Scott D. Stoller

Orcid: 0000-0002-8824-6835

According to our database1, Scott D. Stoller authored at least 152 papers between 1994 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Integrating Logic Rules with Everything Else, Seamlessly.
Theory Pract. Log. Program., July, 2023

A distributed simplex architecture for multi-agent systems.
J. Syst. Archit., 2023

Benchmarking for Integrating Logic Rules with Everything Else.
Proceedings of the Proceedings 39th International Conference on Logic Programming, 2023

WebSheets: A New Privacy-Centric Framework for Web Applications.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023

Multi-Agent Spatial Predictive Control with Application to Drone Flocking.
Proceedings of the IEEE International Conference on Robotics and Automation, 2023

Debugging Malware Classification Models Based on Event Logs with Explainable AI.
Proceedings of the IEEE International Conference on Data Mining, 2023

2022
Recursive rules with aggregation: a simple unified semantics.
J. Log. Comput., 2022

Programming with rules and everything else, seamlessly.
CoRR, 2022

Multi-Agent Spatial Predictive Control with Application to Drone Flocking (Extended Version).
CoRR, 2022

Runtime-Assured, Real-Time Neural Control of Microgrids.
CoRR, 2022

A Barrier Certificate-Based Simplex Architecture with Application to Microgrids.
Proceedings of the Runtime Verification - 22nd International Conference, 2022

The Black-Box Simplex Architecture for Runtime Assurance of Autonomous CPS.
Proceedings of the NASA Formal Methods - 14th International Symposium, 2022

Towards Drone Flocking Using Relative Distance Measurements.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Adaptation and Learning, 2022

2021
Neural predictive monitoring and a comparison of frequentist and Bayesian approaches.
Int. J. Softw. Tools Technol. Transf., 2021

Knowledge of uncertain worlds: programming with logical constraints.
J. Log. Comput., 2021

Safe CPS from unsafe controllers.
Proceedings of the CAADCPS '21: Proceedings of the Workshop on Computation-Aware Algorithmic Design for Cyber-Physical Systems, 2021

Collision-Free 3D Flocking Using the Distributed Simplex Architecture.
Proceedings of the Formal Methods in Outer Space, 2021

Distributed Control for Flocking Maneuvers via Acceleration-Weighted Neighborhooding.
Proceedings of the 2021 American Control Conference, 2021

2020
Founded semantics and constraint semantics of logic rules.
J. Log. Comput., 2020

A Decision Tree Learning Approach for Mining Relationship-Based Access Control Policies.
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020

Assurance of Distributed Algorithms and Systems: Runtime Checking of Safety and Liveness.
Proceedings of the Runtime Verification - 20th International Conference, 2020

Bayesian Neural Predictive Monitoring.
Proceedings of the 2nd Workshop on Artificial Intelligence and Formal Verification, 2020

Neural Simplex Architecture.
Proceedings of the NASA Formal Methods - 12th International Symposium, 2020

Learning Attribute-Based and Relationship-Based Access Control Policies with Unknown Values.
Proceedings of the Information Systems Security - 16th International Conference, 2020

Neural Flocking: MPC-Based Supervised Learning of Flocking Controllers.
Proceedings of the Foundations of Software Science and Computation Structures, 2020

Learning Distributed Controllers for V-Formation.
Proceedings of the IEEE International Conference on Autonomic Computing and Self-Organizing Systems, 2020

2019
Greedy and evolutionary algorithms for mining relationship-based access control policies.
Comput. Secur., 2019

Efficient and Extensible Policy Mining for Relationship-Based Access Control.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

Neural Predictive Monitoring.
Proceedings of the Runtime Verification - 19th International Conference, 2019

Moderately Complex Paxos Made Simple: High-Level Executable Specification of Distributed Algorithms.
Proceedings of the 21st International Symposium on Principles and Practice of Programming Languages, 2019

From Classical to Blockchain Consensus: What Are the Exact Algorithms?
Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing, 2019

Algorithm Diversity for Resilient Systems.
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019

High-Level Cryptographic Abstractions.
Proceedings of the 14th ACM SIGSAC Workshop on Programming Languages and Analysis for Security, 2019

Conformal Predictions for Hybrid System State Classification.
Proceedings of the From Reactive Systems to Cyber-Physical Systems, 2019

2018
Mining hierarchical temporal roles with multiple metrics.
J. Comput. Secur., 2018

Dependence-Preserving Data Compaction for Scalable Forensic Analysis.
Proceedings of the 27th USENIX Security Symposium, 2018

Declarative vs rule-based control for flocking dynamics.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Mining Relationship-Based Access Control Policies from Incomplete and Noisy Data.
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018

Neural State Classification for Hybrid Systems.
Proceedings of the Automated Technology for Verification and Analysis, 2018

2017
From Clarity to Efficiency for Distributed Algorithms.
ACM Trans. Program. Lang. Syst., 2017

Collision avoidance for mobile robots with limited sensing and limited information about moving obstacles.
Formal Methods Syst. Des., 2017

How to Learn a Model Checker.
CoRR, 2017

Model Checking Cyber-Physical Systems using Particle Swarm Optimization.
CoRR, 2017

Moderately Complex Paxos Made Simple: High-Level Specification of Distributed Algorithm.
CoRR, 2017

SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data.
Proceedings of the 26th USENIX Security Symposium, 2017

A Simplex Architecture for Hybrid Systems Using Barrier Certificates.
Proceedings of the Computer Safety, Reliability, and Security, 2017

Mining Relationship-Based Access Control Policies.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

Fast Distributed Evaluation of Stateful Attribute-Based Access Control Policies.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

A Component-Based Simplex Architecture for High-Assurance Cyber-Physical Systems.
Proceedings of the 17th International Conference on Application of Concurrency to System Design, 2017

2016
Attack Analysis Results for Adversarial Engagement 1 of the DARPA Transparent Computing Program.
CoRR, 2016

Demand-driven incremental object queries.
Proceedings of the 18th International Symposium on Principles and Practice of Declarative Programming, 2016

Formal Verification of Multi-Paxos for Distributed Consensus.
Proceedings of the FM 2016: Formal Methods, 2016

2015
Mining Attribute-Based Access Control Policies.
IEEE Trans. Dependable Secur. Comput., 2015

Policy analysis for administrative role based access control without separate administration.
J. Comput. Secur., 2015

A survey on unmanned aerial vehicle collision avoidance systems.
CoRR, 2015

Collision Avoidance for Mobile Robots with Limited Sensing and Limited Information About the Environment.
Proceedings of the Runtime Verification - 6th International Conference, 2015

An Administrative Model for Relationship-Based Access Control.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

2014
Abductive Analysis of Administrative Policies in Rule-Based Access Control.
IEEE Trans. Dependable Secur. Comput., 2014

Using Statistical Model Checking for Measuring Systems.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Specialized Techniques and Applications, 2014

Compositional Branching-Time Measurements.
Proceedings of the From Programs to Systems. The Systems perspective in Computing, 2014

Stochastic Game-Based Analysis of the DNS Bandwidth Amplification Attack Using Probabilistic Model Checking.
Proceedings of the 2014 Tenth European Dependable Computing Conference, 2014

Mining Attribute-Based Access Control Policies from Logs.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

2013
Runtime Verification with Particle Filtering.
Proceedings of the Runtime Verification - 4th International Conference, 2013

Mining parameterized role-based policies.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

2012
Software monitoring with controllable overhead.
Int. J. Softw. Tools Technol. Transf., 2012

InterAspect: aspect-oriented instrumentation with GCC.
Formal Methods Syst. Des., 2012

High-Level Executable Specifications of Distributed Algorithms.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2012

Algorithms for mining meaningful roles.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Adaptive Runtime Verification.
Proceedings of the Runtime Verification, Third International Conference, 2012

Composing transformations for instrumentation and optimization.
Proceedings of the ACM SIGPLAN 2012 Workshop on Partial Evaluation and Program Manipulation, 2012

From clarity to efficiency for distributed algorithms.
Proceedings of the 27th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2012

2011
Trust Management in Databases.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Policy analysis for Administrative Role-Based Access Control.
Theor. Comput. Sci., 2011

Symbolic reachability analysis for parameterized administrative role-based access control.
Comput. Secur., 2011

On the energy consumption and performance of systems software.
Proceedings of of SYSTOR 2011: The 4th Annual Haifa Experimental Systems Conference, Haifa, Israel, May 30, 2011

Runtime Verification with State Estimation.
Proceedings of the Runtime Verification - Second International Conference, 2011

Abductive Analysis of Administrative Policies in Rule-Based Access Control.
Proceedings of the Information Systems Security - 7th International Conference, 2011

Redflag: A Framework for Analysis of Kernel-Level Concurrency.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011

Model discovery for energy-aware computing systems: An experimental evaluation.
Proceedings of the 2011 International Green Computing Conference and Workshops, 2011

2010
Detection of deadlock potentials in multithreaded programs.
IBM J. Res. Dev., 2010

Aspect-Oriented Instrumentation with GCC.
Proceedings of the Runtime Verification - First International Conference, 2010

Alias analysis for optimization of dynamic languages.
Proceedings of the 6th Symposium on Dynamic Languages, 2010

Trust management for Web Services.
Proceedings of the 6th International Conference on Network and Service Management, 2010

2009
From datalog rules to efficient programs with time and space guarantees.
ACM Trans. Program. Lang. Syst., 2009

RBAC-PAT: A Policy Analysis Tool for Role Based Access Control.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2009

Verification of Security Policy Enforcement in Enterprise Systems.
Proceedings of the Emerging Challenges for Security, 2009

Parametric heap usage analysis for functional programs.
Proceedings of the 8th International Symposium on Memory Management, 2009

A language and framework for invariant-driven transformations.
Proceedings of the Generative Programming and Component Engineering, 2009

HAVE: Detecting Atomicity Violations via Integrated Dynamic and Static Analysis.
Proceedings of the Fundamental Approaches to Software Engineering, 2009

2008
Trust Management and Trust Negotiation in an Extension of SQL.
Proceedings of the Trustworthy Global Computing, 4th International Symposium, 2008

Analysis and Transformations for Efficient Query-Based Debugging.
Proceedings of the Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 2008

6th workshop on parallel and distributed systems: testing and debugging (PADTAD '08).
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, 2008

Efficient runtime invariant checking: a framework and case study.
Proceedings of the 2008 International Workshop on Dynamic Analysis: held in conjunction with the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2008), 2008

Software monitoring with bounded overhead.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

2007
Towards a framework and a benchmark for testing tools for multi-threaded programs.
Concurr. Comput. Pract. Exp., 2007

Efficient policy analysis for administrative role based access control.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

Security policy analysis using deductive spreadsheets.
Proceedings of the 2007 ACM workshop on Formal methods in security engineering, 2007

2006
Runtime Analysis of Atomicity for Multithreaded Programs.
IEEE Trans. Software Eng., 2006

Optimistic synchronization-based state-space reduction.
Formal Methods Syst. Des., 2006

Accurate and efficient runtime detection of atomicity errors in concurrent programs.
Proceedings of the ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2006

Efficient type inference for secure information flow.
Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, 2006

Querying Complex Graphs.
Proceedings of the Practical Aspects of Declarative Languages, 8th International Symposium, 2006

Run-time detection of potential deadlocks for programs with locks, semaphores, and condition variables.
Proceedings of the 4th Workshop on Parallel and Distributed Systems: Testing, 2006

2005
Optimizing aggregate array computations in loops.
ACM Trans. Program. Lang. Syst., 2005

Foreword.
Formal Methods Syst. Des., 2005

Automated Analysis of Fault-Tolerance in Distributed Systems.
Formal Methods Syst. Des., 2005

Preface.
Proceedings of the 3rd Workshop on Software Model Checking, 2005

Static analysis of atomicity for programs with non-blocking synchronization.
Proceedings of the ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2005

Automated type-based analysis of data races and atomicity.
Proceedings of the ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2005

Incrementalization across object abstraction.
Proceedings of the 20th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2005

Implementing incrementalization across object abstraction.
Proceedings of the Companion to the 20th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2005

Optimized run-time race detection and atomicity checking using partial discovered types.
Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering (ASE 2005), 2005

Detecting Potential Deadlocks with Static Analysis and Run-Time Monitoring.
Proceedings of the Hardware and Software Verification and Testing, 2005

2004
Type Inference for Parameterized Race-Free Java.
Proceedings of the Verification, 2004

Parametric regular path queries.
Proceedings of the ACM SIGPLAN 2004 Conference on Programming Language Design and Implementation 2004, 2004

2003
Eliminating dead code on recursive data.
Sci. Comput. Program., 2003

Dynamic Programming via Static Incrementalization.
High. Order Symb. Comput., 2003

Run-Time Analysis for Atomicity.
Proceedings of the Third Workshop on Run-time Verification, 2003

SoftMC 2003: Workshop on Software Model Checking.
Proceedings of the 2003 Workshop on Software Model Checking, 2003

Optimized Live Heap Bound Analysis.
Proceedings of the Verification, 2003

Optimizing Ackermann's function by incrementalization.
Proceedings of the 2003 ACM SIGPLAN Workshop on Partial Evaluation and Semantics-based Program Manipulation, 2003

Benchmark and Framework for Encouraging Research on Multi-Threaded Testing Tools .
Proceedings of the 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), 2003

2002
Model-checking multi-threaded distributed Java programs.
Int. J. Softw. Tools Technol. Transf., 2002

Testing Concurrent Java Programs using Randomized Scheduling.
Proceedings of the Runtime Verification 2002, 2002

Program optimization using indexed and recursive data structures.
Proceedings of the 2002 ACM SIGPLAN Workshop on Partial Evaluation and Semantics-Based Program Manipulation (PEPM '02), 2002

Domain partitioning for open reactive systems.
Proceedings of the International Symposium on Software Testing and Analysis, 2002

A Bound on Attacks on Authentication Protocols.
Proceedings of the Foundations of Information Technology in the Era of Networking and Mobile Computing, 2002

2001
Strengthening invariants for efficient computation.
Sci. Comput. Program., 2001

Preface.
Proceedings of the Workshop on Software Model Checking 2001, 2001

Transformations for Model Checking Distributed Java Programs.
Proceedings of the Model Checking Software, 2001

Solving Regular Tree Grammar Based Constraints.
Proceedings of the Static Analysis, 8th International Symposium, 2001

A Bound on Attacks on Payment Protocols.
Proceedings of the 16th Annual IEEE Symposium on Logic in Computer Science, 2001

Automatic Accurate Live Memory Analysis for Garbage-Collected Languages.
Proceedings of The Workshop on Languages, 2001

Automated Software Engineering Using Concurrent Class Machines.
Proceedings of the 16th IEEE International Conference on Automated Software Engineering (ASE 2001), 2001

2000
Leader Election in Asynchronous Distributed Systems.
IEEE Trans. Computers, 2000

Detecting Global Predicates in Distributed Systems with Clocks.
Distributed Comput., 2000

From Recursion to Iteration: What are the Optimizations?
Proceedings of the 2000 ACM SIGPLAN Workshop on Partial Evaluation and Semantics-Based Program Manipulation (PEPM '00), 2000

Efficient Detection of Global Properties in Distributed Systems Using Partial-Order Methods.
Proceedings of the Computer Aided Verification, 12th International Conference, 2000

1999
ETAPS '99 - Conference Report.
ACM SIGPLAN Notices, 1999

Lower and Upper Bounds for Attacks on Authentication Protocols.
Proceedings of the Eighteenth Annual ACM Symposium on Principles of Distributed Computing, 1999

1998
Static Caching for Incremental Computation.
ACM Trans. Program. Lang. Syst., 1998

Loop Optimization for Aggregate Array Computations.
Proceedings of the 1998 International Conference on Computer Languages, 1998

Automated Stream-Based Analysis of Fault-Tolerance.
Proceedings of the Formal Techniques in Real-Time and Fault-Tolerant Systems, 1998

Efficient Symbolic Detection of Global Properties in Distributed Systems.
Proceedings of the Computer Aided Verification, 10th International Conference, 1998

1997
A Method and Tool for Analyzing Faulty-Tolerance in Systems.
PhD thesis, 1997

1996
Cryptographic support for fault-tolerant distributed computing.
Proceedings of the 7th ACM SIGOPS European Workshop: Systems Support for Worldwide Applications, 1996

Discovering Auxiliary Information for Incremental Computation.
Proceedings of the Conference Record of POPL'96: The 23rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1996

1995
Verifying Programs That Use Causally-Ordered Message-Passing.
Sci. Comput. Program., 1995

Faster Possibility Detection by Combining Two Approaches.
Proceedings of the Distributed Algorithms, 9th International Workshop, 1995

Storage Replication and Layout in Video-on-Demand Servers.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 1995

1994
Addendum to "Proof Rules for Flush Channels".
IEEE Trans. Software Eng., 1994

An Operational Approach to Combining Classical Set Theory and Functional Programming Languages.
Proceedings of the Theoretical Aspects of Computer Software, 1994


  Loading...