan:
Synthesis of Adaptive Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2017: 401 (2017) - 2016
- [j33]Samik Basu, Tevfik Bultan:
On deciding synchronizability for asynchronously communicating systems. Theor. Comput. Sci. 656: 60-75 (2016) - [c93]Samik Basu, Tevfik Bultan:
Automated Choreography Repair. FASE 2016: 13-30 - [c92]Tevfik Bultan:
Side Channel Analysis Using a Model Counting Constraint Solver and Symbolic Execution (Invited Talk). FSTTCS 2016: 6:1-6:2 - [c91]Fang Yu, Ching-Yuan Shueh, Chun-Han Lin, Yu-Fang Chen, Bow-Yaw Wang, Tevfik Bultan:
Optimal sanitization synthesis for web application vulnerability repair. ISSTA 2016: 189-200 - [c90]Ivan Bocic, Tevfik Bultan:
Finding access control bugs in web applications with CanCheck. ASE 2016: 155-166 - [c89]Lucas Bang, Abdulbaki Aydin, Quoc-Sang Phan, Corina S. Pasareanu, Tevfik Bultan:
String analysis for side channels with segmented oracles. SIGSOFT FSE 2016: 193-204 - 2015
- [j32]Jian Lu, David S. Rosenblum, Tevfik Bultan, Valérie Issarny, Schahram Dustdar, Margaret-Anne D. Storey, Dongmei Zhang:
Roundtable: The Future of Software Engineering for Internet Computing. IEEE Softw. 32(1): 91-97 (2015) - [j31]Jaideep Nijjar, Ivan Bocic, Tevfik Bultan:
Data Model Property Inference, Verification, and Repair for Web Applications. ACM Trans. Softw. Eng. Methodol. 24(4): 25:1-25:27 (2015) - [c88]Abdulbaki Aydin, Lucas Bang, Tevfik Bultan:
Automata-Based Model Counting for String Constraints. CAV (1) 2015: 255-272 - [c87]Ivan Bocic, Tevfik Bultan:
Coexecutability for Efficient Verification of Data Model Updates. ICSE (1) 2015: 744-754 - [c86]Ivan Bocic, Tevfik Bultan:
Efficient Data Model Verification with Many-Sorted Logic (T). ASE 2015: 42-52 - [c85]Ivan Bocic, Tevfik Bultan:
Data Model Bugs. NFM 2015: 393-399 - [c84]Lucas Bang, Abdulbaki Aydin, Tevfik Bultan:
Automatically computing path complexity of programs. ESEC/SIGSOFT FSE 2015: 61-72 - [c83]Tevfik Bultan:
String Analysis for Vulnerability Detection and Repair. SPIN 2015: 3-9 - 2014
- [j30]Fang Yu, Muath Alkhalaf, Tevfik Bultan, Oscar H. Ibarra:
Automata-based symbolic string analysis for vulnerability detection. Formal Methods Syst. Des. 44(1): 44-70 (2014) - [c82]Chandra Krintz, Hiranya Jayathilaka, Stratos Dimopoulos, Alexander Pucher, Rich Wolski, Tevfik Bultan:
Cloud Platform Support for API Governance. IC2E 2014: 615-618 - [c81]Ivan Bocic, Tevfik Bultan:
Inductive verification of data model invariants for web applications. ICSE 2014: 620-631 - [c80]Abdulbaki Aydin, Muath Alkhalaf, Tevfik Bultan:
Automated Test Generation from Vulnerability Signatures. ICST 2014: 193-202 - [c79]Muath Alkhalaf, Abdulbaki Aydin, Tevfik Bultan:
Semantic differential repair for input validation and sanitization. ISSTA 2014: 225-236 - [c78]Samik Basu, Tevfik Bultan:
Automatic verification of interactions in asynchronous systems with unbounded buffers. ASE 2014: 743-754 - 2013
- [c77]Meriem Ouederni, Gwen Salaün, Tevfik Bultan:
Compatibility Checking for Asynchronously Communicating Software. FACS 2013: 310-328 - [c76]Tevfik Bultan:
Analyzing Interactions of Asynchronously Communicating Software Components - (Invited Paper). FMOODS/FORTE 2013: 1-4 - [c75]Jaideep Nijjar, Ivan Bocic, Tevfik Bultan:
An integrated data model verifier with property templates. FormaliSE@ICSE 2013: 29-35 - [c74]Jaideep Nijjar, Tevfik Bultan:
Data model property inference and repair. ISSTA 2013: 202-212 - [e6]Ewen Denney, Tevfik Bultan, Andreas Zeller:
2013 28th IEEE/ACM International Conference on Automated Software Engineering, ASE 2013, Silicon Valley, CA, USA, November 11-15, 2013. IEEE 2013 [contents] - 2012
- [j29]Gwen Salaün, Tevfik Bultan, Nima Roohi:
Realizability of Choreographies Using Process Algebra Encodings. IEEE Trans. Serv. Comput. 5(3): 290-304 (2012) - [c73]Muath Alkhalaf, Tevfik Bultan, Jose L. Gallegos:
Verifying client-side input validation functions using string analysis. ICSE 2012: 947-957 - [c72]Muath Alkhalaf, Shauvik Roy Choudhary, Mattia Fazzini, Tevfik Bultan, Alessandro Orso, Christopher Kruegel:
ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies. ISSTA 2012: 56-66 - [c71]Jaideep Nijjar, Tevfik Bultan:
Unbounded data model verification using SMT solvers. ASE 2012: 210-219 - [c70]Samik Basu, Tevfik Bultan, Meriem Ouederni:
Deciding choreography realizability. POPL 2012: 191-202 - [c69]Samik Basu, Tevfik Bultan, Meriem Ouederni:
Synchronizability for Verification of Asynchronously Communicating Systems. VMCAI 2012: 56-71 - [e5]Will Tracz, Martin P. Robillard, Tevfik Bultan:
20th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-20), SIGSOFT/FSE'12, Cary, NC, USA - November 11 - 16, 2012. ACM 2012, ISBN 978-1-4503-1614-9 [contents] - 2011
- [j28]Fang Yu, Tevfik Bultan, Oscar H. Ibarra:
Relational String Verification Using Multi-Track Automata. Int. J. Found. Comput. Sci. 22(8): 1909-1924 (2011) - [c68]Fang Yu, Muath Alkhalaf, Tevfik Bultan:
Patching vulnerabilities with sanitization synthesis. ICSE 2011: 251-260 - [c67]Jaideep Nijjar, Tevfik Bultan:
Bounded verification of Ruby on Rails data models. ISSTA 2011: 67-77 - [c66]Fang Yu, Tevfik Bultan, Ben Hardekopf:
String Abstractions for String Verification. SPIN 2011: 20-37 - [c65]Samik Basu, Tevfik Bultan:
Choreography conformance via synchronizability. WWW 2011: 795-804 - [e4]Tevfik Bultan, Pao-Ann Hsiung:
Automated Technology for Verification and Analysis, 9th International Symposium, ATVA 2011, Taipei, Taiwan, October 11-14, 2011. Proceedings. Lecture Notes in Computer Science 6996, Springer 2011, ISBN 978-3-642-24371-4 [contents] - [e3]Mario Bravetti, Tevfik Bultan:
Web Services and Formal Methods - 7th International Workshop, WS-FM 2010, Hoboken, NJ, USA, September 16-17, 2010. Revised Selected Papers. Lecture Notes in Computer Science 6551, Springer 2011, ISBN 978-3-642-19588-4 [contents] - 2010
- [j27]Sylvain Hallé, Tevfik Bultan, Graham Hughes, Muath Alkhalaf, Roger Villemaire:
Runtime Verification of Web Service Interface Contracts. Computer 43(3): 59-66 (2010) - [c64]Sylvain Hallé, Taylor Ettema, Chris Bunch, Tevfik Bultan:
Eliminating navigation errors in web applications via model checking and runtime enforcement of navigation state machines. ASE 2010: 235-244 - [c63]Tevfik Bultan, Fang Yu, Aysu Betin-Can:
Modular verification of synchronization with reentrant locks. MEMOCODE 2010: 59-68 - [c62]Sylvain Hallé, Tevfik Bultan:
Realizability analysis for message-based interactions using shared-state projections. SIGSOFT FSE 2010: 27-36 - [c61]Tevfik Bultan:
Software for everyone by everyone. FoSER 2010: 69-74 - [c60]Fang Yu, Muath Alkhalaf, Tevfik Bultan:
Stranger: An Automata-Based String Analysis Tool for PHP. TACAS 2010: 154-157 - [c59]Fang Yu, Tevfik Bultan, Oscar H. Ibarra:
Relational String Verification Using Multi-track Automata. CIAA 2010: 290-299 - [c58]Ben Rubinger, Tevfik Bultan:
Contracting the Facebook API. TAV-WEB 2010: 63-74
2000 – 2009
- 2009
- [j26]Tuba Yavuz-Kahveci, Tevfik Bultan:
Action Language verifier: an infinite-state model checker for reactive software specifications. Formal Methods Syst. Des. 35(3): 325-367 (2009) - [c57]Sylvain Hallé, Graham Hughes, Tevfik Bultan, Muath Alkhalaf:
Generating Interface Grammars from WSDL for Automated Verification of Web Services. ICSOC/ServiceWave 2009: 516-530 - [c56]Tevfik Bultan, Chris Ferguson, Xiang Fu:
A Tool for Choreography Analysis Using Collaboration Diagrams. ICWS 2009: 856-863 - [c55]Gwen Salaün, Tevfik Bultan:
Realizability of Choreographies Using Process Algebra Encodings. IFM 2009: 167-182 - [c54]Zachary Stengel, Tevfik Bultan:
Analyzing singularity channel contracts. ISSTA 2009: 13-24 - [c53]Fang Yu, Muath Alkhalaf, Tevfik Bultan:
Generating Vulnerability Signatures for String Manipulating Programs Using Automata-Based Forward and Backward Symbolic Analyses. ASE 2009: 605-609 - [c52]Fang Yu, Tevfik Bultan, Oscar H. Ibarra:
Symbolic String Verification: Combining String Analysis and Size Analysis. TACAS 2009: 322-336 - 2008
- [j25]Tevfik Bultan, Constance L. Heitmeyer:
Applying infinite state model checking and other analysis techniques to tabular requirements specifications of safety-critical systems. Des. Autom. Embed. Syst. 12(1-2): 97-137 (2008) - [j24]Tevfik Bultan, Xiang Fu:
Choreography Modeling and Analysis with Collaboration Diagrams. IEEE Data Eng. Bull. 31(3): 27-30 (2008) - [j23]Tevfik Bultan, Xiang Fu:
Specification of realizable service conversations using collaboration diagrams. Serv. Oriented Comput. Appl. 2(1): 27-39 (2008) - [j22]Graham Hughes, Tevfik Bultan:
Automated verification of access control policies using a SAT solver. Int. J. Softw. Tools Technol. Transf. 10(6): 503-520 (2008) - [j21]Graham Hughes, Tevfik Bultan:
Interface Grammars for Modular Software Model Checking. IEEE Trans. Software Eng. 34(5): 614-632 (2008) - [c51]Tevfik Bultan:
Service Choreography and Orchestration with Conversations. CONCUR 2008: 2-3 - [c50]Graham Hughes, Tevfik Bultan, Muath Alkhalaf:
Client and server verification for web services using interface grammars. TAV-WEB 2008: 40-46 - [c49]Tevfik Bultan, Tao Xie:
Workshop on testing, analysis and verification of web software (TAV-WEB 2008). ISSTA 2008: 311-312 - [c48]Fang Yu, Chao Wang, Aarti Gupta, Tevfik Bultan:
Modular verification of web services using efficient symbolic encoding and summarization. SIGSOFT FSE 2008: 192-202 - [c47]Fang Yu, Tevfik Bultan, Marco Cova, Oscar H. Ibarra:
Symbolic String Verification: An Automata-Based Approach. SPIN 2008: 306-324 - [e2]Tevfik Bultan, Tao Xie:
Proceedings of the 2008 Workshop on Testing, Analysis, and Verification of Web Services and Applications, held in conjunction with the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2008), TAV-WEB 2008, Seattle, Washington, USA, July 21, 2008. ACM 2008, ISBN 978-1-60558-053-1 [contents] - 2007
- [j20]Aysu Betin-Can, Tevfik Bultan, Mikael Lindvall, Benjamin Lux, Stefan Topp:
Eliminating synchronization faults in air traffic control software via design for verification with concurrency controllers. Autom. Softw. Eng. 14(2): 129-178 (2007) - [j19]Mikael Lindvall, Ioana Rus, Paolo Donzelli, Atif M. Memon, Marvin V. Zelkowitz, Aysu Betin-Can, Tevfik Bultan, Christopher Ackermann, Bettina Anders, Sima Asgari, Victor R. Basili, Lorin Hochstein, Jörg Fellmann, Forrest Shull, Roseanne Tesoriero Tvedt, Daniel Pech, Daniel Hirschbach:
Experimenting with software testbeds for evaluating new technologies. Empir. Softw. Eng. 12(4): 417-444 (2007) - [j18]Aysu Betin-Can, Tevfik Bultan:
Highly dependable concurrent programming using design for verification. Formal Aspects Comput. 19(2): 243-268 (2007) - [c46]Graham Hughes, Tevfik Bultan:
Interface grammars for modular software model checking. ISSTA 2007: 39-49 - [c45]Elliot Barlas, Tevfik Bultan:
Netstub: a framework for verification of distributed java applications. ASE 2007: 24-33 - [c44]Fang Yu, Tevfik Bultan, Erik Peterson:
Automated size analysis for OCL. ESEC/SIGSOFT FSE 2007: 331-340 - [c43]Tevfik Bultan, Xiang Fu:
Specification of Realizable Service Conversations Using Collaboration Diagrams. SOCA 2007: 122-132 - [c42]Jianwen Su, Tevfik Bultan, Xiang Fu, Xiangpeng Zhao:
Towards a Theory of Web Service Choreographies. WS-FM 2007: 1-16 - [p1]Tevfik Bultan, Xiang Fu, Jianwen Su:
Analyzing Conversations: Realizability, Synchronizability, and Verification. Test and Analysis of Web Services 2007: 57-85 - 2006
- [j17]Tevfik Bultan, Jianwen Su, Xiang Fu:
Analyzing Conversations of Web Services. IEEE Internet Comput. 10(1): 18-25 (2006) - [j16]Constantinos Bartzis, Tevfik Bultan:
Efficient BDDs for bounded arithmetic constraints. Int. J. Softw. Tools Technol. Transf. 8(1): 26-36 (2006) - [c41]Tevfik Bultan, Constance L. Heitmeyer:
Analyzing tabular requirements specifications using infinite state model checking. MEMOCODE 2006: 7-16 - [e1]Tevfik Bultan:
Proceedings of the 2006 Workshop on Testing, Analysis, and Verification of Web Services and Applications, held in conjunction with the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2006), TAV-WEB 2006, Portland, Maine, USA, July 17, 2006. ACM 2006, ISBN 1-59593-458-8 [contents] - 2005
- [j15]Xiang Fu, Tevfik Bultan, Jianwen Su:
Realizability of Conversation Protocols with Message Contents. Int. J. Web Serv. Res. 2(4): 68-93 (2005) - [j14]Shriram Krishnamurthi, Tevfik Bultan:
Discussion summary: characteristics of web services and their impact on testing, analysis and verification. ACM SIGSOFT Softw. Eng. Notes 30(1): 5 (2005) - [j13]Xiang Fu, Tevfik Bultan, Jianwen Su:
Synchronizability of Conversations among Web Services. IEEE Trans. Software Eng. 31(12): 1042-1055 (2005) - [c40]Tuba Yavuz-Kahveci, Constantinos Bartzis, Tevfik Bultan:
Action Language Verifier, Extended. CAV 2005: 413-417 - [c39]Aysu Betin-Can, Tevfik Bultan:
Verifiable Web Services with Hierarchical Interfaces. ICWS 2005: 85-94 - [c38]Jianwen Su, Tevfik Bultan, Xiang Fu:
Web Service Interactions: Analysis and Design. SDWP@ICWS 2005 - [c37]Aysu Betin-Can, Tevfik Bultan, Mikael Lindvall, Benjamin Lux, Stefan Topp:
Application of design for verification with concurrency controllers to air traffic control software. ASE 2005: 14-23 - [c36]Tuba Yavuz-Kahveci, Tevfik Bultan:
Verification of parameterized hierarchical state machines using action language verifier. MEMOCODE 2005: 79-88 - [c35]Tevfik Bultan, Constance L. Heitmeyer, John O'Leary:
Panel on design for verification. MEMOCODE 2005: 232-235 - [c34]Tevfik Bultan, Aysu Betin-Can:
Scalable Software Model Checking Using Design for Verification. VSTTE 2005: 337-346 - [c33]Aysu Betin-Can, Tevfik Bultan, Xiang Fu:
Design for verification for asynchronously communicating Web services. WWW 2005: 750-759 - 2004
- [j12]Zhe Dang, Tevfik Bultan, Oscar H. Ibarra, Richard A. Kemmerer:
Past pushdown timed automata and safety verification. Theor. Comput. Sci. 313(1): 57-71 (2004) - [j11]Xiang Fu, Tevfik Bultan, Jianwen Su:
Conversation protocols: a formalism for specification and verification of reactive electronic services. Theor. Comput. Sci. 328(1-2): 19-37 (2004) - [c32]Tevfik Bultan, Xiang Fu, Jianwen Su:
Tools for Automated Verification of Web Services. ATVA 2004: 8-10 - [c31]Constantinos Bartzis, Tevfik Bultan:
Widening Arithmetic Automata. CAV 2004: 321-333 - [c30]Xiang Fu, Tevfik Bultan, Jianwen Su:
WSAT: A Tool for Formal Analysis of Web Services. CAV 2004: 510-514 - [c29]Xiang Fu, Tevfik Bultan, Jianwen Su:
Realizability of Conversation Protocols With Message Contents. ICWS 2004: 96- - [c28]Xiang Fu, Tevfik Bultan, Jianwen Su:
Model checking XML manipulating software. ISSTA 2004: 252-262 - [c27]Aysu Betin-Can, Tevfik Bultan:
Verifiable Concurrent Programming Using Concurrency Controllers. ASE 2004: 248-257 - [c26]Sandeep K. Shukla, Tevfik Bultan, Constance L. Heitmeyer:
Panel: given that hardware verification has been an uphill battle, what is the future of software verification? MEMOCODE 2004: 157-158 - [c25]Xiang Fu, Tevfik Bultan, Jianwen Su:
Analysis of interacting BPEL web services. WWW 2004: 621-630 - 2003
- [j10]Constantinos Bartzis, Tevfik Bultan:
Efficient Symbolic Representations for Arithmetic Constraints in Verification. Int. J. Found. Comput. Sci. 14(4): 605-624 (2003) - [j9]Tuba Yavuz-Kahveci, Tevfik Bultan:
A symbolic manipulator for automated verification of reactive systems with heterogeneous data types. Int. J. Softw. Tools Technol. Transf. 5(1): 15-33 (2003) - [c24]Constantinos Bartzis, Tevfik Bultan:
Efficient Image Computation in Infinite State Model Checking. CAV 2003: 249-261 - [c23]Constantinos Bartzis, Tevfik Bultan:
Construction of Efficient BDDs for Bounded Arithmetic Constraints. TACAS 2003: 394-408 - [c22]Xiang Fu, Tevfik Bultan, Jianwen Su:
Conversation Protocols: A Formalism for Specification and Verification of Reactive Electronic Services. CIAA 2003: 188-200 - [c21]Tevfik Bultan, Xiang Fu, Richard Hull, Jianwen Su:
Conversation specification: a new approach to design and analysis of e-service composition. WWW 2003: 403-410 - [c20]Aysu Betin-Can, Tevfik Bultan:
Interface-Based Specification and Verification of Concurrency Controllers. SoftMC@CAV 2003: 464-479 - 2002
- [j8]Oscar H. Ibarra, Jianwen Su, Zhe Dang, Tevfik Bultan, Richard A. Kemmerer:
Counter Machines and Verification Problems. Theor. Comput. Sci. 289(1): 165-189 (2002) - [c19]Tuba Yavuz-Kahveci, Tevfik Bultan:
Heuristics for Efficient Manipulation of Composite Constraints. FroCoS 2002: 57-71 - [c18]Tuba Yavuz-Kahveci, Tevfik Bultan:
Specification, verification, and synthesis of concurrency control components. ISSTA 2002: 169-179 - [c17]Tuba Yavuz-Kahveci, Tevfik Bultan:
Automated Verification of Concurrent Linked Lists with Counters. SAS 2002: 69-84 - [c16]Xiang Fu, Tevfik Bultan, Jianwen Su:
Formal Verification of e-Services and Workflows. WES 2002: 188-202 - [c15]Constantinos Bartzis, Tevfik Bultan:
Automata-Based Representations for Arithmetic Constraints in Automated Verification. CIAA 2002: 282-288 - 2001
- [j7]Oscar H. Ibarra, Tevfik Bultan, Jianwen Su:
On Reachability and Safety in Infinite-State Systems. Int. J. Found. Comput. Sci. 12(6): 821-836 (2001) - [c14]Giorgio Delzanno, Tevfik Bultan:
Constraint-Based Verification of Client-Server Protocols. CP 2001: 286-301 - [c13]Tevfik Bultan, Tuba Yavuz-Kahveci:
Action Language Verifier. ASE 2001: 382-386 - [c12]Tuba Yavuz-Kahveci, Murat Tuncer, Tevfik Bultan:
A Library for Composite Symbolic Representations. TACAS 2001: 52-66 - [c11]Xiang Fu, Tevfik Bultan, Richard Hull, Jianwen Su:
Verification of Vortex Workflows. TACAS 2001: 143-157 - [c10]Zhe Dang, Tevfik Bultan, Oscar H. Ibarra, Richard A. Kemmerer:
Past Pushdown Timed Automata. CIAA 2001: 74-86 - 2000
- [j6]Tevfik Bultan:
A composite model checking toolset for analyzing software systems. ACM SIGSOFT Softw. Eng. Notes 25(1): 37-38 (2000) - [j5]Tevfik Bultan, Richard Gerber, Christopher League:
Composite model-checking: verification with type-specific symbolic representations. ACM Trans. Softw. Eng. Methodol. 9(1): 3-50 (2000) - [c9]Zhe Dang, Oscar H. Ibarra, Tevfik Bultan, Richard A. Kemmerer, Jianwen Su:
Binary Reachability Analysis of Discrete Pushdown Timed Automata. CAV 2000: 69-84 - [c8]Oscar H. Ibarra, Tevfik Bultan, Jianwen Su:
Reachability Analysis for Some Models of Infinite-State Transition Systems. CONCUR 2000: 183-198 - [c7]Tevfik Bultan:
Action Language: a specification language for model checking reactive systems. ICSE 2000: 335-344 - [c6]Oscar H. Ibarra, Jianwen Su, Zhe Dang, Tevfik Bultan, Richard A. Kemmerer:
Conter Machines: Decidable Properties and Applications to Verification Problems. MFCS 2000: 426-435 - [c5]Tevfik Bultan:
BDD vs. Constraint-Based Model Checking: An Experimental Evaluation for Asynchronous Concurrent Systems. TACAS 2000: 441-455
1990 – 1999
- 1999
- [j4]Tevfik Bultan, Richard Gerber, William W. Pugh:
Model-checking concurrent systems with unbounded integer variables: symbolic representations, approximations, and experimental results. ACM Trans. Program. Lang. Syst. 21(4): 747-789 (1999) - 1998
- [j3]Cevdet Aykanat, Tevfik Bultan, Ismail Haritaoglu:
A fast neural-network algorithm for VLSI cell placement. Neural Networks 11(9): 1671-1684 (1998) - [c4]Tevfik Bultan, Richard Gerber, Christopher League:
Verifying Systems with Integer Constraints and Boolean Predicates: A Composite Approach. ISSTA 1998: 113-123 - 1997
- [c3]Tevfik Bultan, Richard Gerber, William W. Pugh:
Symbolic Model Checking of Infinite State Systems Using Presburger Arithmetic. CAV 1997: 400-411 - 1996
- [c2]Tevfik Bultan, Jeffrey Fischer, Richard Gerber:
Compositional Verification by Model Checking for Counter-Examples. ISSTA 1996: 224-238 - 1995
- [j2]Tevfik Bultan, Cevdet Aykanat:
Circuit partitioning using mean field annealing. Neurocomputing 8(2): 171-194 (1995) - 1992
- [j1]Tevfik Bultan, Cevdet Aykanat:
A New Mapping Heuristic Based on Mean Field Annealing. J. Parallel Distributed Comput. 16(4): 292-305 (1992) - 1991
- [c1]Tevfik Bultan, Cevdet Aykanat:
Circuit partitioning using parallel mean field annealing algorithms. SPDP 1991: 534-541
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint