default search action
Raghavan Komondoor
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c33]Aniket Modi, Rohan Tikmany, Tanu Malik, Raghavan Komondoor, Ashish Gehani, Deepak D'Souza:
Kondo: Efficient Provenance-Driven Data Debloating. ICDE 2024: 4965-4978 - [e1]Sujit Kumar Charkrabarti, Raghavan Komondoor, Raveendra Kumar Medicherla, Aseem Rastogi, Sudipto Ghosh:
Proceedings of the 17th Innovations in Software Engineering Conference, ISEC 2024, Bangalore, India, February 22-24, 2024. ACM 2024 [contents] - 2023
- [c32]J. S. Sajiv Kumar, Raghavan Komondoor:
Controller Synthesis for Reactive Systems with Communication Delay by Formula Translation. ATVA (1) 2023: 292-311 - [c31]Stanly Samuel, Deepak D'Souza, Raghavan Komondoor:
Symbolic Fixpoint Algorithms for Logical LTL Games. ASE 2023: 698-709 - [c30]Rupashree Rangaiyengar, Raghavan Komondoor, Raveendra Kumar Medicherla:
Multi-Layer Observability for Fault Localization in Microservices Based Systems. SANER 2023: 733-737 - [i9]Stanly Samuel, Deepak D'Souza, Raghavan Komondoor:
Towards Efficient Controller Synthesis Techniques for Logical LTL Games. CoRR abs/2306.02427 (2023) - 2022
- [c29]Geetam Chawla, Navneet Aman, Raghavan Komondoor, Ashish Bokil, Nilesh Kharat:
Verification of ORM-based Controllers by Summary Inference. ICSE 2022: 2340-2351 - [c28]Vini Kanvar, Srikanth Tamilselvam, Raghavan Komondoor:
Handling Memory Pointers in Communication between Microservices. ICWS 2022: 85-90 - 2021
- [c27]Snigdha Athaiya, Raghavan Komondoor, K. Narayan Kumar:
Data Flow Analysis of Asynchronous Systems using Infinite Abstract Domains. ESOP 2021: 30-58 - [c26]Stanly Samuel, Deepak D'Souza, Raghavan Komondoor:
GenSys: a scalable fixed-point engine for maximal controller synthesis over infinite state spaces. ESEC/SIGSOFT FSE 2021: 1585-1589 - [i8]Snigdha Athaiya, Raghavan Komondoor, K. Narayan Kumar:
Data Flow Analysis of Asynchronous Systems using Infinite Abstract Domains. CoRR abs/2101.10233 (2021) - [i7]Raveendra Kumar Medicherla, Malathy Nagalakshmi, Tanya Sharma, Raghavan Komondoor:
HDR-Fuzz: Detecting Buffer Overruns using AddressSanitizer Instrumentation and Fuzzing. CoRR abs/2104.10466 (2021) - [i6]Stanly Samuel, Deepak D'Souza, Raghavan Komondoor:
GenSys: A Scalable Fixed-point Engine for Maximal Controller Synthesis over Infinite State Spaces. CoRR abs/2107.08794 (2021) - 2020
- [c25]Raveendra Kumar Medicherla, Raghavan Komondoor, Abhik Roychoudhury:
Fitness Guided Vulnerability Detection with Greybox Fuzzing. ICSE (Workshops) 2020: 513-520 - [c24]Raghavan Komondoor:
A Report on the PhD Symposium Track: ISEC 2020. ISEC 2020: 24:1-24:2
2010 – 2019
- 2019
- [c23]Himanshu Arora, Raghavan Komondoor, G. Ramalingam:
Checking Observational Purity of Procedures. FASE 2019: 228-243 - [i5]Himanshu Arora, Raghavan Komondoor, G. Ramalingam:
Checking Observational Purity of Procedures. CoRR abs/1902.05436 (2019) - 2018
- [j3]Girish Maskeri Rama, Raghavan Komondoor, Himanshu Sharma:
Refinement in object-sensitivity points-to analysis via slicing. Proc. ACM Program. Lang. 2(OOPSLA): 142:1-142:27 (2018) - 2017
- [c22]Girish Maskeri Rama, Raghavan Komondoor:
Detecting Full Initialization Points of Objects to Support Code Refactorings. APSEC 2017: 110-119 - [c21]Snigdha Athaiya, Raghavan Komondoor:
Testing and analysis of web applications using page models. ISSTA 2017: 181-191 - 2016
- [c20]Tejas Patil, Raghavan Komondoor, Deepak D'Souza, Indrajit Bhattacharya:
An Optimization Approach for Matching Textual Domain Models with Existing Code. ICSME 2016: 133-143 - 2015
- [j2]Amogh Margoor, Raghavan Komondoor:
Two techniques to improve the precision of a demand-driven null-dereference verification approach. Sci. Comput. Program. 98: 645-679 (2015) - [c19]Raveendra Kumar Medicherla, Raghavan Komondoor, S. Narendran:
Program specialization and verification using file format specifications. ICSME 2015: 191-200 - [c18]Raveendra Kumar Medicherla, Raghavan Komondoor:
Precision vs. scalability: Context sensitive analysis with prefix approximation. SANER 2015: 281-290 - [i4]M. Raveendra Kumar, Raghavan Komondoor, S. Narendran:
Static Analysis of File-Processing Programs using File Format Specifications. CoRR abs/1501.04730 (2015) - 2014
- [c17]K. Vasanta Lakshmi, Aravind Acharya, Raghavan Komondoor:
Checking Liveness Properties of Presburger Counter Systems Using Reachability Analysis. FM 2014: 335-350 - [c16]Girish Maskeri Rama, Raghavan Komondoor:
A dynamic analysis to support object-sharing code refactorings. ASE 2014: 713-724 - 2013
- [c15]Raghavan Komondoor:
Precise Slicing in Imperative Programs via Term-Rewriting and Abstract Interpretation. SAS 2013: 259-282 - [c14]Raghavan Komondoor, Indrajit Bhattacharya, Deepak D'Souza, Sachin Kale:
Using relationships for matching textual domain models with existing code. WCRE 2013: 371-380 - [i3]K. Vasanta Lakshmi, Aravind Acharya, Raghavan Komondoor:
Checking Temporal Properties of Presburger Counter Systems using Reachability Analysis. CoRR abs/1312.1070 (2013) - 2012
- [c13]Raghavan Komondoor, V. Krishna Nandivada, Saurabh Sinha, John Field:
Identifying services from legacy batch applications. ISEC 2012: 13-22 - [c12]Raghavan Komondoor, K. Vasanta Lakshmi, Deva P. Seetharam, Sudha Balodia:
Packet flow analysis in IP networks using data-flow analysis. ISEC 2012: 49-52 - 2011
- [c11]Ravichandhran Madhavan, Raghavan Komondoor:
Null dereference verification via over-approximated weakest pre-conditions analysis. OOPSLA 2011: 1033-1052 - [i2]Raghavan Komondoor, K. Vasanta Lakshmi, Deva P. Seetharam, Sudha Balodia:
Packet flow analysis in IP networks via abstract interpretation. CoRR abs/1111.6808 (2011) - 2010
- [c10]Hari S. Gupta, Deepak D'Souza, Raghavan Komondoor, Girish M. Rama:
A case study in matching service descriptions to implementations in an existing system. ICSM 2010: 1-10 - [i1]Hari S. Gupta, Deepak D'Souza, Raghavan Komondoor, Girish M. Rama:
A Case Study in Matching Service Descriptions to Implementations in an Existing System. CoRR abs/1008.2458 (2010)
2000 – 2009
- 2007
- [c9]Saurabh Sinha, G. Ramalingam, Raghavan Komondoor:
Parametric Process Model Inference. WCRE 2007: 21-30 - [c8]Raghavan Komondoor, G. Ramalingam:
Recovering Data Models via Guarded Dependences. WCRE 2007: 110-119 - 2006
- [j1]Satish Chandra, Jackie De Vries, John Field, Howard M. Hess, Manivannan Kalidasan, Raghavan Komondoor, Frans Nieuwerth, Ganesan Ramalingam, Justin Xue:
Technical forum: Using logical data models for understanding and transforming legacy business applications. IBM Syst. J. 45(3): 647-655 (2006) - [c7]Ganesan Ramalingam, Raghavan Komondoor, John Field, Saurabh Sinha:
Semantics-based reverse engineering of object-oriented data models. ICSE 2006: 192-201 - 2005
- [c6]Raghavan Komondoor, Ganesan Ramalingam, Satish Chandra, John Field:
Dependent Types for Program Understanding. TACAS 2005: 157-173 - 2003
- [c5]Raghavan Komondoor, Susan Horwitz:
Effective, Automatic Procedure Extraction. IWPC 2003: 33-43 - 2001
- [c4]Raghavan Komondoor, Susan Horwitz:
Tool Demonstration: Finding Duplicated Code Using Program Dependences. ESOP 2001: 383-386 - [c3]Raghavan Komondoor, Susan Horwitz:
Using Slicing to Identify Duplication in Source Code. SAS 2001: 40-56 - 2000
- [c2]Raghavan Komondoor, Susan Horwitz:
Semantics-Preserving Procedure Extraction. POPL 2000: 155-169
1990 – 1999
- 1999
- [c1]Yuri Breitbart, Raghavan Komondoor, Rajeev Rastogi, S. Seshadri, Abraham Silberschatz:
Update Propagation Protocols For Replicated Databases. SIGMOD Conference 1999: 97-108
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint