default search action
M. S. Raunak 0001
Person information
- affiliation: National Institute of Standards and Technology (NIST), Gaithersburg, MD, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j13]D. Richard Kuhn, M. S. Raunak, Raghu N. Kacker, Jaganmohan Chandrasekaran, Erin Lanus, Tyler Cody, Laura J. Freeman:
Assured Autonomy Through Combinatorial Methods. Computer 57(5): 86-90 (2024) - [j12]M. S. Raunak, D. Richard Kuhn:
AI Failures. Computer 57(11): 14-16 (2024) - [j11]Megan M. Olsen, D. Richard Kuhn, M. S. Raunak:
Explaining the impact of parameter combinations in agent-based models. J. Comput. Sci. 81: 102342 (2024) - 2022
- [j10]Laura J. Freeman, Feras A. Batarseh, D. Richard Kuhn, M. S. Raunak, Raghu N. Kacker:
The Path to a Consensus on Artificial Intelligence Assurance. Computer 55(3): 82-86 (2022) - 2021
- [j9]Jack R. Toohey, M. S. Raunak, Dave W. Binkley:
From Neuron Coverage to Steering Angle: Testing Autonomous Vehicles Effectively. Computer 54(8): 77-85 (2021) - [j8]M. S. Raunak, Rick Kuhn:
Explainable Artificial Intelligence and Machine Learning. Computer 54(10): 25-27 (2021) - 2020
- [j7]Rick Kuhn, M. S. Raunak:
Narrow Spectrum Software Testing Addressing Complexity and Trust. Computer 53(4): 15-18 (2020) - 2019
- [j6]Megan M. Olsen, M. S. Raunak:
Increasing Validity of Simulation Models Through Metamorphic Testing. IEEE Trans. Reliab. 68(1): 91-108 (2019) - 2018
- [j5]Rick Kuhn, M. S. Raunak, Raghu Kacker:
Can Reducing Faults Prevent Vulnerabilities? Computer 51(7): 82-85 (2018) - [j4]Nicky Mouha, M. S. Raunak, D. Richard Kuhn, Raghu Kacker:
Finding Bugs in Cryptographic Hash Function Implementations. IEEE Trans. Reliab. 67(3): 870-884 (2018) - 2017
- [j3]Rick Kuhn, M. S. Raunak, Raghu Kacker:
It Doesn't Have to Be Like This: Cybersecurity Vulnerability Trends. IT Prof. 19(6): 66-70 (2017) - 2013
- [j2]M. S. Raunak, Leon J. Osterweil:
Resource Management for Complex, Dynamic Environments. IEEE Trans. Software Eng. 39(3): 384-402 (2013) - 2002
- [j1]Mohammad S. Raunak, Prashant J. Shenoy, Pawan Goyal, Krithi Ramamritham, Puru Kulkarni:
Implications of proxy caching for provisioning networks and servers. IEEE J. Sel. Areas Commun. 20(7): 1276-1289 (2002)
Conference and Workshop Papers
- 2023
- [c24]Megan M. Olsen, M. S. Raunak, D. Richard Kuhn:
Predicting ABM Results with Covering Arrays and Random Forests. ICCS (1) 2023: 237-252 - [c23]D. Richard Kuhn, M. S. Raunak, Raghu N. Kacker:
Ordered t-way Combinations for Testing State-based Systems. ICSTW 2023: 246-254 - 2022
- [c22]Jaganmohan Chandrasekaran, Feras A. Batarseh, Laura J. Freeman, Raghu Kacker, M. S. Raunak, Rick Kuhn:
Enabling AI Adoption through Assurance. FLAIRS 2022 - [c21]D. Richard Kuhn, M. S. Raunak, Charles B. Prado, Vinay C. Patil, Raghu N. Kacker:
Combination Frequency Differencing for Identifying Design Weaknesses in Physical Unclonable Functions. ICST Workshops 2022: 110-117 - [c20]Rick Kuhn, M. S. Raunak, Raghu Kacker:
Combinatorial Coverage for Assured Autonomy. ISSRE Workshops 2022: 357-358 - 2021
- [c19]Mohammed Farhan, Caroline C. Krejci, Megan M. Olsen, M. S. Raunak:
Metamorphic Testing for Hybrid Simulation Validation. ANNSIM 2021: 1-12 - [c18]M. S. Raunak, Megan M. Olsen:
Metamorphic Testing on the Continuum of Verification and Validation of Simulation Models. MET@ICSE 2021: 47-52 - 2019
- [c17]Sydney Pugh, M. S. Raunak, D. Richard Kuhn, Raghu Kacker:
Systematic testing of post-quantum cryptographic implementations using metamorphic testing. MET@ICSE 2019: 2-8 - 2018
- [c16]Rick Kuhn, M. S. Raunak, Raghu Kacker:
What proportion of vulnerabilities can be attributed to ordinary coding errors?: poster. HotSoS 2018: 30:1 - [c15]Megan M. Olsen, M. S. Raunak, Michael Setteducati:
Enabling quantified validation for model credibility. SummerSim 2018: 34:1-34:10 - 2017
- [c14]M. S. Raunak, D. Richard Kuhn, Raghu Kacker:
Combinatorial Testing of Full Text Search in Web Applications. QRS Companion 2017: 100-107 - [c13]D. Richard Kuhn, M. S. Raunak, Raghu Kacker:
An Analysis of Vulnerability Trends, 2008-2016. QRS Companion 2017: 587-588 - 2016
- [c12]Megan M. Olsen, M. S. Raunak:
Metamorphic validation for agent-based simulation models. SummerSim 2016: 33 - 2015
- [c11]Megan M. Olsen, M. S. Raunak:
A method for quantified confidence of DEVS validation. SpringSim (TMS-DEVS) 2015: 135-142 - [c10]M. S. Raunak, Megan M. Olsen:
Simulation validation using metamorphic testing (WIP). SummerSim 2015: 69:1-69:6 - 2014
- [c9]M. S. Raunak, Megan M. Olsen:
Quantifying validation of discrete event simulation models. WSC 2014: 628-639 - 2013
- [c8]Megan M. Olsen, M. S. Raunak:
A framework for simulation validation coverage. WSC 2013: 1569-1580 - 2011
- [c7]Christian Murphy, M. S. Raunak, Andrew L. King, Sanjian Chen, Christopher Imbriano, Gail E. Kaiser, Insup Lee, Oleg Sokolsky, Lori A. Clarke, Leon J. Osterweil:
On effective testing of health care simulation software. SEHC@ICSE 2011: 40-47 - [c6]M. S. Raunak, Leon J. Osterweil, Alexander E. Wise:
Developing discrete event simulations from rigorous process definitions. SpringSim (TMS-DEVS) 2011: 117-124 - 2009
- [c5]M. S. Raunak, Leon J. Osterweil, Alexander E. Wise, Lori A. Clarke, Philip L. Henneman:
Simulating patient flow through an Emergency Department using process-driven discrete event simulation. SEHC@ICSE 2009: 73-83 - 2006
- [c4]Mohammad S. Raunak, Bin Chen, Amr Elssamadisy, Lori A. Clarke, Leon J. Osterweil:
Definition and Analysis of Election Processes. SPW/ProSim 2006: 178-185 - 2005
- [c3]Mohammad S. Raunak, Leon J. Osterweil:
Process Definition Language Support for Rapid Simulation Prototyping. ISPW 2005: 416-432 - 2001
- [c2]Bhuvan Urgaonkar, Anoop George Ninan, Mohammad S. Raunak, Prashant J. Shenoy, Krithi Ramamritham:
Maintaining Mutual Consistency for Cached Web Objects. ICDCS 2001: 371-380 - 2000
- [c1]Mohammad S. Raunak, Prashant J. Shenoy, Pawan Goyal, Krithi Ramamritham:
Implications of proxy caching for provisioning networks and servers. SIGMETRICS 2000: 66-77
Informal and Other Publications
- 2017
- [i1]Nicky Mouha, M. S. Raunak, D. Richard Kuhn, Raghu Kacker:
Finding Bugs in Cryptographic Hash Function Implementations. IACR Cryptol. ePrint Arch. 2017: 891 (2017)
Coauthor Index
aka: Raghu N. Kacker
aka: Rick Kuhn
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint