default search action
Gogul Balakrishnan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c27]Aditya Kanade, Petros Maniatis, Gogul Balakrishnan, Kensen Shi:
Learning and Evaluating Contextual Embedding of Source Code. ICML 2020: 5110-5121 - [i1]Aditya Kanade, Petros Maniatis, Gogul Balakrishnan, Kensen Shi:
Pre-trained Contextual Embedding of Source Code. CoRR abs/2001.00059 (2020)
2010 – 2019
- 2015
- [j2]Franjo Ivancic, Gogul Balakrishnan, Aarti Gupta, Sriram Sankaranarayanan, Naoto Maeda, Takashi Imoto, Rakesh Pothengil, Mustafa Hussain:
Scalable and scope-bounded software verification in Varvel. Autom. Softw. Eng. 22(4): 517-559 (2015) - 2014
- [c26]Xusheng Xiao, Gogul Balakrishnan, Franjo Ivancic, Naoto Maeda, Aarti Gupta, Deepak Chhetri:
ARC++: effective typestate and lifetime dependency analysis. ISSTA 2014: 116-126 - [c25]Yu Lin, Franjo Ivancic, Pallavi Joshi, Gogul Balakrishnan, Malay K. Ganai, Aarti Gupta:
Environment-Sensitive Performance Tuning for Distributed Service Orchestration. VECPAR 2014: 209-223 - 2013
- [c24]Pranav Garg, Franjo Ivancic, Gogul Balakrishnan, Naoto Maeda, Aarti Gupta:
Feedback-directed unit test generation for C/C++ using concolic execution. ICSE 2013: 132-141 - [c23]Pallavi Joshi, Malay K. Ganai, Gogul Balakrishnan, Aarti Gupta, Nadia Papakonstantinou:
SETSUDŌ: perturbation-based testing framework for scalable distributed systems. TRIOS@SOSP 2013: 7:1-7:14 - 2012
- [c22]Jing Yang, Gogul Balakrishnan, Naoto Maeda, Franjo Ivancic, Aarti Gupta, Nishant Sinha, Sriram Sankaranarayanan, Naveen Sharma:
Object Model Construction for Inheritance in C++ and Its Applications to Program Analysis. CC 2012: 144-164 - [c21]Khalil Ghorbal, Franjo Ivancic, Gogul Balakrishnan, Naoto Maeda, Aarti Gupta:
Donut Domains: Efficient Non-convex Domains for Abstract Interpretation. VMCAI 2012: 235-250 - 2011
- [c20]Prakash Prabhu, Naoto Maeda, Gogul Balakrishnan, Franjo Ivancic, Aarti Gupta:
Interprocedural Exception Analysis for C++. ECOOP 2011: 583-608 - [c19]Gogul Balakrishnan, Naoto Maeda, Sriram Sankaranarayanan, Franjo Ivancic, Aarti Gupta, Rakesh Pothengil:
Modeling and Analyzing the Interaction of C and C++ Strings. FoVeOOS 2011: 67-85 - [c18]Franjo Ivancic, Gogul Balakrishnan, Aarti Gupta, Sriram Sankaranarayanan, Naoto Maeda, Hiroki Tokuoka, Takashi Imoto, Yoshiaki Miyazaki:
DC2: A framework for scalable, scope-bounded software verification. ASE 2011: 133-142 - [c17]Malay K. Ganai, Nipun Arora, Chao Wang, Aarti Gupta, Gogul Balakrishnan:
BEST: A symbolic testing tool for predicting multi-threaded program failures. ASE 2011: 596-599 - 2010
- [j1]Gogul Balakrishnan, Thomas W. Reps:
WYSINWYX: What you see is not what you eXecute. ACM Trans. Program. Lang. Syst. 32(6): 23:1-23:84 (2010) - [c16]Thomas W. Reps, Junghee Lim, Aditya V. Thakur, Gogul Balakrishnan, Akash Lal:
There's Plenty of Room at the Bottom: Analyzing and Verifying Machine Code. CAV 2010: 41-56 - [c15]Gogul Balakrishnan, Malay K. Ganai, Aarti Gupta, Franjo Ivancic, Vineet Kahlon, Weihong Li, Naoto Maeda, Nadia Papakonstantinou, Sriram Sankaranarayanan, Nishant Sinha, Chao Wang:
Scalable and precise program analysis at NEC. FMCAD 2010: 273-274
2000 – 2009
- 2009
- [c14]Gogul Balakrishnan, Sriram Sankaranarayanan, Franjo Ivancic, Aarti Gupta:
Refining the control structure of loops using static analysis. EMSOFT 2009: 49-58 - 2008
- [c13]Thomas W. Reps, Gogul Balakrishnan:
Improved Memory-Access Analysis for x86 Executables. CC 2008: 16-35 - [c12]Gogul Balakrishnan, Sriram Sankaranarayanan, Franjo Ivancic, Ou Wei, Aarti Gupta:
SLR: Path-Sensitive Analysis through Infeasible-Path Detection and Syntactic Language Refinement. SAS 2008: 238-254 - [c11]Gogul Balakrishnan, Malay K. Ganai:
PED: Proof-Guided Error Diagnosis by Triangulation of Program Error Causes. SEFM 2008: 268-278 - [c10]Gogul Balakrishnan, Thomas W. Reps:
Analyzing Stripped Device-Driver Executables. TACAS 2008: 124-140 - 2007
- [c9]Gogul Balakrishnan, Thomas W. Reps:
DIVINE: DIscovering Variables IN Executables. VMCAI 2007: 1-28 - [p1]Thomas W. Reps, Gogul Balakrishnan, Junghee Lim, Tim Teitelbaum:
A Next-Generation Platform for Analyzing Executables. Malware Detection 2007: 43-61 - 2006
- [c8]Thomas W. Reps, Gogul Balakrishnan, Junghee Lim:
Intermediate-representation recovery from low-level code. PEPM 2006: 100-111 - [c7]Gogul Balakrishnan, Thomas W. Reps:
Recency-Abstraction for Heap-Allocated Storage. SAS 2006: 221-239 - 2005
- [c6]Thomas W. Reps, Gogul Balakrishnan, Junghee Lim, Tim Teitelbaum:
A Next-Generation Platform for Analyzing Executables. APLAS 2005: 212-229 - [c5]Gogul Balakrishnan, Thomas W. Reps, Nicholas Kidd, Akash Lal, Junghee Lim, David Melski, Radu Gruian, Suan Hsi Yong, Chi-Hua Chen, Tim Teitelbaum:
Model Checking x86 Executables with CodeSurfer/x86 and WPDS++. CAV 2005: 158-163 - [c4]Akash Lal, Thomas W. Reps, Gogul Balakrishnan:
Extended Weighted Pushdown Systems. CAV 2005: 434-448 - [c3]Gogul Balakrishnan, Radu Gruian, Thomas W. Reps, Tim Teitelbaum:
CodeSurfer/x86-A Platform for Analyzing x86 Executables. CC 2005: 250-254 - [c2]Gogul Balakrishnan, Thomas W. Reps, David Melski, Tim Teitelbaum:
WYSINWYX: What You See Is Not What You eXecute. VSTTE 2005: 202-213 - 2004
- [c1]Gogul Balakrishnan, Thomas W. Reps:
Analyzing Memory Accesses in x86 Executables. CC 2004: 5-23
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint