Skip to content
‘Code Coverage Criteria for Asynchronous Programs’

NGN Research
‘Code Coverage Criteria for Asynchronous Programs’

‘On Tolerance of Discrete Systems With Respect to Transition Perturbations’

NGN Research
‘On Tolerance of Discrete Systems With Respect to Transition Perturbations’

‘OAuth 2.0 Redirect URI Validation Falls Short, Literally’

NGN Research
‘OAuth 2.0 Redirect URI Validation Falls Short, Literally’

‘AIM: Automatic Interrupt Modeling for Dynamic Firmware Analysis’

NGN Research
‘AIM: Automatic Interrupt Modeling for Dynamic Firmware Analysis’

‘The Effectiveness of Embedded Values Analysis Modules in Computer Science Education: An Empirical Study’

NGN Research
‘The Effectiveness of Embedded Values Analysis Modules in Computer Science Education: An Empirical Study’

‘A Case Study in Analytic Protocol Analysis in ACL2’

NGN Research
‘A Case Study in Analytic Protocol Analysis in ACL2’

‘Using Counterexample Generation and Theory Exploration To Suggest Missing Hypotheses’

NGN Research
‘Using Counterexample Generation and Theory Exploration To Suggest Missing Hypotheses’

‘Verification of GossipSub in ACL2s’

NGN Research
‘Verification of GossipSub in ACL2s’

‘Proving Calculational Proofs Correct’

NGN Research
‘Proving Calculational Proofs Correct’

‘Zero-Shot Referring Expression Comprehension via Structural Similarity Between Images and Captions’

NGN Research
‘Zero-Shot Referring Expression Comprehension via Structural Similarity Between Images and Captions’

‘A Unified Approach for Resilience and Causal Responsibility With Integer Linear Programming (ILP) and LP Relaxations’

NGN Research
‘A Unified Approach for Resilience and Causal Responsibility With Integer Linear Programming (ILP) and LP Relaxations’

‘Multiple Toddler Tracking in Indoor Videos’

NGN Research
‘Multiple Toddler Tracking in Indoor Videos’