Monica S. Lam

Results: 79



#Item
1Finding Security Vulnerabilities in Java Applications with Static Analysis V. Benjamin Livshits and Monica S. Lam Computer Science Department Stanford University {livshits, lam}@cs.stanford.edu

Finding Security Vulnerabilities in Java Applications with Static Analysis V. Benjamin Livshits and Monica S. Lam Computer Science Department Stanford University {livshits, lam}@cs.stanford.edu

Add to Reading List

Source URL: suif.stanford.edu

- Date: 2005-07-19 02:30:55
    2Context-Sensitive Program Analysis as Database Queries Monica S. Lam John Whaley V. Benjamin Livshits Michael C. Martin Dzintars Avots

    Context-Sensitive Program Analysis as Database Queries Monica S. Lam John Whaley V. Benjamin Livshits Michael C. Martin Dzintars Avots

    Add to Reading List

    Source URL: suif.stanford.edu

    Language: English - Date: 2005-03-29 03:01:53
    3Finding Security Vulnerabilities in Java Applications with Static Analysis Benjamin Livshits and Monica S. Lam Computer Science Department

    Finding Security Vulnerabilities in Java Applications with Static Analysis Benjamin Livshits and Monica S. Lam Computer Science Department

    Add to Reading List

    Source URL: suif.stanford.edu

    Language: English - Date: 2005-09-25 18:44:49
    4Jade: A High-Level, Machine-Independent Language for Parallel Programming Martin C. Rinard, Daniel J. Scales and Monica S. Lam Computer Systems Laboratory Stanford University, CA 94305

    Jade: A High-Level, Machine-Independent Language for Parallel Programming Martin C. Rinard, Daniel J. Scales and Monica S. Lam Computer Systems Laboratory Stanford University, CA 94305

    Add to Reading List

    Source URL: people.csail.mit.edu

    Language: English - Date: 2002-03-28 10:14:44
    5A Distributed Open Social Platform for Mobile Devices Monica S. Lam Giovanni Campagna  Jiwon Seo

    A Distributed Open Social Platform for Mobile Devices Monica S. Lam Giovanni Campagna Jiwon Seo

    Add to Reading List

    Source URL: mobisocial.stanford.edu

    Language: English - Date: 2016-03-27 23:44:40
    6Finding Security Vulnerabilities in Java Applications with Static Analysis Benjamin Livshits and Monica S. Lam Computer Science Department

    Finding Security Vulnerabilities in Java Applications with Static Analysis Benjamin Livshits and Monica S. Lam Computer Science Department

    Add to Reading List

    Source URL: www.memoryatwork.org

    Language: English - Date: 2010-12-06 08:20:02
      72011 ACM SIGPLAN Symposium on Programming L D I PLDI San Jose, CA

      2011 ACM SIGPLAN Symposium on Programming L D I PLDI San Jose, CA

      Add to Reading List

      Source URL: pldi11.cs.utah.edu

      Language: English - Date: 2010-10-31 18:38:21
      8A Practical Dynamic Buffer Overflow Detector Olatunji Ruwase Monica S. Lam  Transmeta Corporation

      A Practical Dynamic Buffer Overflow Detector Olatunji Ruwase Monica S. Lam Transmeta Corporation

      Add to Reading List

      Source URL: www.isoc.org

      Language: English - Date: 2004-11-17 13:32:32
      9Microsoft Word - CFP2009.doc

      Microsoft Word - CFP2009.doc

      Add to Reading List

      Source URL: www.cs.virginia.edu

      Language: English - Date: 2014-08-12 12:06:30
      10Virtual Appliances in the Collective: A Road to Hassle-Free Computing Constantine Sapuntzakis and Monica S. Lam Computer Systems Laboratory Stanford University

      Virtual Appliances in the Collective: A Road to Hassle-Free Computing Constantine Sapuntzakis and Monica S. Lam Computer Systems Laboratory Stanford University

      Add to Reading List

      Source URL: suif.stanford.edu

      Language: English - Date: 2003-06-27 22:42:14