default search action
Lenore D. Zuck
Person information
- affiliation: University of Illinois at Chicago, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i3]Joel Miller, Rishi Advani, Ian A. Kash, Chris Kanich, Lenore D. Zuck:
Decentralized Fair Division. CoRR abs/2408.07821 (2024) - 2023
- [c79]Max von Hippel, Kenneth L. McMillan, Cristina Nita-Rotaru, Lenore D. Zuck:
A Formal Analysis of Karn's Algorithm. NETYS 2023: 43-61 - [c78]Max von Hippel, Panagiotis Manolios, Kenneth L. McMillan, Cristina Nita-Rotaru, Lenore D. Zuck:
A Case Study in Analytic Protocol Analysis in ACL2. ACL2 2023: 50-66 - 2022
- [c77]Ian A. Kash, Zhongkai Wen, Lenore D. Zuck:
Dynamic relocation in ridesharing via fixpoint construction. UAI 2022: 980-989 - 2020
- [i2]Ufuk Topcu, Nadya Bliss, Nancy J. Cooke, Missy L. Cummings, Ashley J. Llorens, Howard E. Shrobe, Lenore D. Zuck:
Assured Autonomy: Path Toward Living With Autonomous Systems We Can Trust. CoRR abs/2010.14443 (2020)
2010 – 2019
- 2019
- [c76]Lenore D. Zuck, Kenneth L. McMillan:
Invisible Invariants Are Neither. From Reactive Systems to Cyber-Physical Systems 2019: 57-72 - [c75]Kenneth L. McMillan, Lenore D. Zuck:
Compositional Testing of Internet Protocols. SecDev 2019: 161-174 - [c74]Kenneth L. McMillan, Lenore D. Zuck:
Formal specification and testing of QUIC. SIGCOMM 2019: 227-240 - 2018
- [c73]Yiji Zhang, Lenore D. Zuck:
Formal Verification of Optimizing Compilers. ICDCIT 2018: 50-65 - [c72]Lenore D. Zuck, Kenneth L. McMillan, Jordan Torf:
P^5 : Planner-less Proofs of Probabilistic Parameterized Protocols. VMCAI 2018: 336-357 - 2017
- [c71]Anna Bernasconi, Claudio Menghi, Paola Spoletini, Lenore D. Zuck, Carlo Ghezzi:
From Model Checking to a Temporal Proof for Partial Models. SEFM 2017: 54-69 - [i1]Anna Bernasconi, Claudio Menghi, Paola Spoletini, Lenore D. Zuck, Carlo Ghezzi:
From model checking to a temporal proof for partial models: preliminary example. CoRR abs/1706.02701 (2017) - 2016
- [c70]Rigel Gjomemo, Phu H. Phung, Edmund Ballou, Kedar S. Namjoshi, V. N. Venkatakrishnan, Lenore D. Zuck:
Leveraging Static Analysis Tools for Improving Usability of Memory Error Sanitization Compilers. QRS 2016: 323-334 - [c69]Sanjiva Prasad, Lenore D. Zuck:
Self-Similarity Breeds Resilience. EXPRESS/SOS 2016: 30-44 - 2015
- [j16]Yliès Falcone, Lenore D. Zuck:
Runtime verification: the application perspective. Int. J. Softw. Tools Technol. Transf. 17(2): 121-123 (2015) - [c68]Lenore D. Zuck, Sanjiva Prasad:
Limited Mobility, Eventual Stability. Haifa Verification Conference 2015: 139-154 - [c67]Lenore D. Zuck, Sanjiva Prasad:
A Switch, in Time. TGC 2015: 131-146 - [c66]Rigel Gjomemo, Kedar S. Namjoshi, Phu H. Phung, V. N. Venkatakrishnan, Lenore D. Zuck:
From Verification to Optimizations. VMCAI 2015: 300-317 - 2014
- [c65]Lenore D. Zuck, Kenneth L. McMillan:
Reasoning about Network Topologies in Space. FPS@ETAPS 2014: 267-277 - [c64]Sven Dietrich, Jeroen van der Ham, Aiko Pras, Roland van Rijswijk-Deij, Darren Shou, Anna Sperotto, Aimee van Wynsberghe, Lenore D. Zuck:
Ethics in Data Sharing: Developing a Model for Best Practice. IEEE Symposium on Security and Privacy Workshops 2014: 5-9 - [p1]Timothy L. Hinrichs, A. Prasad Sistla, Lenore D. Zuck:
Model Check What You Can, Runtime Verify the Rest. HOWARD-60 2014: 234-244 - 2013
- [c63]Nazari Skrupsky, Prithvi Bisht, Timothy L. Hinrichs, V. N. Venkatakrishnan, Lenore D. Zuck:
TamperProof: a server-agnostic defense for parameter tampering attacks on web applications. CODASPY 2013: 129-140 - [c62]Timothy L. Hinrichs, Diego Martinoia, William C. Garrison III, Adam J. Lee, Alessandro Panebianco, Lenore D. Zuck:
Application-Sensitive Access Control Evaluation Using Parameterized Expressiveness. CSF 2013: 145-160 - [c61]Timothy L. Hinrichs, Daniele Rossetti, Gabriele Petronella, V. N. Venkatakrishnan, A. Prasad Sistla, Lenore D. Zuck:
WEBLOG: a declarative language for secure web development. PLAS 2013: 59-70 - [c60]Kedar S. Namjoshi, Giacomo Tagliabue, Lenore D. Zuck:
A Witnessing Compiler: A Proof of Concept. RV 2013: 340-345 - [c59]Kedar S. Namjoshi, Lenore D. Zuck:
Witnessing Program Transformations. SAS 2013: 304-323 - 2012
- [j15]Ahmed Bouajjani, David Harel, Lenore D. Zuck:
Editorʼs foreword. J. Comput. Syst. Sci. 78(3): 822 (2012) - [j14]Ittai Balaban, Amir Pnueli, Yaniv Sa'ar, Lenore D. Zuck:
Verification of multi-linked heaps. J. Comput. Syst. Sci. 78(3): 853-876 (2012) - [c58]Nazari Skrupsky, Maliheh Monshizadeh, Prithvi Bisht, Timothy L. Hinrichs, V. N. Venkatakrishnan, Lenore D. Zuck:
WAVES: Automatic Synthesis of Client-Side Validation Code for Web Applications. CyberSecurity 2012: 46-53 - [c57]José M. Fernandez, Andrew S. Patrick, Lenore D. Zuck:
Ethical and Secure Data Sharing across Borders. Financial Cryptography Workshops 2012: 136-140 - [c56]Matthew L. Bolton, Celeste M. Wallace, Lenore D. Zuck:
On Policies and Intents. ICISS 2012: 104-118 - [c55]Yliès Falcone, Lenore D. Zuck:
Runtime Verification: The Application Perspective. ISoLA (1) 2012: 284-291 - [c54]Nazari Skrupsky, Maliheh Monshizadeh, Prithvi Bisht, Timothy L. Hinrichs, Venkat N. Venkatakrishnan, Lenore D. Zuck:
Don't Repeat Yourself: Automatically Synthesizing Client-side Validation Code for Web Applications. WebApps 2012: 107-108 - 2011
- [c53]Kenneth L. McMillan, Lenore D. Zuck:
Invisible Invariants and Abstract Interpretation. SAS 2011: 249-262 - 2010
- [c52]Ittai Balaban, Amir Pnueli, Lenore D. Zuck:
Proving the Refuted: Symbolic Model Checkers as Proof Generators. Concurrency, Compositionality, and Correctness 2010: 221-236 - [c51]Amir Pnueli, Yaniv Sa'ar, Lenore D. Zuck:
Jtlv: A Framework for Developing Verification Algorithms. CAV 2010: 171-174 - [c50]Ariel Cohen, Kedar S. Namjoshi, Yaniv Sa'ar, Lenore D. Zuck, Katya I. Kisyova:
Parallelizing a Symbolic Compositional Model-Checking Algorithm. Haifa Verification Conference 2010: 46-59
2000 – 2009
- 2009
- [c49]Kenneth L. McMillan, Lenore D. Zuck:
Abstract Counterexamples for Non-disjunctive Abstractions. RP 2009: 176-188 - 2008
- [c48]Ariel Cohen, Amir Pnueli, Lenore D. Zuck:
Mechanical Verification of Transactional Memories with Non-transactional Memory Accesses. CAV 2008: 121-134 - [c47]Ariel Cohen, Ron van der Meyden, Lenore D. Zuck:
Access Control and Information Flow in Transactional Memory. Formal Aspects in Security and Trust 2008: 316-330 - [c46]Venkatram Vishwanath, Lenore D. Zuck, Jason Leigh:
Specification and Verification of LambdaRAM: A Wide-area Distributed Cache for High Performance Computing. MEMOCODE 2008: 187-198 - [e3]Francesco Logozzo, Doron A. Peled, Lenore D. Zuck:
Verification, Model Checking, and Abstract Interpretation, 9th International Conference, VMCAI 2008, San Francisco, USA, January 7-9, 2008, Proceedings. Lecture Notes in Computer Science 4905, Springer 2008, ISBN 978-3-540-78162-2 [contents] - 2007
- [j13]Ittai Balaban, Amir Pnueli, Lenore D. Zuck:
Modular Ranking Abstraction. Int. J. Found. Comput. Sci. 18(1): 5-44 (2007) - [c45]Ariel Cohen, John W. O'Leary, Amir Pnueli, Mark R. Tuttle, Lenore D. Zuck:
Verifying Correctness of Transactional Memories. FMCAD 2007: 37-44 - [c44]Saddek Bensalem, Doron A. Peled, Hongyang Qu, Stavros Tripakis, Lenore D. Zuck:
Test Case Generation for Ultimately Periodic Paths. Haifa Verification Conference 2007: 120-135 - [c43]Ittai Balaban, Amir Pnueli, Lenore D. Zuck:
Shape Analysis of Single-Parent Heaps. VMCAI 2007: 91-105 - 2006
- [j12]Yi Fang, Nir Piterman, Amir Pnueli, Lenore D. Zuck:
Liveness with invisible ranking. Int. J. Softw. Tools Technol. Transf. 8(3): 261-279 (2006) - [c42]Yi Fang, Kenneth L. McMillan, Amir Pnueli, Lenore D. Zuck:
Liveness by Invisible Invariants. FORTE 2006: 356-371 - [c41]Ittai Balaban, Amir Pnueli, Lenore D. Zuck:
Invisible Safety of Distributed Protocols. ICALP (2) 2006: 528-539 - [c40]A. Prasad Sistla, Min Zhou, Lenore D. Zuck:
Monitoring Off-the-Shelf Components. VMCAI 2006: 222-236 - [c39]Yi Fang, Lenore D. Zuck:
Improved Invariant Generation for Tvoc. COCV@ETAPS 2006: 21-35 - 2005
- [j11]Lenore D. Zuck, Amir Pnueli, Benjamin Goldberg, Clark W. Barrett, Yi Fang, Ying Hu:
Translation and Run-Time Validation of Loop Transformations. Formal Methods Syst. Des. 27(3): 335-360 (2005) - [c38]Tamarah Arons, Elad Elster, Limor Fix, Sela Mador-Haim, Michael Mishaeli, Jonathan Shalev, Eli Singerman, Andreas Tiemeyer, Moshe Y. Vardi, Lenore D. Zuck:
Formal Verification of Backward Compatibility of Microcode. CAV 2005: 185-198 - [c37]Clark W. Barrett, Yi Fang, Benjamin Goldberg, Ying Hu, Amir Pnueli, Lenore D. Zuck:
TVOC: A Translation Validator for Optimizing Compilers. CAV 2005: 291-295 - [c36]Ittai Balaban, Yi Fang, Amir Pnueli, Lenore D. Zuck:
IIV: An Invisible Invariant Verifier. CAV 2005: 408-412 - [c35]Tiziana Margaria, A. Prasad Sistla, Bernhard Steffen, Lenore D. Zuck:
Taming Interface Specifications. CONCUR 2005: 548-561 - [c34]Cory Plock, Benjamin Goldberg, Lenore D. Zuck:
From Requirements to Specifications. ECBS 2005: 183-190 - [c33]Ittai Balaban, Amir Pnueli, Lenore D. Zuck:
Ranking Abstraction as Companion to Predicate Abstraction. FORTE 2005: 1-12 - [c32]Ittai Balaban, Amir Pnueli, Lenore D. Zuck:
Shape Analysis by Predicate Abstraction. VMCAI 2005: 164-180 - [c31]Amir Pnueli, Aleksandr Zaks, Lenore D. Zuck:
Monitoring Interfaces for Faults. RV@CAV 2005: 73-89 - [e2]Nicolas Halbwachs, Lenore D. Zuck:
Tools and Algorithms for the Construction and Analysis of Systems, 11th International Conference, TACAS 2005, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2005, Edinburgh, UK, April 4-8, 2005, Proceedings. Lecture Notes in Computer Science 3440, Springer 2005, ISBN 3-540-25333-5 [contents] - 2004
- [j10]Lenore D. Zuck:
Special issue of VMCAI'03. Comput. Lang. Syst. Struct. 30(3-4): 97-98 (2004) - [j9]Lenore D. Zuck, Amir Pnueli:
Model checking and abstraction to the aid of parameterized systems (a survey). Comput. Lang. Syst. Struct. 30(3-4): 139-169 (2004) - [j8]Joshua D. Guttman, F. Javier Thayer, Lenore D. Zuck:
The faithfulness of abstract protocol analysis: Message authentication. J. Comput. Secur. 12(6): 865-891 (2004) - [j7]Lenore D. Zuck, Paul C. Attie, Agostino Cortesi:
Preface by the section editors. Int. J. Softw. Tools Technol. Transf. 6(1): 1-3 (2004) - [c30]Yi Fang, Nir Piterman, Amir Pnueli, Lenore D. Zuck:
Liveness with Incomprehensible Ranking. TACAS 2004: 482-496 - [c29]Yi Fang, Nir Piterman, Amir Pnueli, Lenore D. Zuck:
Liveness with Invisible Ranking. VMCAI 2004: 223-238 - [c28]Benjamin Goldberg, Lenore D. Zuck, Clark W. Barrett:
Into the Loops: Practical Issues in Translation Validation for Optimizing Compilers. COCV@ETAPS 2004: 53-71 - 2003
- [j6]Lenore D. Zuck, Amir Pnueli, Benjamin Goldberg:
VOC: A Methodology for the Translation Validation of OptimizingCompilers. J. Univers. Comput. Sci. 9(3): 223-247 (2003) - [c27]Tamarah Arons, Amir Pnueli, Lenore D. Zuck:
Parameterized Verification by Probabilistic Abstraction. FoSSaCS 2003: 87-102 - [c26]Amir Pnueli, Lenore D. Zuck:
Model-Checking and Abstraction to the Aid of Parameterized Systems. VMCAI 2003: 4 - [c25]Clark W. Barrett, Benjamin Goldberg, Lenore D. Zuck:
Run-Time Validation of Speculative Optimizations using CVC. RV@CAV 2003: 89-107 - [e1]Lenore D. Zuck, Paul C. Attie, Agostino Cortesi, Supratik Mukhopadhyay:
Verification, Model Checking, and Abstract Interpretation, 4th International Conference, VMCAI 2003, New York, NY, USA, January 9-11, 2002, Proceedings. Lecture Notes in Computer Science 2575, Springer 2003, ISBN 3-540-00348-7 [contents] - 2002
- [c24]Amir Pnueli, Jessie Xu, Lenore D. Zuck:
Liveness with (0, 1, infty)-Counter Abstraction. CAV 2002: 107-122 - [c23]Yonit Kesten, Amir Pnueli, Elad Shahar, Lenore D. Zuck:
Network Invariants in Action. CONCUR 2002: 101-115 - [c22]Lenore D. Zuck, Amir Pnueli, Yonit Kesten:
Automatic Verification of Probabilistic Free Choice. VMCAI 2002: 208-224 - [c21]Lenore D. Zuck, Amir Pnueli, Yi Fang, Benjamin Goldberg:
VOC: A Translation Validator for Optimizing Compilers. COCV@ETAPS 2002: 2-18 - [c20]Lenore D. Zuck, Amir Pnueli, Yi Fang, Benjamin Goldberg, Ying Hu:
Translation and Run-Time Validation of Optimized Code. RV@FLoC 2002: 179-200 - 2001
