<?xml version="1.0"?>
<dblpperson name="Samik Basu 0001" pid="67/1905" n="117">
<person key="homepages/67/1905" mdate="2025-07-18">
<author pid="67/1905">Samik Basu 0001</author>
<note type="affiliation">Iowa State University, Department of Computer Science, Ames, USA</note>
<url>https://www.cs.iastate.edu/people/samik-basu-0</url>
<url>https://scholar.google.com/citations?user=qa9dTwkAAAAJ</url>
<url>https://orcid.org/0000-0002-2430-6827</url>
<url>https://www.wikidata.org/entity/Q102309215</url>
<url>https://mathgenealogy.org/id.php?id=109494</url>
<url>https://d-nb.info/gnd/1045854468</url>
<url>https://id.loc.gov/authorities/names/nb2013026401</url>
</person>
<homonyms n="3">
<h f="b/Basu:Samik"><name>Samik Basu</name>
</h>
<h f="b/Basu_0002:Samik"><person key="homepages/67/1905-2" mdate="2019-02-27">
<author pid="67/1905-2">Samik Basu 0002</author>
<note type="affiliation">Vivekananda University, Belur, India</note>
</person>
</h>
<h f="b/Basu_0003:Samik"><person key="homepages/67/1905-3" mdate="2019-02-27">
<author pid="67/1905-3">Samik Basu 0003</author>
<note type="affiliation">CoreEL Technologies, Bangalore, India</note>
</person>
</h>
</homonyms>
<r><inproceedings key="conf/aaai/RauerBH25" mdate="2026-02-01">
<author orcid="0009-0006-9767-4811" pid="396/0149">Erik Rauer</author>
<author pid="67/1905">Samik Basu 0001</author>
<author orcid="0000-0001-5399-3489" pid="h/VasantHonavar">Vasant G. Honavar</author>
<title>Checking Consistency of CP-Theory Preferences in Polynomial Time.</title>
<pages>15126-15133</pages>
<year>2025</year>
<booktitle>AAAI</booktitle>
<ee type="oa">https://doi.org/10.1609/aaai.v39i14.33659</ee>
<crossref>conf/aaai/2025</crossref>
<url>db/conf/aaai/aaai2025.html#RauerBH25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ifm/ZamanJMCB25" mdate="2026-02-03">
<author orcid="0009-0008-5680-5509" pid="321/5933">Eshita Zaman</author>
<author orcid="0000-0002-7671-2720" pid="412/3153">Christopher Johannsen</author>
<author orcid="0000-0002-7737-6888" pid="39/179">Andrew S. Miner</author>
<author orcid="0000-0002-4906-6145" pid="c/GianfrancoCiardo">Gianfranco Ciardo</author>
<author orcid="0000-0002-2430-6827" pid="67/1905">Samik Basu 0001</author>
<title>CTL Model Checking Partially Specified Systems.</title>
<pages>81-98</pages>
<year>2025</year>
<booktitle>iFM</booktitle>
<ee>https://doi.org/10.1007/978-3-032-10794-7_5</ee>
<crossref>conf/ifm/2025</crossref>
<url>db/conf/ifm/ifm2025.html#ZamanJMCB25</url>
<stream>streams/conf/ifm</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/bigdataconf/Zhu0P24" mdate="2026-02-25">
<author pid="12/6541">Yanhui Zhu</author>
<author pid="67/1905">Samik Basu 0001</author>
<author orcid="0000-0003-1665-5266" pid="88/1807">Aduri Pavan</author>
<title>Fairness in Monotone k-submodular Maximization: Algorithms and Applications.</title>
<pages>173-178</pages>
<year>2024</year>
<booktitle>IEEE Big Data</booktitle>
<ee>https://doi.org/10.1109/BigData62323.2024.10825264</ee>
<crossref>conf/bigdataconf/2024</crossref>
<url>db/conf/bigdataconf/bigdataconf2024.html#Zhu0P24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cikm/Zhu0024" mdate="2024-11-30">
<author orcid="0000-0003-0995-1075" pid="12/6541">Yanhui Zhu</author>
<author orcid="0000-0002-2430-6827" pid="67/1905">Samik Basu 0001</author>
<author orcid="0000-0003-1665-5266" pid="88/1807">A. Pavan 0001</author>
<title>Regularized Unconstrained Weakly Submodular Maximization.</title>
<pages>3537-3548</pages>
<year>2024</year>
<booktitle>CIKM</booktitle>
<ee>https://doi.org/10.1145/3627673.3679651</ee>
<crossref>conf/cikm/2024</crossref>
<url>db/conf/cikm/cikm2024.html#Zhu0024</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ijcai/Zhu0024" mdate="2024-10-18">
<author pid="12/6541">Yanhui Zhu</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="88/1807">A. Pavan 0001</author>
<title>Improved Evolutionary Algorithms for Submodular Maximization with Cost Constraints.</title>
<pages>7082-7090</pages>
<year>2024</year>
<booktitle>IJCAI</booktitle>
<ee type="oa">https://www.ijcai.org/proceedings/2024/783</ee>
<crossref>conf/ijcai/2024</crossref>
<url>db/conf/ijcai/ijcai2024.html#Zhu0024</url>
</inproceedings>
</r>
<r><inproceedings key="conf/itsc/IslamW024" mdate="2025-05-06">
<author pid="404/1026">Md Rayhanul Islam</author>
<author pid="55/1852">Tichakorn Wongpiromsarn</author>
<author pid="67/1905">Samik Basu 0001</author>
<title>Analysis of the Effects of Perception Inconsistency Among Interacting Vehicles in Partially Observable Environments.</title>
<pages>176-183</pages>
<year>2024</year>
<booktitle>ITSC</booktitle>
<ee>https://doi.org/10.1109/ITSC58415.2024.10920209</ee>
<crossref>conf/itsc/2024</crossref>
<url>db/conf/itsc/itsc2024.html#IslamW024</url>
</inproceedings>
</r>
<r><inproceedings key="conf/saiv/HanumanthaiahB14" mdate="2024-10-06">
<author orcid="0000-0002-7518-8568" pid="382/1415">Karthik Hanumanthaiah</author>
<author pid="67/1905">Samik Basu 0001</author>
<title>Iterative Counter-Example Guided Robustness Verification for Neural Networks.</title>
<pages>179-187</pages>
<year>2024</year>
<booktitle>SAIV</booktitle>
<ee>https://doi.org/10.1007/978-3-031-65112-0_9</ee>
<crossref>conf/saiv/2024</crossref>
<url>db/conf/saiv/saiv2024.html#HanumanthaiahB14</url>
<stream>streams/conf/saiv</stream>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2405-05942" mdate="2024-06-13">
<author pid="12/6541">Yanhui Zhu</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="88/1807">A. Pavan 0001</author>
<title>Improved Evolutionary Algorithms for Submodular Maximization with Cost Constraints.</title>
<year>2024</year>
<volume>abs/2405.05942</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2405.05942</ee>
<url>db/journals/corr/corr2405.html#abs-2405-05942</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2407-09710" mdate="2024-09-06">
<author pid="21/2841">Le Chang</author>
<author pid="383/9149">Saitej Yavvari</author>
<author pid="c/RCleaveland">Rance Cleaveland</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="142/1135-2">Liyi Li 0002</author>
<title>DisQ: A Markov Decision Process Based Language for Quantum Distributed Systems.</title>
<year>2024</year>
<volume>abs/2407.09710</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2407.09710</ee>
<url>db/journals/corr/corr2407.html#abs-2407-09710</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2408-04620" mdate="2024-09-13">
<author pid="12/6541">Yanhui Zhu</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="88/1807">A. Pavan 0001</author>
<title>Regularized Unconstrained Weakly Submodular Maximization.</title>
<year>2024</year>
<volume>abs/2408.04620</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2408.04620</ee>
<url>db/journals/corr/corr2408.html#abs-2408-04620</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2411-05318" mdate="2025-01-01">
<author pid="12/6541">Yanhui Zhu</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="88/1807">A. Pavan 0001</author>
<title>Fairness in Monotone <i>k</i>-submodular Maximization: Algorithms and Applications.</title>
<year>2024</year>
<volume>abs/2411.05318</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2411.05318</ee>
<url>db/journals/corr/corr2411.html#abs-2411-05318</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><inproceedings key="conf/ecai/0001HS023" mdate="2025-01-15">
<author pid="67/1905">Samik Basu 0001</author>
<author orcid="0000-0001-5399-3489" pid="h/VasantHonavar">Vasant G. Honavar</author>
<author pid="44/6515">Ganesh Ram Santhanam</author>
<author orcid="0000-0002-2342-3271" pid="25/6764-1">Jia Tao 0001</author>
<title>Representing and Reasoning with Multi-Stakeholder Qualitative Preference Queries.</title>
<pages>206-213</pages>
<year>2023</year>
<booktitle>ECAI</booktitle>
<ee type="oa">https://doi.org/10.3233/FAIA230272</ee>
<crossref>conf/ecai/2023</crossref>
<url>db/conf/ecai/ecai2023.html#0001HS023</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uai/NieZNBPQ23" mdate="2023-08-29">
<author pid="331/1658">Guanyu Nie</author>
<author pid="12/6541">Yanhui Zhu</author>
<author pid="339/0727">Yididiya Y. Nadew</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="88/1807">A. Pavan 0001</author>
<author pid="50/8822">Christopher John Quinn</author>
<title>Size-constrained k-submodular maximization in near-linear time.</title>
<pages>1545-1554</pages>
<year>2023</year>
<booktitle>UAI</booktitle>
<ee type="oa">https://proceedings.mlr.press/v216/nie23a.html</ee>
<crossref>conf/uai/2023</crossref>
<url>db/conf/uai/uai2023.html#NieZNBPQ23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uai/PadmanabhanZ0P23" mdate="2023-08-28">
<author pid="234/2687">Madhavan R. Padmanabhan</author>
<author pid="12/6541">Yanhui Zhu</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="88/1807">Aduri Pavan</author>
<title>Maximizing submodular functions under submodular constraints.</title>
<pages>1618-1627</pages>
<year>2023</year>
<booktitle>UAI</booktitle>
<ee type="oa">https://proceedings.mlr.press/v216/padmanabhan23a.html</ee>
<crossref>conf/uai/2023</crossref>
<url>db/conf/uai/uai2023.html#PadmanabhanZ0P23</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2307-16307" mdate="2023-08-03">
<author pid="67/1905">Samik Basu 0001</author>
<author pid="h/VasantHonavar">Vasant G. Honavar</author>
<author pid="44/6515">Ganesh Ram Santhanam</author>
<author pid="25/6764-1">Jia Tao 0001</author>
<title>Representing and Reasoning with Multi-Stakeholder Qualitative Preference Queries.</title>
<year>2023</year>
<volume>abs/2307.16307</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2307.16307</ee>
<url>db/journals/corr/corr2307.html#abs-2307-16307</url>
</article>
</r>
<r><article key="journals/ieeejas/BasuK21" mdate="2021-04-21">
<author pid="67/1905">Samik Basu 0001</author>
<author pid="12/2833-1">Ratnesh Kumar 0001</author>
<title>Control of Non-Deterministic Systems With $\mu$-Calculus Specifications Using Quotienting.</title>
<pages>953-970</pages>
<year>2021</year>
<volume>8</volume>
<journal>IEEE CAA J. Autom. Sinica</journal>
<number>5</number>
<ee>https://doi.org/10.1109/JAS.2021.1003964</ee>
<url>db/journals/ieeejas/ieeejas8.html#BasuK21</url>
</article>
</r>
<r><article key="journals/snam/FuPKBDP21" mdate="2022-08-23">
<author pid="277/5099">Xiaoyun Fu</author>
<author pid="234/2687">Madhavan R. Padmanabhan</author>
<author pid="277/5296">Raj Gaurav Kumar</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="277/5020">Shawn F. Dorius</author>
<author pid="88/1807">A. Pavan 0001</author>
<title>Measuring the impact of influence on individuals: roadmap to quantifying attitude.</title>
<pages>61</pages>
<year>2021</year>
<volume>11</volume>
<journal>Soc. Netw. Anal. Min.</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s13278-021-00763-x</ee>
<url>db/journals/snam/snam11.html#FuPKBDP21</url>
</article>
</r>
<r><inproceedings key="conf/bigdataconf/FuB0P21" mdate="2026-02-25">
<author pid="277/5099">Xiaoyun Fu</author>
<author pid="311/1523">Rishabh Rajendra Bhatt</author>
<author pid="67/1905">Samik Basu 0001</author>
<author orcid="0000-0003-1665-5266" pid="88/1807">Aduri Pavan</author>
<title>Multi-Objective Submodular Optimization with Approximate Oracles and Influence Maximization.</title>
<pages>328-334</pages>
<year>2021</year>
<booktitle>IEEE BigData</booktitle>
<ee>https://doi.org/10.1109/BigData52589.2021.9671756</ee>
<crossref>conf/bigdataconf/2021</crossref>
<url>db/conf/bigdataconf/bigdataconf2021.html#FuB0P21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/asunam/FuPK0DP20" mdate="2022-08-23">
<author pid="277/5099">Xiaoyun Fu</author>
<author pid="234/2687">Madhavan R. Padmanabhan</author>
<author pid="277/5296">Raj Gaurav Kumar</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="277/5020">Shawn F. Dorius</author>
<author pid="88/1807">Aduri Pavan</author>
<title>Measuring the Impact of Influence on Individuals: Roadmap to Quantifying Attitude.</title>
<pages>227-231</pages>
<year>2020</year>
<booktitle>ASONAM</booktitle>
<ee>https://doi.org/10.1109/ASONAM49781.2020.9381300</ee>
<crossref>conf/asunam/2020</crossref>
<url>db/conf/asunam/asonam2020.html#FuPK0DP20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/webi/KumarB0P20" mdate="2021-06-28">
<author pid="277/5296">Raj Gaurav Kumar</author>
<author pid="295/8340">Preeti Bhardwaj</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="88/1807">Aduri Pavan</author>
<title>Disrupting Diffusion: Critical Nodes in Network.</title>
<pages>397-404</pages>
<year>2020</year>
<booktitle>WI/IAT</booktitle>
<ee>https://doi.org/10.1109/WIIAT50758.2020.00058</ee>
<crossref>conf/webi/2020</crossref>
<url>db/conf/webi/webi2020.html#KumarB0P20</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2010-13304" mdate="2022-08-23">
<author pid="277/5099">Xiaoyun Fu</author>
<author pid="234/2687">Madhavan Rajagopal Padmanabhan</author>
<author pid="277/5296">Raj Gaurav Kumar</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="277/5020">Shawn F. Dorius</author>
<author pid="88/1807">Aduri Pavan</author>
<title>Measuring the Impact of Influence on Individuals: Roadmap to Quantifying Attitude.</title>
<year>2020</year>
<volume>abs/2010.13304</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2010.13304</ee>
<url>db/journals/corr/corr2010.html#abs-2010-13304</url>
</article>
</r>
<r><inproceedings key="conf/bigdataconf/PadmanabhanSBP18" mdate="2026-02-25">
<author pid="234/2687">Madhavan R. Padmanabhan</author>
<author pid="234/3064">Naresh Somisetty</author>
<author pid="67/1905">Samik Basu 0001</author>
<author orcid="0000-0003-1665-5266" pid="88/1807">A. Pavan 0001</author>
<title>Influence Maximization in Social Networks With Non-Target Constraints.</title>
<pages>771-780</pages>
<year>2018</year>
<booktitle>IEEE BigData</booktitle>
<ee>https://doi.org/10.1109/BigData.2018.8621973</ee>
<crossref>conf/bigdataconf/2018</crossref>
<url>db/conf/bigdataconf/bigdataconf2018.html#PadmanabhanSBP18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/csiirw/GunasekharanBS17" mdate="2019-02-27">
<author pid="215/2411">Maheedhar Gunasekharan</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="44/6515">Ganesh Ram Santhanam</author>
<title>Selecting the minimal set of preferred responses to counter detected intrusions.</title>
<pages>5:1-5:8</pages>
<year>2017</year>
<booktitle>CISRC</booktitle>
<ee>https://doi.org/10.1145/3064814.3064824</ee>
<crossref>conf/csiirw/2017</crossref>
<url>db/conf/csiirw/cisrc2017.html#GunasekharanBS17</url>
</inproceedings>
</r>
<r><book key="series/synthesis/2016Santhanam" mdate="2023-10-17">
<author pid="44/6515">Ganesh Ram Santhanam</author>
<author pid="67/1905">Samik Basu 0001</author>
<author orcid="0000-0001-5399-3489" pid="h/VasantHonavar">Vasant G. Honavar</author>
<title>Representing and Reasoning with Qualitative Preferences: Tools and Applications</title>
<booktitle>Representing and Reasoning with Qualitative Preferences</booktitle>
<publisher>Morgan &#38; Claypool Publishers</publisher>
<year>2016</year>
<series href="db/series/synthesis-aim/index.html">Synthesis Lectures on Artificial Intelligence and Machine Learning</series>
<isbn>978-3-031-00445-2</isbn>
<isbn>978-3-031-01573-1</isbn>
<ee>https://doi.org/10.2200/S00689ED1V01Y201512AIM031</ee>
<ee>https://doi.org/10.1007/978-3-031-01573-1</ee>
<ee>https://www.wikidata.org/entity/Q29040860</ee>
</book>
</r>
<r><article key="journals/tcs/BasuB16" mdate="2019-02-27">
<author pid="67/1905">Samik Basu 0001</author>
<author pid="07/3368">Tevfik Bultan</author>
<title>On deciding synchronizability for asynchronously communicating systems.</title>
<pages>60-75</pages>
<year>2016</year>
<volume>656</volume>
<journal>Theor. Comput. Sci.</journal>
<ee>https://doi.org/10.1016/j.tcs.2016.09.023</ee>
<url>db/journals/tcs/tcs656.html#BasuB16</url>
</article>
</r>
<r><inproceedings key="conf/csiirw/StrasburgBW16" mdate="2019-02-27">
<author pid="89/6776">Chris Strasburg</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="w/JohnnySWong">Johnny S. Wong</author>
<title>A Cross-Domain Comparable Measurement Framework to Quantify Intrusion Detection Effectiveness.</title>
<pages>11:1-11:8</pages>
<year>2016</year>
<booktitle>CISRC</booktitle>
<ee>https://doi.org/10.1145/2897795.2897816</ee>
<crossref>conf/csiirw/2016</crossref>
<url>db/conf/csiirw/cisrc2016.html#StrasburgBW16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fase/BasuB16" mdate="2019-02-27">
<author pid="67/1905">Samik Basu 0001</author>
<author pid="07/3368">Tevfik Bultan</author>
<title>Automated Choreography Repair.</title>
<pages>13-30</pages>
<year>2016</year>
<booktitle>FASE</booktitle>
<ee>https://doi.org/10.1007/978-3-662-49665-7_2</ee>
<crossref>conf/fase/2016</crossref>
<url>db/conf/fase/fase2016.html#BasuB16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icaart/SanthanamSSB15" mdate="2019-02-27">
<author pid="44/6515">Ganesh Ram Santhanam</author>
<author pid="167/9828">Gopalakrishnan Sivaprakasam</author>
<author pid="85/7008">Giora Slutzki</author>
<author pid="67/1905">Samik Basu 0001</author>
<title>A Knowledge Based Framework for Case-specific Diagnosis.</title>
<pages>482-488</pages>
<year>2015</year>
<booktitle>ICAART (2)</booktitle>
<crossref>conf/icaart/2015-2</crossref>
<url>db/conf/icaart/icaart2015-2.html#SanthanamSSB15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/re/OsterSB15" mdate="2024-10-06">
<author orcid="0009-0000-1847-1925" pid="29/7739">Zachary J. Oster</author>
<author pid="44/6515">Ganesh Ram Santhanam</author>
<author pid="67/1905">Samik Basu 0001</author>
<title>Scalable modeling and analysis of requirements preferences: A qualitative approach using CI-Nets.</title>
<pages>214-219</pages>
<year>2015</year>
<booktitle>RE</booktitle>
<ee>https://doi.org/10.1109/RE.2015.7320425</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/RE.2015.7320425</ee>
<crossref>conf/re/2015</crossref>
<url>db/conf/re/re2015.html#OsterSB15</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/SanthanamBH15" mdate="2019-02-27">
<author pid="44/6515">Ganesh Ram Santhanam</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="h/VasantHonavar">Vasant G. Honavar</author>
<title>CRISNER: A Practically Efficient Reasoner for Qualitative Preferences.</title>
<year>2015</year>
<volume>abs/1507.08559</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1507.08559</ee>
<url>db/journals/corr/corr1507.html#SanthanamBH15</url>
</article>
</r>
<r><inproceedings key="conf/itng/SarkarBW14" mdate="2025-02-11">
<author pid="62/7962">Tanmoy Sarkar</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="w/JohnnySWong">Johnny Wong 0001</author>
<title>iConSMutate: Concolic Testing of Database Applications Using Existing Database States Guided by SQL Mutants.</title>
<pages>479-484</pages>
<year>2014</year>
<booktitle>ITNG</booktitle>
<ee>https://doi.org/10.1109/ITNG.2014.82</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ITNG.2014.82</ee>
<crossref>conf/itng/2014</crossref>
<url>db/conf/itng/itng2014.html#SarkarBW14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/kbse/BasuB14" mdate="2019-02-27">
<author pid="67/1905">Samik Basu 0001</author>
<author pid="07/3368">Tevfik Bultan</author>
<title>Automatic verification of interactions in asynchronous systems with unbounded buffers.</title>
<pages>743-754</pages>
<year>2014</year>
<booktitle>ASE</booktitle>
<ee>https://doi.org/10.1145/2642937.2643016</ee>
<crossref>conf/kbse/2014</crossref>
<url>db/conf/kbse/ase2014.html#BasuB14</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/SanthanamBH14" mdate="2019-02-27">
<author pid="44/6515">Ganesh Ram Santhanam</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="h/VasantHonavar">Vasant G. Honavar</author>
<title>Representing and Reasoning with Qualitative Preferences for Compositional Systems.</title>
<year>2014</year>
<volume>abs/1401.3899</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1401.3899</ee>
<url>db/journals/corr/corr1401.html#SanthanamBH14</url>
</article>
</r>
<r><inproceedings key="conf/aldt/SanthanamBH13" mdate="2024-05-07">
<author orcid="0000-0003-4319-5103" pid="44/6515">Ganesh Ram Santhanam</author>
<author pid="67/1905">Samik Basu 0001</author>
<author orcid="0000-0001-5399-3489" pid="h/VasantHonavar">Vasant G. Honavar</author>
<title>Verifying Preferential Equivalence and Subsumption via Model Checking.</title>
<pages>324-335</pages>
<year>2013</year>
<booktitle>ADT</booktitle>
<ee>https://doi.org/10.1007/978-3-642-41575-3_25</ee>
<crossref>conf/aldt/2013</crossref>
<url>db/conf/aldt/adt2013.html#SanthanamBH13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/compsac/StrasburgBW13" mdate="2023-03-24">
<author pid="89/6776">Chris Strasburg</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="w/JohnnySWong">Johnny S. Wong</author>
<title>S-MAIDS: A Semantic Model for Automated Tuning, Correlation, and Response Selection in Intrusion Detection Systems.</title>
<pages>319-328</pages>
<year>2013</year>
<booktitle>COMPSAC</booktitle>
<ee>https://doi.org/10.1109/COMPSAC.2013.57</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/COMPSAC.2013.57</ee>
<crossref>conf/compsac/2013</crossref>
<url>db/conf/compsac/compsac2013.html#StrasburgBW13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/csiirw/SanthanamOB13" mdate="2024-10-06">
<author orcid="0000-0003-4319-5103" pid="44/6515">Ganesh Ram Santhanam</author>
<author orcid="0009-0000-1847-1925" pid="29/7739">Zachary J. Oster</author>
<author pid="67/1905">Samik Basu 0001</author>
<title>Identifying a preferred countermeasure strategy for attack graphs.</title>
<pages>11</pages>
<year>2013</year>
<booktitle>CSIIRW</booktitle>
<ee>https://doi.org/10.1145/2459976.2459988</ee>
<crossref>conf/csiirw/2013</crossref>
<url>db/conf/csiirw/csiirw2013.html#SanthanamOB13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/itng/SarkarBW13" mdate="2025-02-11">
<author pid="62/7962">Tanmoy Sarkar</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="w/JohnnySWong">Johnny Wong 0001</author>
<title>SynConSMutate: Concolic Testing of Database Applications via Synthetic Data Guided by SQL Mutants.</title>
<pages>337-342</pages>
<year>2013</year>
<booktitle>ITNG</booktitle>
<ee>https://doi.org/10.1109/ITNG.2013.54</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ITNG.2013.54</ee>
<crossref>conf/itng/2013</crossref>
<url>db/conf/itng/itng2013.html#SarkarBW13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/itng/RuseB13" mdate="2023-03-24">
<author pid="39/10038">Michelle Ruse</author>
<author pid="67/1905">Samik Basu 0001</author>
<title>Detecting Cross-Site Scripting Vulnerability Using Concolic Testing.</title>
<pages>633-638</pages>
<year>2013</year>
<booktitle>ITNG</booktitle>
<ee>https://doi.org/10.1109/ITNG.2013.97</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ITNG.2013.97</ee>
<crossref>conf/itng/2013</crossref>
<url>db/conf/itng/itng2013.html#RuseB13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/webi/SanthanamBH13" mdate="2023-03-24">
<author orcid="0000-0003-4319-5103" pid="44/6515">Ganesh Ram Santhanam</author>
<author pid="67/1905">Samik Basu 0001</author>
<author orcid="0000-0001-5399-3489" pid="h/VasantHonavar">Vasant G. Honavar</author>
<title>Preference Based Service Adaptation Using Service Substitution.</title>
<pages>487-493</pages>
<year>2013</year>
<booktitle>Web Intelligence</booktitle>
<ee>https://doi.org/10.1109/WI-IAT.2013.68</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/WI-IAT.2013.68</ee>
<ee>https://www.wikidata.org/entity/Q57015128</ee>
<crossref>conf/webi/2013</crossref>
<url>db/conf/webi/webi2013.html#SanthanamBH13</url>
</inproceedings>
</r>
<r><proceedings key="conf/icsoc/2013" mdate="2025-11-02">
<editor pid="67/1905">Samik Basu 0001</editor>
<editor pid="p/CesarePautasso">Cesare Pautasso</editor>
<editor pid="50/6759-19">Liang Zhang 0019</editor>
<editor pid="97/374-1">Xiang Fu 0001</editor>
<title>Service-Oriented Computing - 11th International Conference, ICSOC 2013, Berlin, Germany, December 2-5, 2013, Proceedings</title>
<year>2013</year>
<publisher>Springer</publisher>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>8274</volume>
<ee>https://doi.org/10.1007/978-3-642-45005-1</ee>
<ee>https://www.wikidata.org/entity/Q134464527</ee>
<isbn>978-3-642-45004-4</isbn>
<booktitle>ICSOC</booktitle>
<url>db/conf/icsoc/icsoc2013.html</url>
</proceedings>
</r>
<r><article key="journals/jcs/StakhanovaSBW12" mdate="2020-05-11">
<author pid="34/2916">Natalia Stakhanova</author>
<author pid="89/6776">Chris Strasburg</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="w/JohnnySWong">Johnny S. Wong</author>
<title>Towards cost-sensitive assessment of intrusion response selection.</title>
<pages>169-198</pages>
<year>2012</year>
<volume>20</volume>
<journal>J. Comput. Secur.</journal>
<number>2-3</number>
<ee>https://doi.org/10.3233/JCS-2011-0436</ee>
<url>db/journals/jcs/jcs20.html#StakhanovaSBW12</url>
</article>
</r>
<r><article key="journals/tosem/JenningsGB12" mdate="2019-02-27">
<author pid="43/7223">Paul Jennings</author>
<author pid="67/3010">Arka P. Ghosh</author>
<author pid="67/1905">Samik Basu 0001</author>
<title>A two-phase approximation for model checking probabilistic unbounded until properties of probabilistic systems.</title>
<pages>18:1-18:35</pages>
<year>2012</year>
<volume>21</volume>
<journal>ACM Trans. Softw. Eng. Methodol.</journal>
<number>3</number>
<ee>https://doi.org/10.1145/2211616.2211621</ee>
<url>db/journals/tosem/tosem21.html#JenningsGB12</url>
</article>
</r>
<r><inproceedings key="conf/date/SinhaRSB12" mdate="2023-03-24">
<author pid="93/2143">Roopak Sinha</author>
<author pid="r/ParthaSRoop">Partha S. Roop</author>
<author pid="99/3221">Zoran Salcic</author>
<author pid="67/1905">Samik Basu 0001</author>
<title>Correct-by-construction multi-component SoC design.</title>
<pages>647-652</pages>
<year>2012</year>
<booktitle>DATE</booktitle>
<ee>https://doi.org/10.1109/DATE.2012.6176551</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/DATE.2012.6176551</ee>
<ee>http://dl.acm.org/citation.cfm?id=2492871</ee>
<crossref>conf/date/2012</crossref>
<url>db/conf/date/date2012.html#SinhaRSB12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/facs2/OsterSBH12" mdate="2024-10-06">
<author orcid="0009-0000-1847-1925" pid="29/7739">Zachary J. Oster</author>
<author orcid="0000-0003-4319-5103" pid="44/6515">Ganesh Ram Santhanam</author>
<author pid="67/1905">Samik Basu 0001</author>
<author orcid="0000-0001-5399-3489" pid="h/VasantHonavar">Vasant G. Honavar</author>
<title>Model Checking of Qualitative Sensitivity Preferences to Minimize Credential Disclosure.</title>
<pages>205-223</pages>
<year>2012</year>
<booktitle>FACS</booktitle>
<ee>https://doi.org/10.1007/978-3-642-35861-6_13</ee>
<ee>https://www.wikidata.org/entity/Q57015121</ee>
<crossref>conf/facs2/2012</crossref>
<url>db/conf/facs2/facs2012.html#OsterSBH12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icfem/SarkarBW12" mdate="2019-02-27">
<author pid="62/7962">Tanmoy Sarkar</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="w/JohnnySWong">Johnny S. Wong</author>
<title>ConSMutate: SQL Mutants for Guiding Concolic Testing of Database Applications.</title>
<pages>462-477</pages>
<year>2012</year>
<booktitle>ICFEM</booktitle>
<ee>https://doi.org/10.1007/978-3-642-34281-3_32</ee>
<crossref>conf/icfem/2012</crossref>
<url>db/conf/icfem/icfem2012.html#SarkarBW12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icsoc/OsterASBR12" mdate="2024-10-06">
<author orcid="0009-0000-1847-1925" pid="29/7739">Zachary J. Oster</author>
<author pid="57/10837">Syed Adeel Ali</author>
<author orcid="0000-0003-4319-5103" pid="44/6515">Ganesh Ram Santhanam</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="r/ParthaSRoop">Partha S. Roop</author>
<title>A Service Composition Framework Based on Goal-Oriented Requirements Engineering, Model Checking, and Qualitative Preference Analysis.</title>
<pages>283-297</pages>
<year>2012</year>
<booktitle>ICSOC</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-34321-6_19</ee>
<crossref>conf/icsoc/2012</crossref>
<url>db/conf/icsoc/icsoc2012.html#OsterASBR12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/popl/BasuBO12" mdate="2026-02-19">
<author pid="67/1905">Samik Basu 0001</author>
<author pid="07/3368">Tevfik Bultan</author>
<author orcid="0000-0002-4669-2087" pid="14/7056">Meriem Ouederni</author>
<title>Deciding choreography realizability.</title>
<pages>191-202</pages>
<year>2012</year>
<booktitle>POPL</booktitle>
<ee type="oa">https://doi.org/10.1145/2103656.2103680</ee>
<ee type="oa">https://doi.org/10.1145/2103621.2103680</ee>
<crossref>conf/popl/2012</crossref>
<url>db/conf/popl/popl2012.html#BasuBO12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vmcai/BasuBO12" mdate="2026-02-01">
<author pid="67/1905">Samik Basu 0001</author>
<author pid="07/3368">Tevfik Bultan</author>
<author orcid="0000-0002-4669-2087" pid="14/7056">Meriem Ouederni</author>
<title>Synchronizability for Verification of Asynchronously Communicating Systems.</title>
<pages>56-71</pages>
<year>2012</year>
<booktitle>VMCAI</booktitle>
<ee>https://doi.org/10.1007/978-3-642-27940-9_5</ee>
<crossref>conf/vmcai/2012</crossref>
<url>db/conf/vmcai/vmcai2012.html#BasuBO12</url>
</inproceedings>
</r>
<r><article key="journals/ase/LiuBL11" mdate="2020-12-29">
<author pid="72/2590">Jing Liu</author>
<author pid="67/1905">Samik Basu 0001</author>
<author orcid="0000-0001-5390-7982" pid="49/3478">Robyn R. Lutz</author>
<title>Compositional model checking of software product lines using variation point obligations.</title>
<pages>39-76</pages>
<year>2011</year>
<volume>18</volume>
<journal>Autom. Softw. Eng.</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s10515-010-0075-7</ee>
<url>db/journals/ase/ase18.html#LiuBL11</url>
</article>
</r>
<r><article key="journals/jair/SanthanamBH11" mdate="2019-02-27">
<author pid="44/6515">Ganesh Ram Santhanam</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="h/VasantHonavar">Vasant G. Honavar</author>
<title>Representing and Reasoning with Qualitative Preferences for Compositional Systems.</title>
<pages>211-274</pages>
<year>2011</year>
<volume>42</volume>
<journal>J. Artif. Intell. Res.</journal>
<ee>http://jair.org/papers/paper3339.html</ee>
<url>db/journals/jair/jair42.html#SanthanamBH11</url>
</article>
</r>
<r><inproceedings key="conf/aaai/SanthanamSBH11" mdate="2023-09-04">
<author pid="44/6515">Ganesh Ram Santhanam</author>
<author pid="80/9922">Yuly Suvorov</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="h/VasantHonavar">Vasant G. Honavar</author>
<title>Verifying Intervention Policies to Counter Infection Propagation over Networks: A Model Checking Approach.</title>
<year>2011</year>
<booktitle>AAAI</booktitle>
<ee type="oa">https://doi.org/10.1609/aaai.v25i1.7804</ee>
<crossref>conf/aaai/2011</crossref>
<url>db/conf/aaai/aaai2011.html#SanthanamSBH11</url>
<pages>1408-1414</pages>
</inproceedings>
</r>
<r><inproceedings key="conf/aaaiss/SanthanamBH11" mdate="2019-02-27">
<author pid="44/6515">Ganesh Ram Santhanam</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="h/VasantHonavar">Vasant G. Honavar</author>
<title>Identifying Sustainable Designs Using Preferences over Sustainability Attributes.</title>
<year>2011</year>
<booktitle>AAAI Spring Symposium: Artificial Intelligence and Sustainable Design</booktitle>
<ee>http://www.aaai.org/ocs/index.php/SSS/SSS11/paper/view/2461</ee>
<crossref>conf/aaaiss/2011-2</crossref>
<url>db/conf/aaaiss/aaaiss2011-2.html#SanthanamBH11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icws/OsterSB11" mdate="2024-10-06">
<author orcid="0009-0000-1847-1925" pid="29/7739">Zachary J. Oster</author>
<author orcid="0000-0003-4319-5103" pid="44/6515">Ganesh Ram Santhanam</author>
<author pid="67/1905">Samik Basu 0001</author>
<title>Identifying Optimal Composite Services by Decomposing the Service Composition Problem.</title>
<pages>267-274</pages>
<year>2011</year>
<booktitle>ICWS</booktitle>
<ee>https://doi.org/10.1109/ICWS.2011.110</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICWS.2011.110</ee>
<crossref>conf/icws/2011</crossref>
<url>db/conf/icws/icws2011.html#OsterSB11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/kbse/OsterSB11" mdate="2024-10-06">
<author orcid="0009-0000-1847-1925" pid="29/7739">Zachary J. Oster</author>
<author orcid="0000-0003-4319-5103" pid="44/6515">Ganesh Ram Santhanam</author>
<author pid="67/1905">Samik Basu 0001</author>
<title>Automating analysis of qualitative preferences in goal-oriented requirements engineering.</title>
<pages>448-451</pages>
<year>2011</year>
<booktitle>ASE</booktitle>
<ee>https://doi.org/10.1109/ASE.2011.6100096</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ASE.2011.6100096</ee>
<crossref>conf/kbse/2011</crossref>
<url>db/conf/kbse/ase2011.html#OsterSB11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/www/BasuB11" mdate="2019-02-27">
<author pid="67/1905">Samik Basu 0001</author>
<author pid="07/3368">Tevfik Bultan</author>
<title>Choreography conformance via synchronizability.</title>
<pages>795-804</pages>
<year>2011</year>
<booktitle>WWW</booktitle>
<ee>https://doi.org/10.1145/1963405.1963516</ee>
<crossref>conf/www/2011</crossref>
<url>db/conf/www/www2011.html#BasuB11</url>
</inproceedings>
</r>
<r><article key="journals/compsec/StakhanovaBW10" mdate="2025-02-11">
<author pid="34/2916">Natalia Stakhanova</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="w/JohnnySWong">Johnny Wong 0001</author>
<title>On the symbiosis of specification-based and anomaly-based detection.</title>
<pages>253-268</pages>
<year>2010</year>
<volume>29</volume>
<journal>Comput. Secur.</journal>
<number>2</number>
<ee>https://doi.org/10.1016/j.cose.2009.08.007</ee>
<ee>https://www.wikidata.org/entity/Q115061693</ee>
<url>db/journals/compsec/compsec29.html#StakhanovaBW10</url>
</article>
</r>
<r><inproceedings key="conf/aaai/SanthanamBH10" mdate="2023-09-04">
<author pid="44/6515">Ganesh Ram Santhanam</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="h/VasantHonavar">Vasant G. Honavar</author>
<title>Dominance Testing via Model Checking.</title>
<year>2010</year>
<booktitle>AAAI</booktitle>
<ee type="oa">https://doi.org/10.1609/aaai.v24i1.7599</ee>
<crossref>conf/aaai/2010</crossref>
<url>db/conf/aaai/aaai2010.html#SanthanamBH10</url>
<pages>357-362</pages>
</inproceedings>
</r>
<r><inproceedings key="conf/compsac/SvecsSBW10" mdate="2023-03-24">
<author pid="15/10921">Igors Svecs</author>
<author pid="62/7962">Tanmoy Sarkar</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="w/JohnnySWong">Johnny S. Wong</author>
<title>XIDR: A Dynamic Framework Utilizing Cross-Layer Intrusion Detection for Effective Response Deployment.</title>
<pages>287-292</pages>
<year>2010</year>
<booktitle>COMPSAC Workshops</booktitle>
<ee>https://doi.org/10.1109/COMPSACW.2010.57</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/COMPSACW.2010.57</ee>
<crossref>conf/compsac/2010w</crossref>
<url>db/conf/compsac/compsac2010w.html#SvecsSBW10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ecows/OsterSB10" mdate="2024-10-06">
<author orcid="0009-0000-1847-1925" pid="29/7739">Zachary J. Oster</author>
<author orcid="0000-0003-4319-5103" pid="44/6515">Ganesh Ram Santhanam</author>
<author pid="67/1905">Samik Basu 0001</author>
<title>Decomposing the Service Composition Problem.</title>
<pages>163-170</pages>
<year>2010</year>
<booktitle>ECOWS</booktitle>
<ee>https://doi.org/10.1109/ECOWS.2010.15</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ECOWS.2010.15</ee>
<crossref>conf/ecows/2010</crossref>
<url>db/conf/ecows/ecows2010.html#OsterSB10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icfem/HannaSBR10" mdate="2021-04-09">
<author pid="33/6671">Youssef Hanna</author>
<author pid="34/8724">David Samuelson</author>
<author pid="67/1905">Samik Basu 0001</author>
<author orcid="0000-0002-9410-9562" pid="r/HrideshRajan">Hridesh Rajan</author>
<title>Automating Cut-off for Multi-parameterized Systems.</title>
<pages>338-354</pages>
<year>2010</year>
<booktitle>ICFEM</booktitle>
<ee>https://doi.org/10.1007/978-3-642-16901-4_23</ee>
<crossref>conf/icfem/2010</crossref>
<url>db/conf/icfem/icfem2010.html#HannaSBR10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/issre/SunBHL10" mdate="2023-03-24">
<author pid="33/2079-1">Hongyu Sun 0001</author>
<author pid="67/1905">Samik Basu 0001</author>
<author orcid="0000-0001-5399-3489" pid="h/VasantHonavar">Vasant G. Honavar</author>
<author orcid="0000-0001-5390-7982" pid="49/3478">Robyn R. Lutz</author>
<title>Automata-Based Verification of Security Requirements of Composite Web Services.</title>
<pages>348-357</pages>
<year>2010</year>
<booktitle>ISSRE</booktitle>
<ee>https://doi.org/10.1109/ISSRE.2010.20</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ISSRE.2010.20</ee>
<ee>https://www.wikidata.org/entity/Q57015169</ee>
<crossref>conf/issre/2010</crossref>
<url>db/conf/issre/issre2010.html#SunBHL10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/kbse/HeJBGW10" mdate="2019-02-27">
<author pid="47/7566">Ru He</author>
<author pid="43/7223">Paul Jennings</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="67/3010">Arka P. Ghosh</author>
<author pid="47/7173">Huaiqing Wu</author>
<title>A bounded statistical approach for model checking of unbounded until properties.</title>
<pages>225-234</pages>
<year>2010</year>
<booktitle>ASE</booktitle>
<ee>https://doi.org/10.1145/1858996.1859043</ee>
<crossref>conf/kbse/2010</crossref>
<url>db/conf/kbse/ase2010.html#HeJBGW10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/kr/SanthanamBH10" mdate="2025-12-10">
<author pid="44/6515">Ganesh Ram Santhanam</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="h/VasantHonavar">Vasant G. Honavar</author>
<title>Efficient Dominance Testing for Unconditional Preferences.</title>
<year>2010</year>
<booktitle>KR</booktitle>
<ee>https://aaai.org/papers/72-1268-efficient-dominance-testing-for-unconditional-preferences/</ee>
<crossref>conf/kr/2010</crossref>
<url>db/conf/kr/kr2010.html#SanthanamBH10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/saint/RuseSB10" mdate="2023-03-23">
<author pid="39/10038">Michelle Ruse</author>
<author pid="62/7962">Tanmoy Sarkar</author>
<author pid="67/1905">Samik Basu 0001</author>
<title>Analysis &#38; Detection of SQL Injection Vulnerabilities via Automatic Test Case Generation of Programs.</title>
<pages>31-37</pages>
<year>2010</year>
<booktitle>SAINT</booktitle>
<ee>https://doi.org/10.1109/SAINT.2010.60</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SAINT.2010.60</ee>
<crossref>conf/saint/2010</crossref>
<url>db/conf/saint/saint2010.html#RuseSB10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/saint/StrasburgKDBW10" mdate="2023-03-23">
<author pid="89/6776">Chris Strasburg</author>
<author pid="11/8542">Sandeep Krishnan</author>
<author orcid="0000-0003-3650-0018" pid="97/3553">Karin S. Dorman</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="w/JohnnySWong">Johnny S. Wong</author>
<title>Masquerade Detection in Network Environments.</title>
<pages>38-44</pages>
<year>2010</year>
<booktitle>SAINT</booktitle>
<ee>https://doi.org/10.1109/SAINT.2010.66</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SAINT.2010.66</ee>
<crossref>conf/saint/2010</crossref>
<url>db/conf/saint/saint2010.html#StrasburgKDBW10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wsfm/NadkarniBHL10" mdate="2020-12-29">
<author pid="07/9359">Dinanath Nadkarni</author>
<author pid="67/1905">Samik Basu 0001</author>
<author orcid="0000-0001-5399-3489" pid="h/VasantHonavar">Vasant G. Honavar</author>
<author orcid="0000-0001-5390-7982" pid="49/3478">Robyn R. Lutz</author>
<title>Failure Analysis for Composition of Web Services Represented as Labeled Transition Systems.</title>
<pages>161-175</pages>
<year>2010</year>
<booktitle>WS-FM</booktitle>
<ee>https://doi.org/10.1007/978-3-642-19589-1_11</ee>
<ee>https://www.wikidata.org/entity/Q57015147</ee>
<crossref>conf/wsfm/2010</crossref>
<url>db/conf/wsfm/wsfm2010.html#NadkarniBHL10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/IEEEscc/SanthanamBH09" mdate="2023-03-24">
<author orcid="0000-0003-4319-5103" pid="44/6515">Ganesh Ram Santhanam</author>
<author pid="67/1905">Samik Basu 0001</author>
<author orcid="0000-0001-5399-3489" pid="h/VasantHonavar">Vasant G. Honavar</author>
<title>Web Service Substitution Based on Preferences Over Non-functional Attributes.</title>
<pages>210-217</pages>
<year>2009</year>
<booktitle>IEEE SCC</booktitle>
<ee>https://doi.org/10.1109/SCC.2009.21</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SCC.2009.21</ee>
<ee>https://www.wikidata.org/entity/Q57015217</ee>
<crossref>conf/IEEEscc/2009</crossref>
<url>db/conf/IEEEscc/scc2009.html#SanthanamBH09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/StrasburgSBW09" mdate="2019-02-27">
<author pid="89/6776">Chris Strasburg</author>
<author pid="34/2916">Natalia Stakhanova</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="w/JohnnySWong">Johnny S. Wong</author>
<title>Intrusion response cost assessment methodology.</title>
<pages>388-391</pages>
<year>2009</year>
<booktitle>AsiaCCS</booktitle>
<ee>https://doi.org/10.1145/1533057.1533112</ee>
<crossref>conf/ccs/2009asia</crossref>
<url>db/conf/ccs/asiaccs2009.html#StrasburgSBW09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/compsac/StrasburgSBW09" mdate="2023-03-24">
<author pid="89/6776">Chris Strasburg</author>
<author pid="34/2916">Natalia Stakhanova</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="w/JohnnySWong">Johnny S. Wong</author>
<title>A Framework for Cost Sensitive Assessment of Intrusion Response Selection.</title>
<pages>355-360</pages>
<year>2009</year>
<booktitle>COMPSAC (1)</booktitle>
<ee>https://doi.org/10.1109/COMPSAC.2009.54</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/COMPSAC.2009.54</ee>
<crossref>conf/compsac/2009</crossref>
<url>db/conf/compsac/compsac2009-1.html#StrasburgSBW09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/date/SinhaRBS09" mdate="2019-02-27">
<author pid="93/2143">Roopak Sinha</author>
<author pid="r/ParthaSRoop">Partha S. Roop</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="99/3221">Zoran Salcic</author>
<title>Multi-clock Soc design using protocol conversion.</title>
<pages>123-128</pages>
<year>2009</year>
<booktitle>DATE</booktitle>
<ee>https://doi.org/10.1109/DATE.2009.5090644</ee>
<ee>http://dl.acm.org/citation.cfm?id=1874650</ee>
<crossref>conf/date/2009</crossref>
<url>db/conf/date/date2009.html#SinhaRBS09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icfem/BasuGH09" mdate="2019-02-27">
<author pid="67/1905">Samik Basu 0001</author>
<author pid="67/3010">Arka P. Ghosh</author>
<author pid="47/7566">Ru He</author>
<title>Approximate Model Checking of PCTL Involving Unbounded Path Properties.</title>
<pages>326-346</pages>
<year>2009</year>
<booktitle>ICFEM</booktitle>
<ee>https://doi.org/10.1007/978-3-642-10373-5_17</ee>
<crossref>conf/icfem/2009</crossref>
<url>db/conf/icfem/icfem2009.html#BasuGH09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ictai/OsterB09" mdate="2024-10-06">
<author orcid="0009-0000-1847-1925" pid="29/7739">Zachary J. Oster</author>
<author pid="67/1905">Samik Basu 0001</author>
<title>Extending Substitutability in Composite Services by Allowing Asynchronous Communication with Message Buffers.</title>
<pages>572-575</pages>
<year>2009</year>
<booktitle>ICTAI</booktitle>
<ee>https://doi.org/10.1109/ICTAI.2009.107</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICTAI.2009.107</ee>
<crossref>conf/ictai/2009</crossref>
<url>db/conf/ictai/ictai2009.html#OsterB09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icws/MitraRB09" mdate="2023-03-24">
<author pid="77/2477">Saayan Mitra</author>
<author pid="12/2833-1">Ratnesh Kumar 0001</author>
<author pid="67/1905">Samik Basu 0001</author>
<title>A Framework for Optimal Decentralized Service-Choreography.</title>
<pages>493-500</pages>
<year>2009</year>
<booktitle>ICWS</booktitle>
<ee>https://doi.org/10.1109/ICWS.2009.71</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICWS.2009.71</ee>
<crossref>conf/icws/2009</crossref>
<url>db/conf/icws/icws2009.html#MitraRB09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/saint/WangWSB09" mdate="2023-03-23">
<author pid="64/5700">Xia Wang</author>
<author pid="w/JohnnySWong">Johnny S. Wong</author>
<author pid="42/7629">Fred Stanley</author>
<author pid="67/1905">Samik Basu 0001</author>
<title>Cross-Layer Based Anomaly Detection in Wireless Mesh Networks.</title>
<pages>9-15</pages>
<year>2009</year>
<booktitle>SAINT</booktitle>
<ee>https://doi.org/10.1109/SAINT.2009.11</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SAINT.2009.11</ee>
<crossref>conf/saint/2009</crossref>
<url>db/conf/saint/saint2009.html#WangWSB09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sigsoft/HannaBR09" mdate="2021-04-09">
<author pid="33/6671">Youssef Hanna</author>
<author pid="67/1905">Samik Basu 0001</author>
<author orcid="0000-0002-9410-9562" pid="r/HrideshRajan">Hridesh Rajan</author>
<title>Behavioral automata composition for automatic topology independent verification of parameterized systems.</title>
<pages>325-334</pages>
<year>2009</year>
<booktitle>ESEC/SIGSOFT FSE</booktitle>
<ee>https://doi.org/10.1145/1595696.1595758</ee>
<crossref>conf/sigsoft/2009</crossref>
<url>db/conf/sigsoft/fse2009.html#HannaBR09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/splc/SunLB09" mdate="2019-02-27">
<author pid="33/2079-1">Hongyu Sun 0001</author>
<author pid="49/3478">Robyn R. Lutz</author>
<author pid="67/1905">Samik Basu 0001</author>
<title>Product-line-based requirements customization for web service compositions.</title>
<pages>141-150</pages>
<year>2009</year>
<booktitle>SPLC</booktitle>
<ee>https://dl.acm.org/citation.cfm?id=1753255</ee>
<crossref>conf/splc/2009</crossref>
<url>db/conf/splc/splc2009.html#SunLB09</url>
</inproceedings>
</r>
<r><article key="journals/ejes/SinhaRB08" mdate="2020-03-13">
<author orcid="0000-0001-9486-7833" pid="93/2143">Roopak Sinha</author>
<author pid="r/ParthaSRoop">Partha S. Roop</author>
<author pid="67/1905">Samik Basu 0001</author>
<title>SoC Design Approach Using Convertibility Verification.</title>
<year>2008</year>
<volume>2008</volume>
<journal>EURASIP J. Embed. Syst.</journal>
<ee type="oa">https://doi.org/10.1155/2008/296206</ee>
<ee>https://www.wikidata.org/entity/Q59215959</ee>
<url>db/journals/ejes/ejes2008.html#SinhaRB08</url>
</article>
</r>
<r><article key="journals/ijait/PathakBLH08" mdate="2020-12-29">
<author pid="52/1723">Jyotishman Pathak</author>
<author pid="67/1905">Samik Basu 0001</author>
<author orcid="0000-0001-5390-7982" pid="49/3478">Robyn R. Lutz</author>
<author orcid="0000-0001-5399-3489" pid="h/VasantHonavar">Vasant G. Honavar</author>
<title>MOSCOE: an Approach for Composing Web Services through Iterative Reformulation of Functional Specifications.</title>
<pages>109-138</pages>
<year>2008</year>
<volume>17</volume>
<journal>Int. J. Artif. Intell. Tools</journal>
<number>1</number>
<ee>https://doi.org/10.1142/S0218213008003807</ee>
<ee>https://www.wikidata.org/entity/Q56675405</ee>
<url>db/journals/ijait/ijait17.html#PathakBLH08</url>
</article>
</r>
<r><inproceedings key="conf/IEEEscc/PathakBH08" mdate="2023-03-24">
<author pid="52/1723">Jyotishman Pathak</author>
<author pid="67/1905">Samik Basu 0001</author>
<author orcid="0000-0001-5399-3489" pid="h/VasantHonavar">Vasant G. Honavar</author>
<title>Composing Web Services through Automatic Reformulation of Service Specifications.</title>
<pages>361-369</pages>
<year>2008</year>
<booktitle>IEEE SCC (1)</booktitle>
<ee>https://doi.org/10.1109/SCC.2008.124</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SCC.2008.124</ee>
<ee>https://www.wikidata.org/entity/Q57015231</ee>
<crossref>conf/IEEEscc/2008</crossref>
<url>db/conf/IEEEscc/scc2008.html#PathakBH08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/IEEEscc/MitraKB08" mdate="2023-03-24">
<author pid="77/2477">Saayan Mitra</author>
<author pid="12/2833-1">Ratnesh Kumar 0001</author>
<author pid="67/1905">Samik Basu 0001</author>
<title>Optimum Decentralized Choreography for Web Services Composition.</title>
<pages>395-402</pages>
<year>2008</year>
<booktitle>IEEE SCC (2)</booktitle>
<ee>https://doi.org/10.1109/SCC.2008.82</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SCC.2008.82</ee>
<crossref>conf/IEEEscc/2008</crossref>
<url>db/conf/IEEEscc/scc2008.html#MitraKB08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icsoc/SanthanamBH08" mdate="2024-05-07">
<author orcid="0000-0003-4319-5103" pid="44/6515">Ganesh Ram Santhanam</author>
<author pid="67/1905">Samik Basu 0001</author>
<author orcid="0000-0001-5399-3489" pid="h/VasantHonavar">Vasant G. Honavar</author>
<title>TCP-Compose* - A TCP-Net Based Algorithm for Efficient Composition of Web Services Using Qualitative Preferences.</title>
<pages>453-467</pages>
<year>2008</year>
<booktitle>ICSOC</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-540-89652-4_34</ee>
<crossref>conf/icsoc/2008</crossref>
<url>db/conf/icsoc/icsoc2008.html#SanthanamBH08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/raid/StakhanovaSBW08" mdate="2019-02-27">
<author pid="34/2916">Natalia Stakhanova</author>
<author pid="89/6776">Chris Strasburg</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="w/JohnnySWong">Johnny S. Wong</author>
<title>On Evaluation of Response Cost for Intrusion Response Systems.</title>
<pages>390-391</pages>
<year>2008</year>
<booktitle>RAID</booktitle>
<ee>https://doi.org/10.1007/978-3-540-87403-4_21</ee>
<crossref>conf/raid/2008</crossref>
<url>db/conf/raid/raid2008.html#StakhanovaSBW08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/services/SanthanamBH08" mdate="2023-03-24">
<author orcid="0000-0003-4319-5103" pid="44/6515">Ganesh Ram Santhanam</author>
<author pid="67/1905">Samik Basu 0001</author>
<author orcid="0000-0001-5399-3489" pid="h/VasantHonavar">Vasant G. Honavar</author>
<title>On Utilizing Qualitative Preferences in Web Service Composition: A CP-net Based Approach.</title>
<pages>538-544</pages>
<year>2008</year>
<booktitle>SERVICES I</booktitle>
<ee>https://doi.org/10.1109/SERVICES-1.2008.15</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SERVICES-1.2008.15</ee>
<ee>https://www.wikidata.org/entity/Q57015242</ee>
<crossref>conf/services/2008-1</crossref>
<url>db/conf/services/services2008-1.html#SanthanamBH08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vlsid/SinhaRB08" mdate="2023-03-24">
<author orcid="0000-0001-9486-7833" pid="93/2143">Roopak Sinha</author>
<author pid="r/ParthaSRoop">Partha S. Roop</author>
<author pid="67/1905">Samik Basu 0001</author>
<title>A Module Checking Based Converter Synthesis Approach for SoCs.</title>
<pages>492-501</pages>
<year>2008</year>
<booktitle>VLSI Design</booktitle>
<ee>https://doi.org/10.1109/VLSI.2008.109</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/VLSI.2008.109</ee>
<crossref>conf/vlsid/2008</crossref>
<url>db/conf/vlsid/vlsid2008.html#SinhaRB08</url>
</inproceedings>
</r>
<r><article key="journals/ijics/StakhanovaBW07" mdate="2025-02-11">
<author pid="34/2916">Natalia Stakhanova</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="w/JohnnySWong">Johnny Wong 0001</author>
<title>A taxonomy of intrusion response systems.</title>
<pages>169-184</pages>
<year>2007</year>
<volume>1</volume>
<journal>Int. J. Inf. Comput. Secur.</journal>
<number>1/2</number>
<ee>https://doi.org/10.1504/IJICS.2007.012248</ee>
<ee>https://www.wikidata.org/entity/Q114964544</ee>
<url>db/journals/ijics/ijics1.html#StakhanovaBW07</url>
</article>
</r>
<r><article key="journals/tosem/BasuS07" mdate="2019-02-27">
<author pid="67/1905">Samik Basu 0001</author>
<author pid="s/ScottASmolka">Scott A. Smolka</author>
<title>Model checking the Java metalocking algorithm.</title>
<year>2007</year>
<volume>16</volume>
<journal>ACM Trans. Softw. Eng. Methodol.</journal>
<number>3</number>
<ee>https://doi.org/10.1145/1243987.1243990</ee>
<url>db/journals/tosem/tosem16.html#BasuS07</url>
<pages>12</pages>
</article>
</r>
<r><inproceedings key="conf/aina/StakhanovaBZWW07" mdate="2025-02-11">
<author pid="34/2916">Natalia Stakhanova</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="94/6627-1">Wensheng Zhang 0001</author>
<author pid="64/5700">Xia Wang</author>
<author pid="w/JohnnySWong">Johnny Wong 0001</author>
<title>Specification Synthesis for Monitoring and Analysis of MANET Protocols.</title>
<pages>183-187</pages>
<year>2007</year>
<crossref>conf/aina/2007w1</crossref>
<booktitle>AINA Workshops (1)</booktitle>
<ee>https://doi.org/10.1109/AINAW.2007.342</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/AINAW.2007.342</ee>
<url>db/conf/aina/ainaw2007-1.html#StakhanovaBZWW07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/aina/StakhanovaBW07" mdate="2025-02-11">
<author pid="34/2916">Natalia Stakhanova</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="w/JohnnySWong">Johnny Wong 0001</author>
<title>A Cost-Sensitive Model for Preemptive Intrusion Response Systems.</title>
<pages>428-435</pages>
<year>2007</year>
<crossref>conf/aina/2007</crossref>
<booktitle>AINA</booktitle>
<ee>https://doi.org/10.1109/AINA.2007.9</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/AINA.2007.9</ee>
<url>db/conf/aina/aina2007.html#StakhanovaBW07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cdc/BasuK07" mdate="2019-02-27">
<author pid="67/1905">Samik Basu 0001</author>
<author pid="12/2833-1">Ratnesh Kumar 0001</author>
<title>Quotient-based control synthesis for partially observed non-deterministic plants with mu-calculus specifications.</title>
<pages>5294-5299</pages>
<year>2007</year>
<booktitle>CDC</booktitle>
<ee>https://doi.org/10.1109/CDC.2007.4434955</ee>
<crossref>conf/cdc/2007</crossref>
<url>db/conf/cdc/cdc2007.html#BasuK07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icws/PathakBH07" mdate="2023-03-24">
<author pid="52/1723">Jyotishman Pathak</author>
<author pid="67/1905">Samik Basu 0001</author>
<author orcid="0000-0001-5399-3489" pid="h/VasantHonavar">Vasant G. Honavar</author>
<title>On Context-Specific Substitutability of Web Services.</title>
<pages>192-199</pages>
<year>2007</year>
<crossref>conf/icws/2007</crossref>
<booktitle>ICWS</booktitle>
<ee>https://doi.org/10.1109/ICWS.2007.134</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICWS.2007.134</ee>
<ee>https://www.wikidata.org/entity/Q57015268</ee>
<url>db/conf/icws/icws2007.html#PathakBH07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icws/MitraKB07" mdate="2023-03-24">
<author pid="77/2477">Saayan Mitra</author>
<author pid="12/2833-1">Ratnesh Kumar 0001</author>
<author pid="67/1905">Samik Basu 0001</author>
<title>Automated Choreographer Synthesis for Web Services Composition Using I/O Automata.</title>
<pages>364-371</pages>
<year>2007</year>
<crossref>conf/icws/2007</crossref>
<booktitle>ICWS</booktitle>
<ee>https://doi.org/10.1109/ICWS.2007.47</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICWS.2007.47</ee>
<url>db/conf/icws/icws2007.html#MitraKB07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/seke/VasileB07" mdate="2019-02-27">
<author pid="64/4087">Flavian Vasile</author>
<author pid="67/1905">Samik Basu 0001</author>
<title>Cost-based Analysis of Multiple Counter-Examples.</title>
<pages>33-38</pages>
<year>2007</year>
<crossref>conf/seke/2007</crossref>
<booktitle>SEKE</booktitle>
<url>db/conf/seke/seke2007.html#VasileB07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/webi/MitraBK07" mdate="2023-03-24">
<author pid="77/2477">Saayan Mitra</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="12/2833-1">Ratnesh Kumar 0001</author>
<title>Local and On-the-fly Choreography-based Web Service Composition.</title>
<pages>521-527</pages>
<year>2007</year>
<crossref>conf/webi/2007</crossref>
<booktitle>Web Intelligence</booktitle>
<ee>https://doi.org/10.1109/WI.2007.100</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/WI.2007.100</ee>
<url>db/conf/webi/webi2007.html#MitraBK07</url>
</inproceedings>
</r>
<r><inproceedings key="journals/entcs/SinhaRB08" mdate="2026-01-02">
<author orcid="0000-0001-9486-7833" pid="93/2143">Roopak Sinha</author>
<author pid="r/ParthaSRoop">Partha S. Roop</author>
<author pid="67/1905">Samik Basu 0001</author>
<title>A Model Checking Approach to Protocol Conversion.</title>
<pages>81-94</pages>
<year>2007</year>
<crossref>conf/slap/2007</crossref>
<booktitle>SLA++P</booktitle>
<ee type="oa">https://doi.org/10.1016/j.entcs.2008.05.012</ee>
<url>db/conf/slap/slap2007.html#SinhaRB08</url>
</inproceedings>
</r>
<r><incollection key="series/faia/PathakBH07" mdate="2025-03-31">
<author pid="52/1723">Jyotishman Pathak</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="h/VasantHonavar">Vasant G. Honavar</author>
<title>Assembling Composite Web Services from Autonomous Components.</title>
<pages>394-405</pages>
<year>2007</year>
<booktitle>Emerging Artificial Intelligence Applications in Computer Engineering</booktitle>
<crossref>series/faia/2007-160</crossref>
<url>db/series/faia/faia160.html#PathakBH07</url>
<ee>https://ebooks.iospress.nl/volumearticle/3694</ee>
</incollection>
</r>
<r><article key="journals/tcs/BasuR06" mdate="2023-04-03">
<author pid="67/1905">Samik Basu 0001</author>
<author pid="r/CRRamakrishnan">C. R. Ramakrishnan 0001</author>
<title>Compositional analysis for verification of parameterized systems.</title>
<pages>211-229</pages>
<year>2006</year>
<volume>354</volume>
<journal>Theor. Comput. Sci.</journal>
<number>2</number>
<ee type="oa">https://doi.org/10.1016/j.tcs.2005.11.016</ee>
<url>db/journals/tcs/tcs354.html#BasuR06</url>
</article>
</r>
<r><inproceedings key="conf/amcc/0001Z006" mdate="2022-09-27">
<author pid="12/2833-1">Ratnesh Kumar 0001</author>
<author pid="94/569">Changyan Zhou</author>
<author pid="67/1905">Samik Basu 0001</author>
<title>Finite bisimulation of reactive untimed infinite state systems modeled as automata with variables.</title>
<pages>1-6</pages>
<year>2006</year>
<booktitle>ACC</booktitle>
<ee>https://doi.org/10.1109/ACC.2006.1657692</ee>
<crossref>conf/amcc/2006</crossref>
<url>db/conf/amcc/acc2006.html#0001Z006</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cdc/0001006a" mdate="2020-07-08">
<author pid="67/1905">Samik Basu 0001</author>
<author pid="12/2833-1">Ratnesh Kumar 0001</author>
<title>Quotient-based Control Synthesis for Non-Deterministic Plants with Mu-Calculus Specifications.</title>
<pages>6041-6046</pages>
<year>2006</year>
<booktitle>CDC</booktitle>
<ee>https://doi.org/10.1109/CDC.2006.376737</ee>
<crossref>conf/cdc/2006</crossref>
<url>db/conf/cdc/cdc2006.html#0001006a</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dasc/StakhanovaBLW06" mdate="2025-02-11">
<author pid="34/2916">Natalia Stakhanova</author>
<author pid="67/1905">Samik Basu 0001</author>
<author orcid="0000-0001-5390-7982" pid="49/3478">Robyn R. Lutz</author>
<author pid="w/JohnnySWong">Johnny Wong 0001</author>
<title>Automated Caching of Behavioral Patterns for Efficient Run-Time Monitoring.</title>
<pages>333-340</pages>
<year>2006</year>
<crossref>conf/dasc/2006</crossref>
<booktitle>DASC</booktitle>
<ee>https://doi.org/10.1109/DASC.2006.23</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/DASC.2006.23</ee>
<url>db/conf/dasc/dasc2006.html#StakhanovaBLW06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ecows/PathakBLH06" mdate="2023-03-23">
<author pid="52/1723">Jyotishman Pathak</author>
<author pid="67/1905">Samik Basu 0001</author>
<author orcid="0000-0001-5390-7982" pid="49/3478">Robyn R. Lutz</author>
<author pid="h/VasantHonavar">Vasant G. Honavar</author>
<title>Parallel Web Service Composition in MoSCoE: A Choreography-Based Approach.</title>
<pages>3-12</pages>
<year>2006</year>
<crossref>conf/ecows/2006</crossref>
<booktitle>ECOWS</booktitle>
<ee>https://doi.org/10.1109/ECOWS.2006.30</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ECOWS.2006.30</ee>
<url>db/conf/ecows/ecows2006.html#PathakBLH06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icde/PathakBLH06" mdate="2023-03-24">
<author pid="52/1723">Jyotishman Pathak</author>
<author pid="67/1905">Samik Basu 0001</author>
<author orcid="0000-0001-5390-7982" pid="49/3478">Robyn R. Lutz</author>
<author orcid="0000-0001-5399-3489" pid="h/VasantHonavar">Vasant G. Honavar</author>
<title>MoSCoE: A Framework for Modeling Web Service Composition and Execution.</title>
<pages>143</pages>
<year>2006</year>
<crossref>conf/icde/2006w</crossref>
<booktitle>ICDE Workshops</booktitle>
<ee>https://doi.org/10.1109/ICDEW.2006.96</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICDEW.2006.96</ee>
<url>db/conf/icde/icdew2006.html#PathakBLH06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icsoc/PathakBH06" mdate="2019-02-27">
<author pid="52/1723">Jyotishman Pathak</author>
<author pid="67/1905">Samik Basu 0001</author>
<author orcid="0000-0001-5399-3489" pid="h/VasantHonavar">Vasant G. Honavar</author>
<title>Modeling Web Services by Iterative Reformulation of Functional and Non-functional Requirements.</title>
<pages>314-326</pages>
<year>2006</year>
<crossref>conf/icsoc/2006</crossref>
<booktitle>ICSOC</booktitle>
<ee type="oa">https://doi.org/10.1007/11948148_26</ee>
<ee>https://www.wikidata.org/entity/Q57015280</ee>
<url>db/conf/icsoc/icsoc2006.html#PathakBH06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ictai/PathakBLH06" mdate="2023-03-24">
<author pid="52/1723">Jyotishman Pathak</author>
<author pid="67/1905">Samik Basu 0001</author>
<author orcid="0000-0001-5390-7982" pid="49/3478">Robyn R. Lutz</author>
<author orcid="0000-0001-5399-3489" pid="h/VasantHonavar">Vasant G. Honavar</author>
<title>Selecting and Composing Web Services through Iterative Reformulation of Functional Specifications.</title>
<pages>445-454</pages>
<year>2006</year>
<crossref>conf/ictai/2006</crossref>
<booktitle>ICTAI</booktitle>
<ee>https://doi.org/10.1109/ICTAI.2006.102</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICTAI.2006.102</ee>
<ee>https://www.wikidata.org/entity/Q57015282</ee>
<url>db/conf/ictai/ictai2006.html#PathakBLH06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ipps/MinerB06" mdate="2023-03-24">
<author pid="39/179">Andrew S. Miner</author>
<author pid="67/1905">Samik Basu 0001</author>
<title>Verification of software via integration of design and implementation.</title>
<year>2006</year>
<crossref>conf/ipps/2006</crossref>
<booktitle>IPDPS</booktitle>
<ee>https://doi.org/10.1109/IPDPS.2006.1639581</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/IPDPS.2006.1639581</ee>
<url>db/conf/ipps/ipdps2006.html#MinerB06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/tacas/YangBR06" mdate="2023-04-03">
<author pid="86/2711-2">Ping Yang 0002</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="r/CRRamakrishnan">C. R. Ramakrishnan 0001</author>
<title>Parameterized Verification of pi-Calculus Systems.</title>
<pages>42-57</pages>
<year>2006</year>
<crossref>conf/tacas/2006</crossref>
<booktitle>TACAS</booktitle>
<ee type="oa">https://doi.org/10.1007/11691372_3</ee>
<url>db/conf/tacas/tacas2006.html#YangBR06</url>
</inproceedings>
</r>
<r><inproceedings key="journals/entcs/BasuRS07" mdate="2023-01-31">
<author pid="67/1905">Samik Basu 0001</author>
<author pid="r/ParthaSRoop">Partha S. Roop</author>
<author orcid="0000-0001-9486-7833" pid="93/2143">Roopak Sinha</author>
<title>Local Module Checking for CTL Specifications.</title>
<pages>125-141</pages>
<year>2006</year>
<crossref>conf/fesca/2006</crossref>
<booktitle>FESCA@ETAPS</booktitle>
<ee type="oa">https://doi.org/10.1016/j.entcs.2006.02.035</ee>
<url>db/conf/fesca/fesca2006.html#BasuRS07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icdcsw/StakhanovaBWS05" mdate="2025-02-11">
<author pid="34/2916">Natalia Stakhanova</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="w/JohnnySWong">Johnny Wong 0001</author>
<author pid="91/3908">Oleg Stakhanov</author>
<title>Trust Framework for P2P Networks Using Peer-Profile Based Anomaly Technique.</title>
<pages>203-209</pages>
<year>2005</year>
<crossref>conf/icdcsw/2005</crossref>
<booktitle>ICDCS Workshops</booktitle>
<ee>https://doi.org/10.1109/ICDCSW.2005.137</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICDCSW.2005.137</ee>
<url>db/conf/icdcsw/icdcsw2005.html#StakhanovaBWS05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/tacas/KellerSBS05" mdate="2019-02-27">
<author pid="27/2155">Curtis W. Keller</author>
<author pid="54/4272">Diptikalyan Saha</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="s/ScottASmolka">Scott A. Smolka</author>
<title>FocusCheck: A Tool for Model Checking and Debugging Sequential C Programs.</title>
<pages>563-569</pages>
<ee type="oa">https://doi.org/10.1007/978-3-540-31980-1_39</ee>
<year>2005</year>
<crossref>conf/tacas/2005</crossref>
<booktitle>TACAS</booktitle>
<url>db/conf/tacas/tacas2005.html#KellerSBS05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/forte/BasuSS04" mdate="2019-02-27">
<author pid="67/1905">Samik Basu 0001</author>
<author pid="54/4272">Diptikalyan Saha</author>
<author pid="s/ScottASmolka">Scott A. Smolka</author>
<title>Localizing Program Errors for Cimple Debugging.</title>
<pages>79-96</pages>
<ee>https://doi.org/10.1007/978-3-540-30232-2_6</ee>
<year>2004</year>
<crossref>conf/forte/2004</crossref>
<booktitle>FORTE</booktitle>
<url>db/conf/forte/forte2004.html#BasuSS04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icdcit/BasuU04" mdate="2019-02-27">
<author pid="67/1905">Samik Basu 0001</author>
<author pid="88/8152">Prem Uppuluri</author>
<title>Proxy-Annotated Control Flow Graphs: Deterministic Context-Sensitive Monitoring for Intrusion Detection.</title>
<pages>353-362</pages>
<ee>https://doi.org/10.1007/978-3-540-30555-2_41</ee>
<year>2004</year>
<crossref>conf/icdcit/2004</crossref>
<booktitle>ICDCIT</booktitle>
<url>db/conf/icdcit/icdcit2004.html#BasuU04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icppw/UppuluriB04" mdate="2023-03-24">
<author pid="88/8152">Prem Uppuluri</author>
<author pid="67/1905">Samik Basu 0001</author>
<title>LASE: Layered Approach for Sensor Security and Efficiency.</title>
<pages>346-353</pages>
<year>2004</year>
<crossref>conf/icppw/2004</crossref>
<booktitle>ICPP Workshops</booktitle>
<ee>https://doi.org/10.1109/ICPPW.2004.1328038</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICPPW.2004.1328038</ee>
<url>db/conf/icppw/icppw2004.html#UppuluriB04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/forte/BasuSLS03" mdate="2019-02-27">
<author pid="67/1905">Samik Basu 0001</author>
<author pid="54/4272">Diptikalyan Saha</author>
<author pid="98/3240">Yow-Jian Lin</author>
<author pid="s/ScottASmolka">Scott A. Smolka</author>
<title>Generation of All Counter-Examples for Push-Down Systems.</title>
<pages>79-94</pages>
<ee>https://doi.org/10.1007/978-3-540-39979-7_6</ee>
<year>2003</year>
<crossref>conf/forte/2003</crossref>
<booktitle>FORTE</booktitle>
<url>db/conf/forte/forte2003.html#BasuSLS03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sosp/SekarVBBD03" mdate="2020-11-19">
<author pid="90/1136-1">R. Sekar 0001</author>
<author pid="90/5014">V. N. Venkatakrishnan</author>
<author pid="67/1905">Samik Basu 0001</author>
<author pid="24/2511">Sandeep Bhatkar</author>
<author pid="70/3998">Daniel C. DuVarney</author>
<title>Model-carrying code: a practical approach for safe execution of untrusted applications.</title>
<pages>15-28</pages>
<year>2003</year>
<crossref>conf/sosp/2003</crossref>
<booktitle>SOSP</booktitle>
<ee>https://doi.org/10.1145/945445.945448</ee>
<url>db/conf/sosp/sosp2003.html#SekarVBBD03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/tacas/BasuR03" mdate="2023-04-03">
<author pid="67/1905">Samik Basu 0001</author>
<author pid="r/CRRamakrishnan">C. R. Ramakrishnan 0001</author>
<title>Compositional Analysis for Verification of Parameterized Systems.</title>
<pages>315-330</pages>
<year>2003</year>
<crossref>conf/tacas/2003</crossref>
<booktitle>TACAS</booktitle>
<ee>https://doi.org/10.1007/3-540-36577-X_23</ee>
<url>db/conf/tacas/tacas2003.html#BasuR03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/tacas/BasuKPR02" mdate="2023-04-03">
<author pid="67/1905">Samik Basu 0001</author>
<author pid="54/203">K. Narayan Kumar</author>
<author pid="01/2002">L. Robert Pokorny</author>
<author pid="r/CRRamakrishnan">C. R. Ramakrishnan 0001</author>
<title>Resource-Constrained Model Checking of Recursive Programs.</title>
<pages>236-250</pages>
<year>2002</year>
<crossref>conf/tacas/2002</crossref>
<booktitle>TACAS</booktitle>
<ee>https://doi.org/10.1007/3-540-46002-0_17</ee>
<url>db/conf/tacas/tacas2002.html#BasuKPR02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iclp/BasuMRRV01" mdate="2023-04-03">
<author pid="67/1905">Samik Basu 0001</author>
<author pid="53/2323">Madhavan Mukund</author>
<author pid="r/CRRamakrishnan">C. R. Ramakrishnan 0001</author>
<author pid="r/IVRamakrishnan">I. V. Ramakrishnan</author>
<author orcid="0000-0002-7466-7823" pid="v/RakeshMVerma">Rakesh M. Verma</author>
<title>Local and Symbolic Bisimulation Using Tabled Constraint Logic Programming.</title>
<pages>166-180</pages>
<year>2001</year>
<crossref>conf/iclp/2001</crossref>
<booktitle>ICLP</booktitle>
<ee>https://doi.org/10.1007/3-540-45635-X_19</ee>
<url>db/conf/iclp/iclp2001.html#BasuMRRV01</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ecbs/BasuSW00" mdate="2023-03-23">
<author pid="67/1905">Samik Basu 0001</author>
<author pid="s/ScottASmolka">Scott A. Smolka</author>
<author pid="80/3787">Orson R. Ward</author>
<title>Model Checking the Java Meta-Locking Algorithm.</title>
<pages>342-350</pages>
<year>2000</year>
<crossref>conf/ecbs/2000</crossref>
<booktitle>ECBS</booktitle>
<ee>https://doi.org/10.1109/ECBS.2000.839894</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ECBS.2000.839894</ee>
<url>db/conf/ecbs/ecbs2000.html#BasuSW00</url>
</inproceedings>
</r>
<coauthors n="86" nc="4">
<co c="0"><na f="a/Ali:Syed_Adeel" pid="57/10837">Syed Adeel Ali</na></co>
<co c="0"><na f="b/Bhardwaj:Preeti" pid="295/8340">Preeti Bhardwaj</na></co>
<co c="0"><na f="b/Bhatkar:Sandeep" pid="24/2511">Sandeep Bhatkar</na></co>
<co c="0"><na f="b/Bhatt:Rishabh_Rajendra" pid="311/1523">Rishabh Rajendra Bhatt</na></co>
<co c="1"><na f="b/Bultan:Tevfik" pid="07/3368">Tevfik Bultan</na></co>
<co c="0"><na f="c/Chang:Le" pid="21/2841">Le Chang</na></co>
<co c="0"><na f="c/Ciardo:Gianfranco" pid="c/GianfrancoCiardo">Gianfranco Ciardo</na></co>
<co c="0"><na f="c/Cleaveland:Rance" pid="c/RCleaveland">Rance Cleaveland</na></co>
<co c="0"><na f="d/Dorius:Shawn_F=" pid="277/5020">Shawn F. Dorius</na></co>
<co c="0"><na f="d/Dorman:Karin_S=" pid="97/3553">Karin S. Dorman</na></co>
<co c="0"><na f="d/DuVarney:Daniel_C=" pid="70/3998">Daniel C. DuVarney</na></co>
<co c="1"><na f="f/Fu_0001:Xiang" pid="97/374-1">Xiang Fu 0001</na></co>
<co c="0"><na f="f/Fu:Xiaoyun" pid="277/5099">Xiaoyun Fu</na></co>
<co c="2"><na f="g/Ghosh:Arka_P=" pid="67/3010">Arka P. Ghosh</na></co>
<co c="0"><na f="g/Gunasekharan:Maheedhar" pid="215/2411">Maheedhar Gunasekharan</na></co>
<co c="0"><na f="h/Hanna:Youssef" pid="33/6671">Youssef Hanna</na></co>
<co c="-1"><na f="h/Hanumanthaiah:Karthik" pid="382/1415">Karthik Hanumanthaiah</na></co>
<co c="2"><na f="h/He:Ru" pid="47/7566">Ru He</na></co>
<co c="0"><na f="h/Honavar:Vasant_G=" pid="h/VasantHonavar">Vasant G. Honavar</na></co>
<co c="0"><na f="i/Islam:Md_Rayhanul" pid="404/1026">Md Rayhanul Islam</na></co>
<co c="2"><na f="j/Jennings:Paul" pid="43/7223">Paul Jennings</na></co>
<co c="0"><na f="j/Johannsen:Christopher" pid="412/3153">Christopher Johannsen</na></co>
<co c="0"><na f="k/Keller:Curtis_W=" pid="27/2155">Curtis W. Keller</na></co>
<co c="0"><na f="k/Krishnan:Sandeep" pid="11/8542">Sandeep Krishnan</na></co>
<co c="0"><na f="k/Kumar:K=_Narayan" pid="54/203">K. Narayan Kumar</na></co>
<co c="0"><na f="k/Kumar:Raj_Gaurav" pid="277/5296">Raj Gaurav Kumar</na></co>
<co c="3"><na f="k/Kumar_0001:Ratnesh" pid="12/2833-1">Ratnesh Kumar 0001</na></co>
<co c="0"><na f="l/Li_0002:Liyi" pid="142/1135-2">Liyi Li 0002</na></co>
<co c="0"><na f="l/Lin:Yow=Jian" pid="98/3240">Yow-Jian Lin</na></co>
<co c="0"><na f="l/Liu:Jing" pid="72/2590">Jing Liu</na></co>
<co c="0"><na f="l/Lutz:Robyn_R=" pid="49/3478">Robyn R. Lutz</na></co>
<co c="0"><na f="m/Miner:Andrew_S=" pid="39/179">Andrew S. Miner</na></co>
<co c="3"><na f="m/Mitra:Saayan" pid="77/2477">Saayan Mitra</na></co>
<co c="0"><na f="m/Mukund:Madhavan" pid="53/2323">Madhavan Mukund</na></co>
<co c="0"><na f="n/Nadew:Yididiya_Y=" pid="339/0727">Yididiya Y. Nadew</na></co>
<co c="0"><na f="n/Nadkarni:Dinanath" pid="07/9359">Dinanath Nadkarni</na></co>
<co c="0"><na f="n/Nie:Guanyu" pid="331/1658">Guanyu Nie</na></co>
<co c="0"><na f="o/Oster:Zachary_J=" pid="29/7739">Zachary J. Oster</na></co>
<co c="1"><na f="o/Ouederni:Meriem" pid="14/7056">Meriem Ouederni</na></co>
<co c="0" n="2"><na f="p/Padmanabhan:Madhavan_R=" pid="234/2687">Madhavan R. Padmanabhan</na><na>Madhavan Rajagopal Padmanabhan</na></co>
<co c="0"><na f="p/Pathak:Jyotishman" pid="52/1723">Jyotishman Pathak</na></co>
<co c="1"><na f="p/Pautasso:Cesare" pid="p/CesarePautasso">Cesare Pautasso</na></co>
<co c="0" n="2"><na f="p/Pavan:Aduri" pid="88/1807">Aduri Pavan</na><na>A. Pavan 0001</na></co>
<co c="0"><na f="p/Pokorny:L=_Robert" pid="01/2002">L. Robert Pokorny</na></co>
<co c="0" n="2"><na f="q/Quinn:Christopher_J=" pid="50/8822">Christopher J. Quinn</na><na>Christopher John Quinn</na></co>
<co c="0"><na f="r/Rajan:Hridesh" pid="r/HrideshRajan">Hridesh Rajan</na></co>
<co c="0"><na f="r/Ramakrishnan_0001:C=_R=" pid="r/CRRamakrishnan">C. R. Ramakrishnan 0001</na></co>
<co c="0"><na f="r/Ramakrishnan:I=_V=" pid="r/IVRamakrishnan">I. V. Ramakrishnan</na></co>
<co c="0"><na f="r/Rauer:Erik" pid="396/0149">Erik Rauer</na></co>
<co c="0"><na f="r/Roop:Partha_S=" pid="r/ParthaSRoop">Partha S. Roop</na></co>
<co c="0"><na f="r/Ruse:Michelle" pid="39/10038">Michelle Ruse</na></co>
<co c="0"><na f="s/Saha:Diptikalyan" pid="54/4272">Diptikalyan Saha</na></co>
<co c="0" n="2"><na f="s/Salcic:Zoran_A=" pid="99/3221">Zoran A. Salcic</na><na>Zoran Salcic</na></co>
<co c="0"><na f="s/Samuelson:David" pid="34/8724">David Samuelson</na></co>
<co c="0"><na f="s/Santhanam:Ganesh_Ram" pid="44/6515">Ganesh Ram Santhanam</na></co>
<co c="0"><na f="s/Sarkar:Tanmoy" pid="62/7962">Tanmoy Sarkar</na></co>
<co c="0"><na f="s/Sekar_0001:R=" pid="90/1136-1">R. Sekar 0001</na></co>
<co c="0"><na f="s/Sinha:Roopak" pid="93/2143">Roopak Sinha</na></co>
<co c="0"><na f="s/Sivaprakasam:Gopalakrishnan" pid="167/9828">Gopalakrishnan Sivaprakasam</na></co>
<co c="0"><na f="s/Slutzki:Giora" pid="85/7008">Giora Slutzki</na></co>
<co c="0"><na f="s/Smolka:Scott_A=" pid="s/ScottASmolka">Scott A. Smolka</na></co>
<co c="0"><na f="s/Somisetty:Naresh" pid="234/3064">Naresh Somisetty</na></co>
<co c="0"><na f="s/Stakhanov:Oleg" pid="91/3908">Oleg Stakhanov</na></co>
<co c="0"><na f="s/Stakhanova:Natalia" pid="34/2916">Natalia Stakhanova</na></co>
<co c="0"><na f="s/Stanley:Fred" pid="42/7629">Fred Stanley</na></co>
<co c="0"><na f="s/Strasburg:Chris" pid="89/6776">Chris Strasburg</na></co>
<co c="0"><na f="s/Sun_0001:Hongyu" pid="33/2079-1">Hongyu Sun 0001</na></co>
<co c="0"><na f="s/Suvorov:Yuly" pid="80/9922">Yuly Suvorov</na></co>
<co c="0"><na f="s/Svecs:Igors" pid="15/10921">Igors Svecs</na></co>
<co c="0"><na f="t/Tao_0001:Jia" pid="25/6764-1">Jia Tao 0001</na></co>
<co c="0" n="2"><na f="u/Uppuluri:Premchand" pid="88/8152">Premchand Uppuluri</na><na>Prem Uppuluri</na></co>
<co c="0"><na f="v/Vasile:Flavian" pid="64/4087">Flavian Vasile</na></co>
<co c="0"><na f="v/Venkatakrishnan:V=_N=" pid="90/5014">V. N. Venkatakrishnan</na></co>
<co c="0"><na f="v/Verma:Rakesh_M=" pid="v/RakeshMVerma">Rakesh M. Verma</na></co>
<co c="0"><na f="w/Wang:Xia" pid="64/5700">Xia Wang</na></co>
<co c="0"><na f="w/Ward:Orson_R=" pid="80/3787">Orson R. Ward</na></co>
<co c="0" n="2"><na f="w/Wong:Johnny_S=" pid="w/JohnnySWong">Johnny S. Wong</na><na>Johnny Wong 0001</na></co>
<co c="0"><na f="w/Wongpiromsarn:Tichakorn" pid="55/1852">Tichakorn Wongpiromsarn</na></co>
<co c="2"><na f="w/Wu:Huaiqing" pid="47/7173">Huaiqing Wu</na></co>
<co c="0"><na f="y/Yang_0002:Ping" pid="86/2711-2">Ping Yang 0002</na></co>
<co c="0"><na f="y/Yavvari:Saitej" pid="383/9149">Saitej Yavvari</na></co>
<co c="0"><na f="z/Zaman:Eshita" pid="321/5933">Eshita Zaman</na></co>
<co c="1"><na f="z/Zhang_0019:Liang" pid="50/6759-19">Liang Zhang 0019</na></co>
<co c="0"><na f="z/Zhang_0001:Wensheng" pid="94/6627-1">Wensheng Zhang 0001</na></co>
<co c="3"><na f="z/Zhou:Changyan" pid="94/569">Changyan Zhou</na></co>
<co c="0"><na f="z/Zhu:Yanhui" pid="12/6541">Yanhui Zhu</na></co>
</coauthors>
</dblpperson>

