Synchronous interlocked pipelines HM Jacobson, PN Kudva, P Bose, PW Cook, SE Schuster, EG Mercer, ... Proceedings Eighth International Symposium on Asynchronous Circuits and …, 2002 | 135 | 2002 |
Load balancing parallel explicit state model checking R Kumar, EG Mercer Electronic Notes in Theoretical Computer Science 128 (3), 19-34, 2005 | 76 | 2005 |
Model checking machine code with the GNU debugger E Mercer, M Jones International SPIN Workshop on Model Checking of Software, 251-265, 2005 | 67 | 2005 |
Efficient testing of concurrent programs with abstraction-guided symbolic execution N Rungta, EG Mercer, W Visser International SPIN Workshop on Model Checking of Software, 174-191, 2009 | 53 | 2009 |
Timed circuits: A new paradigm for high-speed design CJ Myers, W Belluomini, K Kallpack, E Peskin, H Zheng Proceedings of the 2001 Asia and South Pacific Design Automation Conference …, 2001 | 45 | 2001 |
Stochastic cycle period analysis in timed circuits EG Mercer, CJ Myers 2000 IEEE International Symposium on Circuits and Systems (ISCAS) 2, 172-175, 2000 | 40 | 2000 |
Modular verification of timed circuits using automatic abstraction H Zheng, E Mercer, C Myers IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2003 | 36 | 2003 |
MCC: A runtime verification tool for MCAPI user applications S Sharma, G Gopalakrishnan, E Mercer, J Holt 2009 Formal Methods in Computer-Aided Design, 41-44, 2009 | 33 | 2009 |
Improving translation of live sequence charts to temporal logic R Kumar, EG Mercer, A Bunker Electronic Notes in Theoretical Computer Science 250 (1), 137-152, 2009 | 33 | 2009 |
Generating counter-examples through randomized guided search N Rungta, EG Mercer International SPIN Workshop on Model Checking of Software, 39-57, 2007 | 26 | 2007 |
Clash of the titans: tools and techniques for hunting bugs in concurrent programs N Rungta, EG Mercer Proceedings of the 7th Workshop on Parallel and Distributed Systems: Testing …, 2009 | 24 | 2009 |
Cyberassured systems engineering at scale D Cofer, I Amundson, J Babar, D Hardin, K Slind, P Alexander, J Hatcliff, ... IEEE Security & Privacy 20 (3), 52-64, 2022 | 22 | 2022 |
A meta heuristic for effectively detecting concurrency errors N Rungta, EG Mercer Haifa Verification Conference, 23-37, 2008 | 21 | 2008 |
Explicit state model checking with Hopper M Jones, E Mercer International SPIN Workshop on Model Checking of Software, 146-150, 2004 | 20 | 2004 |
Or best offer: A privacy policy negotiation protocol DD Walker, EG Mercer, KE Seamons 2008 IEEE Workshop on Policies for Distributed Systems and Networks, 173-180, 2008 | 19 | 2008 |
Design, verification and applications of a new read-write lock algorithm J Shirako, N Vrvilo, EG Mercer, V Sarkar Proceedings of the twenty-fourth annual ACM symposium on Parallelism in …, 2012 | 18 | 2012 |
Hardness for explicit state software model checking benchmarks N Rungta, EG Mercer Fifth IEEE International Conference on Software Engineering and Formal …, 2007 | 18 | 2007 |
A context-sensitive structural heuristic for guided search model checking N Rungta, EG Mercer Proceedings of the 20th IEEE/ACM international Conference on Automated …, 2005 | 18 | 2005 |
Synthesizing verified components for cyber assured systems engineering E Mercer, K Slind, I Amundson, D Cofer, J Babar, D Hardin Software and Systems Modeling 22 (5), 1451-1471, 2023 | 16 | 2023 |
Improved poset timing analysis in timed petri nets EG Mercer, CJ Myers, T Yoneda The Tenth Workshop on Synthesis and System Integration of MIxed Technologies …, 2001 | 16 | 2001 |