dblp.uni-trier.dewww.uni-trier.de

Arun Lakhotia

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
41 Kemal Efe, Alp V. Asutay, Arun Lakhotia: A User Interface for Exploiting Web Communities in Searching the Web. WEBIST (2) 2008: 114-121
40EEAndrew Walenstein, Rachit Mathur, Mohamed R. Chouchane, Arun Lakhotia: Constructing malware normalizers using term rewriting. Journal in Computer Virology 4(4): 307-322 (2008)
2006
39EEAndrew Walenstein, Arun Lakhotia: The Software Similarity Problem in Malware Analysis. Duplication, Redundancy, and Similarity in Software 2006
38EEMd. Enamul Karim, Laxmi Parida, Arun Lakhotia: Using Permutation Patterns for Content-Based Phylogeny. PRIB 2006: 115-125
37EEAndrew Walenstein, Rachit Mathur, Mohamed R. Chouchane, Arun Lakhotia: Normalizing Metamorphic Malware Using Term Rewriting. SCAM 2006: 75-84
36EEMohamed R. Chouchane, Arun Lakhotia: Using engine signature to detect metamorphic malware. WORM 2006: 73-78
35EEGuna Seetharaman, Arun Lakhotia, Erik Philip Blasch: Unmanned Vehicles Come of Age: The DARPA Grand Challenge. IEEE Computer 39(12): 26-29 (2006)
34EEMark Harman, Arun Lakhotia, David Binkley: Theory and algorithms for slicing unstructured programs. Information & Software Technology 48(7): 549-565 (2006)
33EEArun Lakhotia, Suresh Golconda, Anthony Maida, Pablo Mejia, Amit Puntambeker, Guna Seetharaman, Scott Wilson: CajunBot: Architecture and algorithms. J. Field Robotics 23(8): 555-578 (2006)
2005
32EEMichael Venable, Mohamed R. Chouchane, Md. Enamul Karim, Arun Lakhotia: Analyzing Memory Accesses in Obfuscated x86 Executables. DIMVA 2005: 1-18
31EEArun Lakhotia, Eric Uday Kumar, Michael Venable: A Method for Detecting Obfuscated Calls in Malicious Binaries. IEEE Trans. Software Eng. 31(11): 955-968 (2005)
30EEMd. Enamul Karim, Andrew Walenstein, Arun Lakhotia, Laxmi Parida: Malware phylogeny generation using permutations of code. Journal in Computer Virology 1(1-2): 13-23 (2005)
2004
29EEArun Lakhotia, Eric Uday Kumar: Abstracting Stack to Detect Obfuscated Calls in Binaries. SCAM 2004: 17-26
28EEArun Lakhotia, Moinuddin Mohammed: Imposing Order on Program Statements to Assist Anti-Virus Scanners. WCRE 2004: 161-170
27EEArun Lakhotia, Prashant Pathak: Virus Analysis: Techniques, Tools, and Research Issues. WCRE 2004: 2
26EEAndrew Walenstein, Arun Lakhotia, Rainer Koschke: The Second International Workshop on Detection of Software Clones: workshop report. ACM SIGSOFT Software Engineering Notes 29(2): 1-5 (2004)
2003
25 Prabhat K. Singh, Arun Lakhotia: Static Verification of Worm and virus Behavior in binary Executables using Model Checking. IAW 2003: 298-300
24EEArun Lakhotia, Junwei Li, Andrew Walenstein, Yun Yang: Towards a Clone Detection Benchmark Suite and Results Archive. IWPC 2003: 285-
23EEAndrew Walenstein, Nitin Jyoti, Junwei Li, Yun Yang, Arun Lakhotia: Problems Creating Task-relevant Clone Detection Reference Data. WCRE 2003: 285-295
22EEArun Lakhotia, Andrew Walenstein, Rainer Koschke: Second International Workshop on Detection of Software Clones. WCRE 2003: 368
2002
21 Prabhat K. Singh, Arun Lakhotia: Analysis and Detection of Computer Viruses and Worms: An Annotated Bibliography. SIGPLAN Notices 37(2): 29-35 (2002)
2000
20EEJean-Christophe Deprez, Arun Lakhotia: A Formalism to Automate Mapping from Program Features to Code. IWPC 2000: 69-78
1999
19EEArun Lakhotia, Jean-Christophe Deprez: Restructuring Functions with Low Cohesion. WCRE 1999: 36-46
18EEJagadeesh Nandigam, Arun Lakhotia, Claude G. Cech: Experimental Evaluation of Agreement among Programmers in Applying the Rules of Cohesion. Journal of Software Maintenance 11(1): 35-53 (1999)
1998
17EEArun Lakhotia: DIME: A Direct Manipulation Environment for Evolutionary Development of Software. IWPC 1998: 72-
16EEArun Lakhotia, Jean-Christophe Deprez: Restructuring programs by tucking statements into functions. Information & Software Technology 40(11-12): 677-689 (1998)
15EETat W. Chan, Arun Lakhotia: Debugging program failure exhibited by voluminous data. Journal of Software Maintenance 10(2): 111-150 (1998)
1997
14 Arun Lakhotia: A Unified Framework For Expressing Software Subsystem Classification Techniques. Journal of Systems and Software 36(3): 211-231 (1997)
1996
13EEJohn M. Gravley, Arun Lakhotia: Identifying Enumeration Types Modeled with Symbolic Constants. WCRE 1996: 227-
1995
12 Arun Lakhotia, John M. Gravley: Toward Experimental Evaluation of Subsystem Classification Recovery Techniques. WCRE 1995: 262-269
1994
11EEJianxin Li, Arun Lakhotia: Using Mathematical Induction in Systematic Program Development. International Journal of Software Engineering and Knowledge Engineering 4(4): 561-574 (1994)
1993
10EEArun Lakhotia: Rule-Based Approach to Computing Module Cohesion. ICSE 1993: 35-44
9 Arun Lakhotia: Constructing Call Multigraphs Using Dependence Graphs. POPL 1993: 273-284
8EEArun Lakhotia: Understanding someone else's code: Analysis of experiences. Journal of Systems and Software 23(3): 269-275 (1993)
1992
7EEArun Lakhotia: Book Review: "software Engineering: a Holistic View". International Journal of Software Engineering and Knowledge Engineering 2(3): 483-486 (1992)
1990
6 Arun Lakhotia, Leon Sterling: Program Development by Stepwise 'Enhancement'. SEKE 1990: 78-83
5 Arun Lakhotia, Leon Sterling: How to Control Unfolding when Specializing Interpreters. New Generation Comput. 8(1): 61-70 (1990)
1989
4 Arun Lakhotia: Incorporating `Programming Techniques' into Prolog Programs. NACLP 1989: 426-440
1988
3 Leon Sterling, Arun Lakhotia: Composing Prolog Meta-Interpreters. ICLP/SLP 1988: 386-403
2 Arun Lakhotia, Leon Sterling: Composing Recursive Logic Programs with Clausal Join. New Generation Comput. 6(2&3): 211-225 (1988)
1985
1 Arun Lakhotia: Implication and Equivalence I/O. Operating Systems Review 19(1): 46-52 (1985)

Coauthor Index

1Alp V. Asutay [41]
2David Binkley [34]
3Erik Philip Blasch [35]
4Claude G. Cech [18]
5Tat W. Chan [15]
6Mohamed R. Chouchane [32] [36] [37] [40]
7Jean-Christophe Deprez [16] [19] [20]
8Kemal Efe [41]
9Suresh Golconda [33]
10John M. Gravley [12] [13]
11Mark Harman [34]
12Nitin Jyoti [23]
13Md. Enamul Karim [30] [32] [38]
14Rainer Koschke [22] [26]
15Eric Uday Kumar [29] [31]
16Jianxin Li [11]
17Junwei Li [23] [24]
18Anthony Maida [33]
19Rachit Mathur [37] [40]
20Pablo Mejia [33]
21Moinuddin Mohammed [28]
22Jagadeesh Nandigam [18]
23Laxmi Parida [30] [38]
24Prashant Pathak [27]
25Amit Puntambeker [33]
26Guna Seetharaman [33] [35]
27Prabhat K. Singh [21] [25]
28Leon Sterling [2] [3] [5] [6]
29Michael Venable [31] [32]
30Andrew Walenstein [22] [23] [24] [26] [30] [37] [39] [40]
31Scott Wilson [33]
32Yun Yang [23] [24]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)