default search action
William N. Sumner
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c26]Golnaz Gharachorlu, Nick Sumner:
Type Batched Program Reduction. ISSTA 2023: 398-410 - 2021
- [c25]Golnaz Gharachorlu, Nick Sumner:
Leveraging Models to Reduce Test Cases in Software Repositories. MSR 2021: 230-241 - [i1]Golnaz Gharachorlu, Nick Sumner:
Leveraging Models to Reduce Test Cases in Software Repositories. CoRR abs/2103.11534 (2021)
2010 – 2019
- 2019
- [c24]Golnaz Gharachorlu, Nick Sumner:
: Priority Aware Test Case Reduction. FASE 2019: 409-426 - 2018
- [c23]Naveen Vedula, Arrvindh Shriraman, Snehasish Kumar, William N. Sumner:
NACHOS: Software-Driven Hardware-Assisted Memory Disambiguation for Accelerators. HPCA 2018: 710-723 - [c22]Golnaz Gharachorlu, Nick Sumner:
Avoiding the Familiar to Speed Up Test Case Reduction. QRS 2018: 426-437 - 2017
- [c21]Snehasish Kumar, Nick Sumner, Vijayalakshmi Srinivasan, Steve Margerm, Arrvindh Shriraman:
Needle: Leveraging Program Analysis to Analyze and Extract Accelerators from Whole Programs. HPCA 2017: 565-576 - 2016
- [c20]Yonghwi Kwon, Dohyeong Kim, William N. Sumner, Kyungtae Kim, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu:
LDX: Causality Inference by Lightweight Dual Execution. ASPLOS 2016: 503-515 - [c19]Snehasish Kumar, Vijayalakshmi Srinivasan, Amirali Sharifian, Nick Sumner, Arrvindh Shriraman:
Peruse and Profit: Estimating the Accelerability of Loops. ICS 2016: 21:1-21:13 - [c18]Snehasish Kumar, William N. Sumner, Arrvindh Shriraman:
SPEC-AX and PARSEC-AX: extracting accelerator benchmarks from microprocessor benchmarks. IISWC 2016: 117-127 - 2015
- [c17]Dohyeong Kim, Yonghwi Kwon, William N. Sumner, Xiangyu Zhang, Dongyan Xu:
Dual Execution for On the Fly Fine Grained Execution Comparison. ASPLOS 2015: 325-338 - [c16]Robert D. Cameron, Nigel Medforth, Dan Lin, Dale Denis, William N. Sumner:
Bitwise Data Parallelism with LLVM: The ICgrep Case Study. ICA3PP (2) 2015: 373-387 - 2014
- [c15]Dohyeong Kim, William N. Sumner, Xiangyu Zhang, Dongyan Xu, Hira Agrawal:
Reuse-oriented reverse engineering of functional components from x86 binaries. ICSE 2014: 1128-1139 - 2013
- [b1]William N. Sumner:
Automated Failure Explanation Through Execution Comparison. Purdue University, USA, 2013 - [c14]Zhongshu Gu, William N. Sumner, Zhui Deng, Xiangyu Zhang, Dongyan Xu:
DRIP: A framework for purifying trojaned kernel drivers. DSN 2013: 1-12 - [c13]William N. Sumner, Xiangyu Zhang:
Comparative causality: explaining the differences between executions. ICSE 2013: 272-281 - [c12]William N. Sumner, Xiangyu Zhang:
Identifying execution points for dynamic analyses. ASE 2013: 81-91 - 2012
- [j1]William N. Sumner, Yunhui Zheng, Dasarath Weeratunge, Xiangyu Zhang:
Precise Calling Context Encoding. IEEE Trans. Software Eng. 38(5): 1160-1177 (2012) - [c11]Dawei Qi, William N. Sumner, Feng Qin, Mai Zheng, Xiangyu Zhang, Abhik Roychoudhury:
Modeling Software Execution Environment. WCRE 2012: 415-424 - 2011
- [c10]Kyu Hyung Lee, Nick Sumner, Xiangyu Zhang, Patrick Eugster:
Unified debugging of distributed systems with Recon. DSN 2011: 85-96 - [c9]William N. Sumner, Tao Bao, Xiangyu Zhang, Sunil Prabhakar:
Coalescing executions for fast uncertainty analysis. ICSE 2011: 581-590 - [c8]William N. Sumner, Tao Bao, Xiangyu Zhang:
Selecting peers for execution comparison. ISSTA 2011: 309-319 - [c7]Kyu Hyung Lee, Yunhui Zheng, Nick Sumner, Xiangyu Zhang:
Toward generating reducible replay logs. PLDI 2011: 246-257 - [c6]William N. Sumner, Christian Hammer, Julian Dolby:
Marathon: Detecting Atomic-Set Serializability Violations with Conflict Graphs. RV 2011: 161-176 - 2010
- [c5]William N. Sumner, Yunhui Zheng, Dasarath Weeratunge, Xiangyu Zhang:
Precise calling context encoding. ICSE (1) 2010: 525-534 - [c4]Dasarath Weeratunge, Xiangyu Zhang, William N. Sumner, Suresh Jagannathan:
Analyzing concurrency bugs using dual slicing. ISSTA 2010: 253-264 - [c3]William N. Sumner, Xiangyu Zhang:
Memory indexing: canonicalizing addresses across executions. SIGSOFT FSE 2010: 217-226
2000 – 2009
- 2009
- [c2]William N. Sumner, Xiangyu Zhang:
Algorithms for Automatically Computing the Causal Paths of Failures. FASE 2009: 355-369 - 2008
- [c1]Bin Xin, William N. Sumner, Xiangyu Zhang:
Efficient program execution indexing. PLDI 2008: 238-248
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint