Travelled to:
1 × China
1 × France
1 × Germany
1 × Italy
1 × Romania
1 × Singapore
1 × Sweden
1 × United Kingdom
2 × Canada
5 × USA
Collaborated with:
S.Horwitz G.Ramalingam R.K.Medicherla G.M.Rama S.Sinha ∅ D.D'Souza R.Madhavan G.Ramalingam J.Field S.Narendran K.V.Lakshmi A.Acharya H.Arora H.Sharma I.Bhattacharya S.Kale H.S.Gupta G.M.Rama S.Chandra Y.Breitbart R.Rastogi S.Seshadri A.Silberschatz
Talks about:
analysi (5) use (5) program (4) model (4) code (4) procedur (3) object (3) depend (3) slice (3) approxim (2)
♂ Person: Raghavan Komondoor
DBLP: Komondoor:Raghavan
Facilitated 2 volumes:
Contributed to:
Wrote 19 papers:
- ICSME-2015-MedicherlaKN #specification #using #verification
- Program specialization and verification using file format specifications (RKM, RK, SN), pp. 191–200.
- SANER-2015-MedicherlaK #analysis #approximate #precise #scalability
- Precision vs. scalability: Context sensitive analysis with prefix approximation (RKM, RK), pp. 281–290.
- ASE-2014-RamaK #dynamic analysis #refactoring
- A dynamic analysis to support object-sharing code refactorings (GMR, RK), pp. 713–724.
- FM-2014-LakshmiAK #analysis #liveness #reachability #using
- Checking Liveness Properties of Presburger Counter Systems Using Reachability Analysis (KVL, AA, RK), pp. 335–350.
- SAS-2013-Komondoor #abstract interpretation #imperative #precise #slicing #source code
- Precise Slicing in Imperative Programs via Term-Rewriting and Abstract Interpretation (RK), pp. 259–282.
- WCRE-2013-KomondoorBDK #domain model #modelling #using
- Using relationships for matching textual domain models with existing code (RK, IB, DD, SK), pp. 371–380.
- OOPSLA-2011-MadhavanK #analysis #approximate #null #verification
- Null dereference verification via over-approximated weakest pre-conditions analysis (RM, RK), pp. 1033–1052.
- ICSM-2010-GuptaDKR #case study #implementation
- A case study in matching service descriptions to implementations in an existing system (HSG, DD, RK, GMR), pp. 1–10.
- WCRE-2007-KomondoorR #dependence #modelling
- Recovering Data Models via Guarded Dependences (RK, GR), pp. 110–119.
- WCRE-2007-SinhaRK #model inference #parametricity #process
- Parametric Process Model Inference (SS, GR, RK), pp. 21–30.
- ICSE-2006-RamalingamKFS #modelling #object-oriented #reverse engineering #semantics
- Semantics-based reverse engineering of object-oriented data models (GR, RK, JF, SS), pp. 192–201.
- TACAS-2005-KomondoorRCF #comprehension #dependent type
- Dependent Types for Program Understanding (RK, GR, SC, JF), pp. 157–173.
- IWPC-2003-KomondoorH #automation #effectiveness
- Effective, Automatic Procedure Extraction (RK, SH), pp. 33–43.
- ESOP-2001-KomondoorH #dependence #tool support #using
- Tool Demonstration: Finding Duplicated Code Using Program Dependences (RK, SH), pp. 383–386.
- SAS-2001-KomondoorH #identification #slicing #source code #using
- Using Slicing to Identify Duplication in Source Code (RK, SH), pp. 40–56.
- POPL-2000-KomondoorH #semantics
- Semantics-Preserving Procedure Extraction (RK, SH), pp. 155–169.
- SIGMOD-1999-BreitbartKRSS #database #protocol
- Update Propagation Protocols For Replicated Databases (YB, RK, RR, SS, AS), pp. 97–108.
- FASE-2019-AroraKR
- Checking Observational Purity of Procedures (HA, RK, GR), pp. 228–243.
- OOPSLA-2018-RamaKS #analysis #points-to #refinement #slicing
- Refinement in object-sensitivity points-to analysis via slicing (GMR, RK, HS), p. 27.