- [c19]Tamarah Arons, Amir Pnueli, Sitvanit Ruah, Jiazhao Xu, Lenore D. Zuck:
Parameterized Verification with Automatically Computed Inductive Assertions. CAV 2001: 221-234 - [c18]Joshua D. Guttman, F. Javier Thayer, Lenore D. Zuck:
The faithfulness of abstract protocol analysis: message authentication. CCS 2001: 186-195 - [c17]Doron A. Peled, Amir Pnueli, Lenore D. Zuck:
From Falsification to Verification. FSTTCS 2001: 292-304 - [c16]Doron A. Peled, Lenore D. Zuck:
From Model Checking to a Temporal Proof. SPIN 2001: 1-14 - [c15]Amir Pnueli, Sitvanit Ruah, Lenore D. Zuck:
Automatic Deductive Verification with Invisible Invariants. TACAS 2001: 82-97
1990 – 1999
- 1997
- [c14]David Gelernter, Lenore D. Zuck:
On What Linda Is: Formal Description of Linda as a Reactive System. COORDINATION 1997: 187-204 - 1994
- [j5]Yehuda Afek, Hagit Attiya, Alan D. Fekete, Michael J. Fischer, Nancy A. Lynch, Yishay Mansour, Da-Wei Wang, Lenore D. Zuck:
Reliable Communication Over Unreliable Channels. J. ACM 41(6): 1267-1297 (1994) - [c13]Nicholas Carriero, David Gelernter, Lenore D. Zuck:
Bauhaus Linda. ECOOP Workshop 1994: 66-76 - [c12]Jeffery R. Westbrook, Lenore D. Zuck:
Adaptive Algorithms for PASO Systems. PODC 1994: 264-273 - 1993
- [j4]A. Prasad Sistla, Lenore D. Zuck:
Reasoning in a Restricted Temporal Logic. Inf. Comput. 102(2): 167-195 (1993) - [j3]Amir Pnueli, Lenore D. Zuck:
Probabilistic Verification. Inf. Comput. 103(1): 1-29 (1993) - [c11]Amir Pnueli, Lenore D. Zuck:
In and Out of Temporal Logic. LICS 1993: 124-135 - 1992
- [j2]Joseph Y. Halpern, Lenore D. Zuck:
A Little Knowledge Goes a Long Way: Knowledge-Based Derivations and Correctness Proofs for a Family of Protocols. J. ACM 39(3): 449-478 (1992) - [c10]Nick Reingold, Da-Wei Wang, Lenore D. Zuck:
Games I/O Automata Play (Extended Abstract). CONCUR 1992: 325-339 - [c9]Henri B. Weinberg, Lenore D. Zuck:
Timed Ethernet: Real-Time Formal Specification of Ethernet. CONCUR 1992: 370-385 - 1991
- [c8]A. Prasad Sistla, Lenore D. Zuck:
Automatic Temporal Verification of Buffer Systems. CAV 1991: 59-69 - [c7]Da-Wei Wang, Lenore D. Zuck:
Real-Time Sequence Transmission Problem. PODC 1991: 111-123
1980 – 1989
- 1989
- [c6]Da-Wei Wang, Lenore D. Zuck:
Tight Bounds for the Sequence Transmission Problem. PODC 1989: 73-83 - 1988
- [c5]Michael J. Fischer, Lenore D. Zuck:
Reasoning about Uncertainty in Fault-tolerant Distributed Systems. FTRTFT 1988: 142-158 - 1987
- [c4]A. Prasad Sistla, Lenore D. Zuck:
On the Eventuality Operator in Temporal Logic. LICS 1987: 153-166 - 1986
- [j1]Amir Pnueli, Lenore D. Zuck:
Verification of Multiprocess Probabilistic Protocols. Distributed Comput. 1(1): 53-72 (1986) - [c3]Amir Pnueli, Lenore D. Zuck:
Probabilistic Verification by Tableaux. LICS 1986: 322-331 - 1985
- [c2]Orna Lichtenstein, Amir Pnueli, Lenore D. Zuck:
The Glory of the Past. Logic of Programs 1985: 196-218 - 1984
- [c1]Amir Pnueli, Lenore D. Zuck:
Verification of Multiprocess Probabilistic Protocols. PODC 1984: 12-27
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint