


default search action
Barton P. Miller
Person information
- affiliation: University of Wisconsin-Madison, Madison, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c110]Raúl Reinosa Simón, Clara I. Valero, José A. Martínez Cadenas, Elisa R. Heymann, Ignacio Lacalle, Barton P. Miller, Carlos Enrique Palau:
Empirical Analysis and Practical Assessment of Ransomware Attacks to Data in Motion. CSR 2024: 216-221 - 2023
- [j46]Sharmin Afrose
, Ya Xiao, Sazzadur Rahaman, Barton P. Miller
, Danfeng Yao
:
Evaluation of Static Vulnerability Detection Tools With Java Cryptographic API Benchmarks. IEEE Trans. Software Eng. 49(2): 485-497 (2023) - [c109]Sazzadur Rahaman, Miles Frantz, Barton P. Miller, Danfeng (Daphne) Yao:
SpanL: Creating Algorithms for Automatic API Misuse Detection with Program Analysis Compositions. ACNS Workshops 2023: 515-529 - 2022
- [j45]Elisa R. Heymann, Barton P. Miller:
Software Security for the People: Free and Open Resources for Software Security Training. IEEE Secur. Priv. 20(2): 88-95 (2022) - [j44]Danfeng Daphne Yao
, Sazzadur Rahaman, Ya Xiao, Sharmin Afrose
, Miles Frantz
, Ke Tian
, Na Meng, Cristina Cifuentes, Yang Zhao, Nicholas Allen, Nathan Keynes, Barton P. Miller
, Elisa Heymann
, Murat Kantarcioglu, Fahad Shaon:
Being the Developers' Friend: Our Experience Developing a High-Precision Tool for Secure Coding. IEEE Secur. Priv. 20(6): 43-52 (2022) - [j43]Barton P. Miller
, Mengxiao Zhang
, Elisa R. Heymann
:
The Relevance of Classic Fuzz Testing: Have We Solved This One? IEEE Trans. Software Eng. 48(6): 2028-2039 (2022) - 2021
- [c108]Xiaozhu Meng, Jonathon M. Anderson
, John M. Mellor-Crummey
, Mark W. Krentel, Barton P. Miller, Srdan Milakovic:
Parallel binary code analysis. PPoPP 2021: 76-89 - [i15]Sharmin Afrose, Ya Xiao, Sazzadur Rahaman, Barton P. Miller, Danfeng Yao:
Evaluation of Static Vulnerability Detection Tools with Java Cryptographic API Benchmarks. CoRR abs/2112.04037 (2021) - [i14]Michael Gerndt, Masaaki Kondo, Barton P. Miller, Tapasya Patki:
Adaptive Resource Management for HPC Systems (Dagstuhl Seminar 21441). Dagstuhl Reports 11(10): 1-19 (2021) - 2020
- [j42]Joseph O. Eichenhofer, Elisa Heymann
, Barton P. Miller
, Arnold Kang:
An In-Depth Security Assessment of Maritime Container Terminal Software Systems. IEEE Access 8: 128050-128067 (2020) - [c107]Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Ke Tian, Miles Frantz, Na Meng, Barton P. Miller, Fahad Shaon, Murat Kantarcioglu, Danfeng (Daphne) Yao
:
Deployment-quality and Accessible Solutions for Cryptography Code Development. CODASPY 2020: 174-176 - [c106]Benjamin Welton, Barton P. Miller:
Identifying and (automatically) remedying performance problems in CPU/GPU applications. ICS 2020: 27:1-27:13 - [i13]Xiaozhu Meng, Jonathon M. Anderson, John M. Mellor-Crummey, Mark W. Krentel, Barton P. Miller, Srdan Milakovic:
Parallelizing Binary Code Analysis. CoRR abs/2001.10621 (2020) - [i12]Joseph O. Eichenhofer, Elisa Heymann, Barton P. Miller, Arnold Kang:
An In-Depth Security Assessment of Maritime Container Terminal Software Systems. CoRR abs/2006.12056 (2020) - [i11]Barton P. Miller, Mengxiao Zhang, Elisa R. Heymann:
The Relevance of Classic Fuzz Testing: Have We Solved This One? CoRR abs/2008.06537 (2020)
2010 – 2019
- 2019
- [c105]Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Ke Tian, Miles Frantz
, Na Meng, Barton P. Miller, Fahad Shaon, Murat Kantarcioglu, Danfeng (Daphne) Yao
:
Poster: Deployment-quality and Accessible Solutions for Cryptography Code Development. CCS 2019: 2545-2547 - [c104]Benjamin Welton, Barton P. Miller:
Diogenes: looking for an honest CPU/GPU performance measurement tool. SC 2019: 21:1-21:20 - [c103]Andrew K. Adams, Kay Avila
, Jim Basney
, Dana Brunson
, Robert Cowles, Jeannette Dopheide, Terry Fleury, Elisa Heymann, Florence D. Hudson, Craig Jackson, Ryan Kiser, Mark Krenz, Jim Marsteller, Barton P. Miller, Sean Peisert
, Scott Russell, Susan Sons, Von Welch
, John Zage:
Trusted CI Experiences in Cybersecurity and Service to Open Science. PEARC 2019: 60 - [i10]Andrew K. Adams, Kay Avila, Jim Basney, Dana Brunson, Robert Cowles, Jeannette Dopheide, Terry Fleury, Elisa Heymann, Florence D. Hudson, Craig Jackson, Ryan Kiser, Mark Krenz, Jim Marsteller, Barton P. Miller, Sean Peisert
, Scott Russell, Susan Sons, Von Welch, John Zage:
Trusted CI Experiences in Cybersecurity and Service to Open Science. CoRR abs/1904.05383 (2019) - 2018
- [c102]Benjamin Welton, Barton P. Miller:
Exposing Hidden Performance Opportunities in High Performance GPU Applications. CCGrid 2018: 301-310 - [c101]Elisa Heymann, Barton P. Miller:
Tutorial: Secure Coding Practices, Automated Assessment Tools and the SWAMP. SecDev 2018: 124-125 - [c100]Nathan Jay, Barton P. Miller:
Structured random differential testing of instruction decoders. SANER 2018: 84-94 - [i9]Xiaozhu Meng, Barton P. Miller, Somesh Jha:
Adversarial Binaries for Authorship Identification. CoRR abs/1809.08316 (2018) - 2017
- [j41]James A. Kupsch, Elisa Heymann
, Barton P. Miller, Vamshi Basupalli:
Bad and good news about using software assurance tools. Softw. Pract. Exp. 47(1): 143-156 (2017) - [c99]Xiaozhu Meng
, Barton P. Miller, Kwang-Sung Jun:
Identifying Multiple Authors in a Binary Program. ESORICS (2) 2017: 286-304 - 2016
- [c98]Xiaozhu Meng, Barton P. Miller:
Binary code is not easy. ISSTA 2016: 24-35 - 2014
- [c97]Emily R. Jacobson, Andrew R. Bernat, William R. Williams
, Barton P. Miller:
Detecting Code Reuse Attacks with a Model of Conformant Program Execution. ESSoS 2014: 1-18 - [c96]Benjamin Welton, Barton P. Miller:
The anatomy of Mr. Scan: a dissection of performance of an extreme scale GPU-based clustering algorithm. ScalA@SC 2014: 54-60 - [e6]Arndt Bode, Michael Gerndt, Per Stenström, Lawrence Rauchwerger, Barton P. Miller, Martin Schulz:
2014 International Conference on Supercomputing, ICS'14, Muenchen, Germany, June 10-13, 2014. ACM 2014, ISBN 978-1-4503-2642-1 [contents] - [i8]Barton P. Miller, Yoshio Tanaka, Elisa Heymann:
Grid and Cloud Security: A Confluence (NII Shonan Meeting 2014-3). NII Shonan Meet. Rep. 2014 (2014) - 2013
- [j40]Kevin A. Roundy
, Barton P. Miller:
Binary-code obfuscations in prevalent packer tools. ACM Comput. Surv. 46(1): 4:1-4:32 (2013) - [j39]Joshua D. Goehner, Dorian C. Arnold, Dong H. Ahn, Gregory L. Lee, Bronis R. de Supinski, Matthew P. LeGendre, Barton P. Miller, Martin Schulz
:
LIBI: A framework for bootstrapping extreme scale software systems. Parallel Comput. 39(3): 167-176 (2013) - [c95]Xiaozhu Meng, Barton P. Miller, William R. Williams
, Andrew R. Bernat:
Mining Software Repositories for Accurate Authorship. ICSM 2013: 250-259 - [c94]Dong H. Ahn, Michael J. Brim
, Bronis R. de Supinski, Todd Gamblin, Gregory L. Lee, Matthew P. LeGendre, Barton P. Miller, Adam Moody, Martin Schulz
:
Efficient and Scalable Retrieval Techniques for Global File Properties. IPDPS 2013: 369-380 - [c93]Jairo Serrano, Eduardo César
, Elisa Heymann
, Barton P. Miller:
Increasing Automated Vulnerability Assessment Accuracy on Cloud and Grid Middleware. ISPEC 2013: 278-294 - [c92]Benjamin Welton, Evan Samanas, Barton P. Miller:
Mr. Scan: extreme scale density-based clustering using a tree-based network of GPGPU nodes. SC 2013: 84:1-84:11 - 2012
- [j38]Jairo Serrano, Elisa Heymann, Eduardo César, Barton P. Miller:
Computer Sciences Department. Comput. Informatics 31(1): 103-118 (2012) - [c91]Wenbin Fang, Barton P. Miller, James A. Kupsch:
Automated tracing and visualization of software security structure and properties. VizSEC 2012: 9-16 - [c90]Andrew R. Bernat, Barton P. Miller:
Structured Binary Editing with a CFG Transformation Algebra. WCRE 2012: 9-18 - [i7]Barton P. Miller, Yoshio Tanaka, Elisa Heymann:
Grid and Cloud Security: A Confluence (NII Shonan Meeting 2012-8). NII Shonan Meet. Rep. 2012 (2012) - 2011
- [c89]Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller:
Who Wrote This Code? Identifying the Authors of Program Binaries. ESORICS 2011: 172-189 - [c88]Andrew R. Bernat, Kevin A. Roundy, Barton P. Miller:
Efficient, sensitivity resistant binary instrumentation. ISSTA 2011: 89-99 - [c87]Nathan E. Rosenblum, Barton P. Miller, Xiaojin Zhu:
Recovering the toolchain provenance of binary code. ISSTA 2011: 100-110 - [c86]Emily R. Jacobson, Nathan E. Rosenblum, Barton P. Miller:
Labeling library functions in stripped binaries. PASTE 2011: 1-8 - [c85]Andrew R. Bernat, Barton P. Miller:
Anywhere, any-time binary instrumentation. PASTE 2011: 9-16 - 2010
- [j37]Michael Gerndt, Barton P. Miller:
Special Issue: Scalable Tools for High-end Computing. Concurr. Comput. Pract. Exp. 22(6): 683-684 (2010) - [j36]Aroon Nataraj, Allen D. Malony, Alan Morris, Dorian C. Arnold, Barton P. Miller:
A framework for scalable, parallel performance monitoring. Concurr. Comput. Pract. Exp. 22(6): 720-735 (2010) - [c84]James A. Kupsch, Barton P. Miller, Elisa Heymann
, Eduardo César
:
First principles vulnerability assessment. CCSW 2010: 87-92 - [c83]Dorian C. Arnold, Barton P. Miller:
Scalable failure recovery for high-performance data aggregation. IPDPS 2010: 1-11 - [c82]Emily R. Jacobson, Michael J. Brim
, Barton P. Miller:
A Lightweight Library for Building Scalable Tools. PARA (2) 2010: 419-429 - [c81]Nathan E. Rosenblum, Barton P. Miller, Xiaojin Zhu:
Extracting compiler provenance from program binaries. PASTE 2010: 21-28 - [c80]Kevin A. Roundy
, Barton P. Miller:
Hybrid Analysis and Control of Malware. RAID 2010: 317-338 - [e5]Jesús Labarta, Barton P. Miller, Bernd Mohr, Martin Schulz:
Program Development for Extreme-Scale Computing, 02.05. - 07.05.2010. Dagstuhl Seminar Proceedings 10181, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany 2010 [contents] - [i6]Jesús Labarta, Barton P. Miller, Bernd Mohr, Martin Schulz:
10181 Abstracts Collection - Program Development for Extreme-Scale Computing. Program Development for Extreme-Scale Computing 2010 - [i5]Jesús Labarta, Barton P. Miller, Bernd Mohr, Martin Schulz:
10181 Executive Summary - Program Development for Extreme-Scale Computing. Program Development for Extreme-Scale Computing 2010
2000 – 2009
- 2009
- [c79]Michael J. Brim
, Barton P. Miller:
Group file operations for scalable tools and middleware. HiPC 2009: 69-78 - [c78]Dong H. Ahn, Bronis R. de Supinski, Ignacio Laguna, Gregory L. Lee, Ben Liblit
, Barton P. Miller, Martin Schulz
:
Scalable temporal order analysis for large scale debugging. SC 2009 - 2008
- [c77]James A. Kupsch, Barton P. Miller:
How to Open a File and Not Get Hacked. ARES 2008: 1196-1203 - [c76]Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller, Karen Hunt:
Learning to Analyze Binary Computer Code. AAAI 2008: 798-804 - [c75]Aroon Nataraj, Allen D. Malony, Allen Morris, Dorian C. Arnold, Barton P. Miller:
In search of sweet-spots in parallel performance monitoring. CLUSTER 2008: 69-78 - [c74]Dong H. Ahn, Dorian C. Arnold, Bronis R. de Supinski, Gregory L. Lee, Barton P. Miller, Martin Schulz
:
Overcoming Scalability Challenges for Tool Daemon Launching. ICPP 2008: 578-585 - [c73]Alexander V. Mirgorodskiy, Barton P. Miller:
Diagnosing Distributed Systems with Self-propelled Instrumentation. Middleware 2008: 82-103 - [c72]Gregory L. Lee, Dong H. Ahn, Dorian C. Arnold, Bronis R. de Supinski, Matthew P. LeGendre, Barton P. Miller, Martin Schulz
, Ben Liblit
:
Lessons learned at 208K: towards debugging millions of cores. SC 2008: 26 - [c71]Nathan E. Rosenblum, Gregory Cooksey, Barton P. Miller:
Virtual machine-provided context sensitive page mappings. VEE 2008: 81-90 - 2007
- [j35]Andrew R. Bernat, Barton P. Miller:
Incremental call-path profiling. Concurr. Comput. Pract. Exp. 19(11): 1533-1547 (2007) - [j34]Barton P. Miller, Gregory Cooksey, Fredrick Moore:
An empirical study of the robustness of MacOS applications using random testing. ACM SIGOPS Oper. Syst. Rev. 41(1): 78-86 (2007) - [j33]Lisa A. Torrey, Joyce Coleman, Barton P. Miller:
A comparison of interactivity in the Linux 2.6 scheduler and an MLFQ scheduler. Softw. Pract. Exp. 37(4): 347-364 (2007) - [c70]Dorian C. Arnold, Dong H. Ahn, Bronis R. de Supinski, Gregory L. Lee, Barton P. Miller, Martin Schulz
:
Stack Trace Analysis for Large Scale Debugging. IPDPS 2007: 1-10 - [c69]Gregory L. Lee, Dong H. Ahn, Dorian C. Arnold, Bronis R. de Supinski, Barton P. Miller, Martin Schulz:
Benchmarking the Stack Trace Analysis Tool for BlueGene/L. PARCO 2007: 621-628 - [c68]Swetha Krishnan, Giridhar Ravipati, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, Barton P. Miller:
The effects of metadata corruption on nfs. StorageSS 2007: 37-41 - [e4]Adolfy Hoisie, Barton P. Miller, Bernd Mohr:
Code Instrumentation and Modeling for Parallel Performance Analysis, 19.08. - 24.08.2007. Dagstuhl Seminar Proceedings 07341, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2007 [contents] - [i4]Adolfy Hoisie, Barton P. Miller, Bernd Mohr:
07341 Executive Summary - Code Instrumentation and Modeling for Parallel Performance Analysis. Code Instrumentation and Modeling for Parallel Performance Analysis 2007 - [i3]Adolfy Hoisie, Barton P. Miller, Bernd Mohr:
07341 Abstracts Collection - Code Instrumentation and Modeling for Parallel Performance Analysis. Code Instrumentation and Modeling for Parallel Performance Analysis 2007 - 2006
- [j32]Sean McIlwain, Barton P. Miller:
A tool for converting Linux device drivers into Solaris compatible binaries. Softw. Pract. Exp. 36(7): 689-710 (2006) - [c67]Shai Rubin, Somesh Jha, Barton P. Miller:
Protomatching network traffic for high throughputnetwork intrusion detection. CCS 2006: 47-58 - [c66]Shai Rubin, Somesh Jha, Barton P. Miller:
On the Completeness of Attack Mutation Algorithms. CSFW 2006: 43-56 - [c65]Dorian C. Arnold, Gary D. Pack, Barton P. Miller:
Tree-based overlay networks for scalable applications. IPDPS 2006 - [c64]Barton P. Miller, Gregory Cooksey, Fredrick Moore:
An empirical study of the robustness of MacOS applications using random testing. Random Testing 2006: 46-54 - [c63]Philip C. Roth, Barton P. Miller:
On-line automated performance diagnosis on thousands of processes. PPoPP 2006: 69-80 - [c62]Jonathon T. Giffin, Somesh Jha, Barton P. Miller:
Automated Discovery of Mimicry Attacks. RAID 2006: 41-60 - [c61]Alexander V. Mirgorodskiy, Naoya Maruyama, Barton P. Miller:
Scalable systems software - Problem diagnosis in large-scale computing environments. SC 2006: 88 - [e3]Michael Gerndt, Allen D. Malony, Barton P. Miller, Wolfgang E. Nagel:
Automatic Performance Analysis, 12.-16. December 2005. Dagstuhl Seminar Proceedings 05501, Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany 2006 [contents] - 2005
- [j31]Laune C. Harris, Barton P. Miller:
Practical analysis of stripped binary code. SIGARCH Comput. Archit. News 33(5): 63-68 (2005) - [c60]Eli D. Collins, Barton P. Miller:
A Loop-Aware Search Strategy for Automated Performance Analysis. HPCC 2005: 573-584 - [c59]Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke Lee, Barton P. Miller:
Environment-Sensitive Intrusion Detection. RAID 2005: 185-206 - [c58]Shai Rubin, Somesh Jha, Barton P. Miller:
Language-Based Generation and Evaluation of NIDS Signatures. S&P 2005: 3-17 - [i2]Michael Gerndt, Allen D. Malony, Barton P. Miller, Wolfgang E. Nagel:
05501 Summary - Automatic Performance Analysis. Automatic Performance Analysis 2005 - [i1]Michael Gerndt, Allen D. Malony, Barton P. Miller, Wolfgang E. Nagel:
05501 Abstracts Collection - Automatic Performance Analysis. Automatic Performance Analysis 2005 - 2004
- [c57]Shai Rubin, Somesh Jha, Barton P. Miller:
Automatic Generation and Analysis of NIDS Attacks. ACSAC 2004: 28-38 - [c56]Philip C. Roth, Dorian C. Arnold, Barton P. Miller:
Benchmarking the MRNet Distributed Tool Infrastructure: Lessons Learned. IPDPS 2004 - [c55]Jonathon T. Giffin, Somesh Jha, Barton P. Miller:
Efficient Context-Sensitive Intrusion Detection. NDSS 2004 - [c54]Henry Hanping Feng, Jonathon T. Giffin, Yong Huang, Somesh Jha, Wenke Lee, Barton P. Miller:
Formalizing Sensitivity in Static Analysis for Intrusion Detection. S&P 2004: 194- - 2003
- [j30]Philip C. Roth, Barton P. Miller:
Deep Start: a hybrid strategy for automated performance problem searches. Concurr. Comput. Pract. Exp. 15(11-12): 1027-1046 (2003) - [c53]Alexander V. Mirgorodskiy, Barton P. Miller:
CrossWalk: A Tool for Performance Profiling Across the User-Kernel Boundary. PARCO 2003: 745-752 - [c52]Barton P. Miller, Ana Cortés
, Miquel A. Senar
, Miron Livny:
The Tool Dæmon Protocol (TDP). SC 2003: 19 - [c51]Philip C. Roth, Dorian C. Arnold, Barton P. Miller:
MRNet: A Software-Based Multicast/Reduction Network for Scalable Tools. SC 2003: 21 - [c50]Victor C. Zandy, Barton P. Miller:
Checkpoints of GUI-based Applications. USENIX ATC, General Track 2003: 155-165 - 2002
- [j29]Harold W. Cain, Barton P. Miller, Brian J. N. Wylie:
A callgraph-based search strategy for automated performance diagnosis. Concurr. Comput. Pract. Exp. 14(3): 203-217 (2002) - [c49]Philip C. Roth, Barton P. Miller:
Deep Start: A Hybrid Strategy for Automated Performance Problem Searches. Euro-Par 2002: 86-96 - [c48]Barton P. Miller, Jesús Labarta, Florian Schintke, Jens Simon:
Performance Evaluation, Analysis and Optimization. Euro-Par 2002: 131 - [c47]Victor C. Zandy, Barton P. Miller:
Reliable network connections. MobiCom 2002: 95-106 - [c46]Barton P. Miller:
A Security Attack and Defense in the Grid Environment. PVM/MPI 2002: 10 - [c45]Jonathon T. Giffin, Somesh Jha, Barton P. Miller:
Detecting Manipulated Remote Call Streams. USENIX Security Symposium 2002: 61-79 - 2001
- [j28]Barton P. Miller, Mihai Christodorescu, Robert Iverson, Tevfik Kosar, Alexander Mirgorodskii, Florentina I. Popovici:
Playing Inside the Black Box: Using Dynamic Instrumentation to Create Security Holes. Parallel Process. Lett. 11(2/3): 267-280 (2001) - [j27]Thomas Ludwig, Barton P. Miller:
Monitoring Systems and Tool Interoperability. Parallel Distributed Comput. Pract. 4(3) (2001) - [j26]Karen L. Karavanic, Barton P. Miller:
A Framework for Multi-Execution Performance Tuning. Parallel Distributed Comput. Pract. 4(3) (2001) - [c44]Zhichen Xu, Thomas W. Reps, Barton P. Miller:
Typestate Checking of Machine Code. ESOP 2001: 335-351 - 2000
- [j25]Tia Newhall, Barton P. Miller:
Performance measurement of dynamically compiled Java executions. Concurr. Pract. Exp. 12(6): 343-362 (2000) - [c43]Barton P. Miller, Michael Gerndt:
Support Tools and Environments. Euro-Par 2000: 45-46 - [c42]Harold W. Cain, Barton P. Miller, Brian J. N. Wylie:
A Callgraph-Based Search Strategy for Automated Performance Diagnosis (Distinguished Paper). Euro-Par 2000: 108-122 - [c41]Zhichen Xu, Barton P. Miller, Thomas W. Reps:
Safety checking of machine code. PLDI 2000: 70-82
1990 – 1999
- 1999
- [j24]Ariel Tamches, Barton P. Miller:
Using Dynamic Kernel Instrumentation for Kernel and Application Tuning. Int. J. High Perform. Comput. Appl. 13(3): 263-276 (1999) - [j23]Jeffrey K. Hollingsworth, Barton P. Miller:
Summary of the Sigmetrics symposium on parallel and distributed processing. SIGMETRICS Perform. Evaluation Rev. 26(4): 2-12 (1999) - [c40]Victor C. Zandy, Barton P. Miller, Miron Livny:
Process Hijacking. HPDC 1999: 177-184 - [c39]Tia Newhall, Barton P. Miller:
Performance Measurement of Dynamically Compiled Java Executions. Java Grande 1999: 42-50 - [c38]Ariel Tamches, Barton P. Miller:
Fine-Grained Dynamic Instrumentation of Commodity Operating System Kernels. OSDI 1999: 117-130 - [c37]Zhichen Xu, Barton P. Miller, Oscar Naim:
Dynamic Instrumentation of Threaded Applications. PPoPP 1999: 49-59 - [c36]Karen L. Karavanic, Barton P. Miller:
Improving Online Performance Diagnosis by the Use of Historical Performance Data. SC 1999: 42 - 1998
- [j22]Jeffrey K. Hollingsworth, Barton P. Miller:
Using Cost to Control Instrumentation Overhead. Theor. Comput. Sci. 196(1-2): 241-258 (1998) - [c35]Tia Newhall, Barton P. Miller:
Performance Measurement of Interpreted Programs. Euro-Par 1998: 146-156 - 1997
- [j21]Karen L. Karavanic, Jussi Myllymaki, Miron Livny, Barton P. Miller:
Integrated Visualization of Parallel Program Performance Data. Parallel Comput. 23(1-2): 181-198 (1997) - [c34]Jeffrey K. Hollingsworth, Barton P. Miller, M. J. R. Goncalves, Oscar Naim, Zhichen Xu, Ling Zheng:
MDL: A Language and Compiler for Dynamic Program Instrumentation. IEEE PACT 1997: 201- - [c33]Zhichen Xu, James R. Larus, Barton P. Miller:
Shared Memory Performance Profiling. PPoPP 1997: 240-251 - [c32]Karen L. Karavanic, Barton P. Miller:
Experiment Management Support for Performance Tuning. SC 1997: 8 - 1996
- [j20]Doug Burger, Rahmat S. Hyder, Barton P. Miller, David A. Wood:
Paging tradeoffs in distributed-shared-memory multiprocessors. J. Supercomput. 10(1): 87-104 (1996) - [c31]Jeffrey K. Hollingsworth, Barton P. Miller:
An Adaptive Cost System for Parallel Program Instrumentation. Euro-Par, Vol. I 1996: 88-97 - [c30]R. Bruce Irvin, Barton P. Miller:
Mechanisms for Mapping High-Level Parallel Performance Data. ICPP Workshop 1996: 10-19 - [c29]R. Bruce Irvin, Barton P. Miller:
Mapping Performance Data for High-Level and Data Views of Parallel Program Performance. International Conference on Supercomputing 1996: 69-77 - 1995
- [j19]Barton P. Miller, Mark D. Callaghan, Jonathan M. Cargille, Jeffrey K. Hollingsworth, R. Bruce Irvin, Karen L. Karavanic, Krishna Kunchithapadam, Tia Newhall:
The Paradyn Parallel Performance Measurement Tool. Computer 28(11): 37-46 (1995) - [j18]Robert H. B. Netzer, Barton P. Miller:
Optimal tracing and replay for debugging message-passing parallel programs. J. Supercomput. 8(4): 371-388 (1995) - [c28]Allen D. Malony, B. Robert Helm, Jeffrey K. Hollingsworth, Barton P. Miller, Karsten Schwan:
Data Interpretation and Experiment Planning in Performance Tools (Panel). SIGMETRICS 1995: 62-63 - 1994
- [j17]R. Bruce Irvin, Barton P. Miller:
Multiapplication support in a parallel-program performance tool. IEEE Parallel Distributed Technol. Syst. Appl. 2(1): 40-50 (1994) - [c27]Krishna Kunchithapadam, Barton P. Miller:
Optimizing Array Distributions in Data-Parallel Programs. LCPC 1994: 472-486 - [c26]Doug Burger, Rahmat S. Hyder, Barton P. Miller, David A. Wood:
Paging tradeoffs in distributed-shared-memory multiprocessors. SC 1994: 590-599 - 1993
- [j16]Barton P. Miller:
What to Draw? When to Draw? An Essay on Parallel Program Visualization. J. Parallel Distributed Comput. 18(2): 265-269 (1993) - [j15]Barton P. Miller, Charles E. McDowell:
Summary of ACM/ONR Workshop on Parallel and Distributed Debugging (1993). ACM SIGOPS Oper. Syst. Rev. 27(4): 8-23 (1993) - [c25]Joann J. Ordille
, Barton P. Miller:
Distributed Active Catalogs and Meta-Data Caching in Descriptive Name Services. ICDCS 1993: 120-129 - [c24]Jeffrey K. Hollingsworth, Barton P. Miller:
Dynamic Control of Performance Monitoring on Large Scale Parallel Systems. International Conference on Supercomputing 1993: 185-194 - [c23]Joann J. Ordille
, Barton P. Miller:
Database Challenges in Global Information Systems. SIGMOD Conference 1993: 403-407 - [e2]Barton P. Miller, Charles E. McDowell:
Proceedings of the ACM/ONR Workshop on Parallel and Distributed Debugging, San Diego, California, USA, May 17-18, 1993. ACM 1993, ISBN 0-89791-633-6 [contents] - 1992
- [j14]Robert H. B. Netzer, Barton P. Miller:
What Are Race Conditions? Some Issues and Formalizations. LOPLAS 1(1): 74-88 (1992) - [j13]Barton P. Miller, Charles E. McDowell:
Summary of ACM/ONR Workshop on Parallel and Distributed Debugging. ACM SIGOPS Oper. Syst. Rev. 26(1): 18-31 (1992) - [j12]Jonathan M. Cargille, Barton P. Miller:
Binary wrapping: a technique for instrumenting object code. ACM SIGPLAN Notices 27(6): 17-18 (1992) - [c22]Robert H. B. Netzer, Barton P. Miller:
Experience with Techniques for Refining Data Race Detection. LCPC 1992: 449-463 - [c21]Jeffrey K. Hollingsworth, Barton P. Miller:
Parallel Program Performance Metrics: A Comparison and Validation. SC 1992: 4-13 - [c20]Robert H. B. Netzer, Barton P. Miller:
Optimal Tracing and Replay for Debugging Message-Passing Parallel Programs. SC 1992: 502-511 - 1991
- [j11]Jong-Deok Choi, Barton P. Miller, Robert H. B. Netzer:
Techniques for Debugging Parallel Programs with Flowback Analysis. ACM Trans. Program. Lang. Syst. 13(4): 491-530 (1991) - [c19]Sarita V. Adve, Mark D. Hill, Barton P. Miller, Robert H. B. Netzer:
Detecting Data Races on Weak Memory Systems. ISCA 1991: 234-243 - [c18]Barton P. Miller, Charles E. McDowell:
Summary of ACM/ONR Workshop on Parallel and Distributed Debugging. Workshop on Parallel and Distributed Debugging 1991: 1-14 - [c17]Robert H. B. Netzer, Barton P. Miller:
Improving the Accuracy of Data Race Detection. PPoPP 1991: 133-144 - [c16]Jeffrey K. Hollingsworth, R. Bruce Irvin, Barton P. Miller:
The Integration of Application and System Based Metrics in a Parallel Program Performance Tool. PPoPP 1991: 189-200 - [c15]Joann J. Ordille
, Barton P. Miller:
Nomenclator Descriptive Query Optimization for Large X.500 Environments. SIGCOMM 1991: 185-196 - [e1]Barton P. Miller, Charles E. McDowell:
Proceedings of the ACM/ONR Workshop on Parallel and Distributed Debugging, Santa Cruz, California, USA, May 20-21, 1991. ACM 1991, ISBN 0-89791-457-0 [contents] - 1990
- [j10]Barton P. Miller, Lars Fredriksen, Bryan So:
An Empirical Study of the Reliability of UNIX Utilities. Commun. ACM 33(12): 32-44 (1990) - [j9]Barton P. Miller, Morgan Clark, Jeffrey K. Hollingsworth, Steven Kierstead, Sek-See Lim, Timothy Torzewski:
IPS-2: The Second Generation of a Parallel Program Measurement System. IEEE Trans. Parallel Distributed Syst. 1(2): 206-217 (1990) - [c14]Robert H. B. Netzer, Barton P. Miller:
On the Complexity of Event Ordering for Shared-Memory Parallel Program Executions. ICPP (2) 1990: 93-97
1980 – 1989
- 1989
- [j8]Cui-Qing Yang, Barton P. Miller:
Performance Measurement for Parallel and Distributed Programs: A Structured and Automatic Approach. IEEE Trans. Software Eng. 15(12): 1615-1629 (1989) - [c13]David L. Cohrs, Barton P. Miller:
Specification and Verification of Network Managers for Large Internets. SIGCOMM 1989: 33-44 - 1988
- [j7]Thomas J. LeBlanc, Barton P. Miller:
Summary of ACM Workshop on Parallel and Distributed Debugging. ACM SIGOPS Oper. Syst. Rev. 22(4): 7-19 (1988) - [j6]Barton P. Miller:
The frequency of dynamic pointer references in "C" programs. ACM SIGPLAN Notices 23(6): 152-156 (1988) - [j5]Mitali Bhattacharyya, David L. Cohrs, Barton P. Miller:
A Visual Process Connector for Unix. IEEE Softw. 5(4): 43-50 (1988) - [j4]Barton P. Miller:
DPM: A Measurement System for Distributed Programs. IEEE Trans. Computers 37(2): 243-248 (1988) - [c12]David L. Cohrs, Barton P. Miller, Lisa A. Call:
Distributed Upcalls: A Mechanism for Layering Asynchronous Abstractions. ICDCS 1988: 55-62 - [c11]Barton P. Miller, Jong-Deok Choi:
Breakpoints and Halting in Distributed Programs. ICDCS 1988: 316-323 - [c10]Cui-Qing Yang, Barton P. Miller:
Critical Path Analysis for the Execution of Parallel and Distributed Programs. ICDCS 1988: 366-373 - [c9]Barton P. Miller, Jong-Deok Choi:
A Mechanism for Efficient Debugging of Parallel Programs. Workshop on Parallel and Distributed Debugging 1988: 141-150 - [c8]Barton P. Miller, Jong-Deok Choi:
A Mechanism for Efficient Debugging of Parallel Programs. PLDI 1988: 135-144 - 1987
- [j3]Barton P. Miller, David L. Presotto, Michael L. Powell:
DEMOS/MP: The Development of a Distributed Operating System. Softw. Pract. Exp. 17(4): 277-290 (1987) - [c7]Lisa A. Call, David L. Cohrs, Barton P. Miller:
CLAM - An Open System for Graphical User Interfaces. C++ Workshop 1987: 305-326 - [c6]Barton P. Miller, Cui-Qing Yang:
IPS: An Interactive and Automatic Performance Measurement Tool for Parallel and Distributed Programs. ICDCS 1987: 482-489 - [c5]Lisa A. Call, David L. Cohrs, Barton P. Miller:
CLAM - an Open System for Graphical User Interfaces. OOPSLA 1987: 277-286 - [c4]Dennis Draheim, Barton P. Miller, Steven Snyder:
A Reliable and Secure UNIX Connection Service. SRDS 1987: 15-21 - 1986
- [j2]Barton P. Miller, Cathryn Macrander, Stuart Sechrest:
A Distributed Programs Monitor for Berkeley UNIX. Softw. Pract. Exp. 16(2): 183-200 (1986) - [c3]Nick Lai, Barton P. Miller:
The Traveling Salesman Problem: The Development of a Distributed Computation. ICPP 1986: 417-420 - 1985
- [c2]Barton P. Miller, Cathryn Macrander, Stuart Sechrest:
A Distributed Programs Monitor for Berkeley UNIX. ICDCS 1985: 43-54 - 1983
- [c1]Michael L. Powell, Barton P. Miller:
Process Migration in DEMOS/MP. SOSP 1983: 110-119 - 1981
- [j1]Barton P. Miller, David L. Presotto:
XOS: An Operating System for the X-Tree Architecture. ACM SIGOPS Oper. Syst. Rev. 15(2): 21-32 (1981)
Coauthor Index
aka: Elisa R. Heymann

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:17 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint