Spreadsheet data manipulation using examples S Gulwani, WR Harris, R Singh Communications of the ACM 55 (8), 97-105, 2012 | 353 | 2012 |
Spreadsheet table transformations from examples WR Harris, S Gulwani ACM SIGPLAN Notices 46 (6), 317-328, 2011 | 208 | 2011 |
Security challenges in automotive hardware/software architecture design F Sagstetter, M Lukasiewycz, S Steinhorst, M Wolf, A Bouard, WR Harris, ... 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE), 458-463, 2013 | 159 | 2013 |
Enforcing kernel security invariants with data flow integrity. C Song, B Lee, K Lu, W Harris, T Kim, W Lee NDSS, 2016 | 150 | 2016 |
Enforcing unique code target property for control-flow integrity H Hu, C Qian, C Yagemann, SPH Chung, WR Harris, T Kim, W Lee Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 115 | 2018 |
Efficient Protection of Path-Sensitive Control Security. R Ding, C Qian, C Song, W Harris, T Kim, W Lee USENIX Security Symposium, 131-148, 2017 | 109 | 2017 |
Flexjava: Language support for safe and modular approximate programming J Park, H Esmaeilzadeh, X Zhang, M Naik, W Harris Proceedings of the 2015 10th Joint Meeting on Foundations of Software …, 2015 | 75 | 2015 |
Alternation for termination WR Harris, A Lal, AV Nori, SK Rajamani Static Analysis: 17th International Symposium, SAS 2010, Perpignan, France …, 2010 | 70 | 2010 |
Program analysis via satisfiability modulo path programs WR Harris, S Sankaranarayanan, F Ivančić, A Gupta Proceedings of the 37th annual ACM SIGPLAN-SIGACT symposium on Principles of …, 2010 | 66 | 2010 |
Automated table transformations from examples S Gulwani, WR Harris US Patent 8,484,550, 2013 | 54 | 2013 |
DIFC programs by automatic instrumentation WR Harris, S Jha, T Reps Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 39 | 2010 |
Automated verification of query equivalence using satisfiability modulo theories Q Zhou, J Arulraj, S Navathe, W Harris, D Xu Proceedings of the VLDB Endowment 12 (11), 1276-1288, 2019 | 33 | 2019 |
Complexity verification using guided theorem enumeration A Srikanth, B Sahin, WR Harris ACM SIGPLAN Notices 52 (1), 639-652, 2017 | 30 | 2017 |
Program verification through symbolic enumeration of control path programs S Sankaranarayanan, F Ivancic, WR Harris, A Gupta, G Balakrishnan US Patent 8,402,440, 2013 | 28 | 2013 |
Secure programming via visibly pushdown safety games WR Harris, S Jha, T Reps Computer Aided Verification: 24th International Conference, CAV 2012 …, 2012 | 20 | 2012 |
Verifying information flow control over unbounded processes WR Harris, NA Kidd, S Chaki, S Jha, T Reps FM 2009: Formal Methods: Second World Congress, Eindhoven, The Netherlands …, 2009 | 20 | 2009 |
Determination of organic carbon and carbonates in soils JU Anderson, W Harris Soil Science Society of America Journal 31 (3), 341-343, 1967 | 17 | 1967 |
Declarative, temporal, and practical programming with capabilities WR Harris, S Jha, T Reps, J Anderson, RNM Watson 2013 IEEE Symposium on Security and Privacy, 18-32, 2013 | 14 | 2013 |
ARMS-CONTROL TREATIES-HOW DO THEY RESTRAIN SOVIET STRATEGIC DEFENSE PROGRAMS WR Harris ORBIS-A JOURNAL OF WORLD AFFAIRS 29 (4), 701-708, 1986 | 10 | 1986 |
Program synthesis for interactive-security systems WR Harris, S Jha, TW Reps, SA Seshia Formal Methods in System Design 51, 362-394, 2017 | 9 | 2017 |