Kristopher K. Micinski

Orcid: 0000-0002-8650-0991

Affiliations:
  • Syracuse University, NY, USA
  • University of Maryland, College Park, USA


According to our database1, Kristopher K. Micinski authored at least 23 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Bring Your Own Data Structures to Datalog.
Proc. ACM Program. Lang., October, 2023

GDlog: A GPU-Accelerated Deductive Engine.
CoRR, 2023

Towards Iterative Relational Algebra on the GPU.
Proceedings of the 2023 USENIX Annual Technical Conference, 2023

Communication-Avoiding Recursive Aggregation.
Proceedings of the IEEE International Conference on Cluster Computing, 2023

2022
Higher-Order, Data-Parallel Structured Deduction.
CoRR, 2022

Optimizing the Bruck Algorithm for Non-uniform All-to-all Communication.
Proceedings of the HPDC '22: The 31st International Symposium on High-Performance Parallel and Distributed Computing, Minneapolis, MN, USA, 27 June 2022, 2022

Seamless deductive inference via macros.
Proceedings of the CC '22: 31st ACM SIGPLAN International Conference on Compiler Construction, Seoul, South Korea, April 2, 2022

2021
So You Want to Analyze Scheme Programs With Datalog?
CoRR, 2021

Declarative Demand-Driven Reverse Engineering.
CoRR, 2021

Exploring MPI Collective I/O and File-per-process I/O for Checkpointing a Logical Inference Task.
Proceedings of the IEEE International Parallel and Distributed Processing Symposium Workshops, 2021

Compiling data-parallel Datalog.
Proceedings of the CC '21: 30th ACM SIGPLAN International Conference on Compiler Construction, 2021

2020
An Observational Investigation of Reverse Engineers' Processes.
Proceedings of the 29th USENIX Security Symposium, 2020

Abstracting Faceted Execution.
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020

2019
An Observational Investigation of Reverse Engineers' Process and Mental Models.
Proceedings of the Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
Racets: Faceted Execution in Racket.
CoRR, 2018

User Comfort with Android Background Resource Accesses in Different Contexts.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

2017
Interaction-based Security for Mobile Apps.
PhD thesis, 2017

User Interactions and Permission Use on Android.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2015
Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
Temporal Logics for Hyperproperties.
Proceedings of the Principles of Security and Trust - Third International Conference, 2014

2013
Distributed Cooperative Caching in Social Wireless Networks.
IEEE Trans. Mob. Comput., 2013

A Temporal Logic of Security.
CoRR, 2013

2012
Dr. Android and Mr. Hide: fine-grained permissions in android applications.
Proceedings of the SPSM'12, 2012


  Loading...