Follow
Mark Wegman
Mark Wegman
UC Berkeley and IBM
Verified email at us.ibm.com - Homepage
Title
Cited by
Cited by
Year
Universal classes of hash functions
JL Carter, MN Wegman
Proceedings of the ninth annual ACM symposium on Theory of computing, 106-112, 1977
38201977
Efficiently computing static single assignment form and the control dependence graph
R Cytron, J Ferrante, BK Rosen, MN Wegman, FK Zadeck
ACM Transactions on Programming Languages and Systems (TOPLAS) 13 (4), 451-490, 1991
34901991
New hash functions and their use in authentication and set equality
MN Wegman, JL Carter
Journal of computer and system sciences 22 (3), 265-279, 1981
19041981
Constant propagation with conditional branches
MN Wegman, FK Zadeck
ACM Transactions on Programming Languages and Systems (TOPLAS) 13 (2), 181-210, 1991
9611991
Linear unification
MS Paterson, MN Wegman
Proceedings of the eighth annual ACM symposium on Theory of computing, 181-186, 1976
8251976
Global value numbers and redundant computations
BK Rosen, MN Wegman, FK Zadeck
Proceedings of the 15th ACM SIGPLAN-SIGACT symposium on Principles of …, 1988
8131988
Analysis of pointers and structures
DR Chase, M Wegman, FK Zadeck
ACM SIGPLAN Notices 25 (6), 296-310, 1990
7861990
An efficient method of computing static single assignment form
R Cytron, J Ferrante, BK Rosen, MN Wegman, FK Zadeck
Proceedings of the 16th ACM SIGPLAN-SIGACT symposium on Principles of …, 1989
7461989
Detecting equality of variables in programs
B Alpern, MN Wegman, FK Zadeck
Proceedings of the 15th ACM SIGPLAN-SIGACT symposium on Principles of …, 1988
7271988
A comprehensive sequence analysis program for the IBM personal computer
C Queen, LJ Korn
Oxford University Press 12 (1Part2), 581-599, 1984
6601984
A fast and usually linear algorithm for global flow analysis
SL Graham, M Wegman
Journal of the ACM (JACM) 23 (1), 172-202, 1976
2611976
Computer analysis of nucleic acid regulatory sequences.
LJ Korn, CL Queen, MN Wegman
Proceedings of the National Academy of Sciences 74 (10), 4401-4405, 1977
2521977
Data compression method
VS Miller, MN Wegman
US Patent 4,814,746, 1989
2441989
Execution Patterns in Object-Oriented Visualization.
W De Pauw, DH Lorenz, JM Vlissides, MN Wegman
COOTS 98, 16-16, 1998
2231998
New classes and applications of hash functions
MN Wegman, JL Carter
20th Annual Symposium on Foundations of Computer Science (sfcs 1979), 175-182, 1979
1751979
Equivalence of free Boolean graphs can be decided probabilistically in polynomial time
M Blum, AK Chandra, MN Wegman
Information Processing Letters, 1980
1731980
Exact and approximate membership testers
L Carter, R Floyd, J Gill, G Markowsky, M Wegman
Proceedings of the tenth annual ACM symposium on Theory of computing, 59-65, 1978
1621978
Variations on a theme by Ziv and Lempel
VS Miller, MN Wegman
Combinatorial algorithms on words, 131-140, 1985
1401985
Detecting spam email using multiple spam classifiers
V Rajan, M Wegman, R Segal, J Crawford, J Kephart, S Hershkop
US Patent App. 11/029,069, 2006
128*2006
Using software repositories to investigate socio-technical congruence in development projects
G Valetto, M Helander, K Ehrlich, S Chulani, M Wegman, C Williams
Fourth International Workshop on Mining Software Repositories (MSR'07: ICSE …, 2007
1252007
The system can't perform the operation now. Try again later.
Articles 1–20