Ahmed Tamrawi
Ahmed Tamrawi
EnSoft Corp.
Verified email at ensoftcorp.com - Homepage
TitleCited byYear
Fuzzy set and cache-based approach for bug triaging
A Tamrawi, TT Nguyen, JM Al-Kofahi, TN Nguyen
Proceedings of the 19th ACM SIGSOFT symposium and the 13th European …, 2011
1242011
Graph-based pattern-oriented, context-sensitive source code completion
AT Nguyen, TT Nguyen, HA Nguyen, A Tamrawi, HV Nguyen, J Al-Kofahi, ...
2012 34th International Conference on Software Engineering (ICSE), 69-79, 2012
1232012
Fuzzy set-based automatic bug triaging (NIER track)
A Tamrawi, TT Nguyen, J Al-Kofahi, TN Nguyen
Proceedings of the 33rd International Conference on Software Engineering …, 2011
572011
Build code analysis with symbolic evaluation
A Tamrawi, HA Nguyen, HV Nguyen, TN Nguyen
Proceedings of the 34th International Conference on Software Engineering …, 2012
542012
Fuzzy set approach for automatic tagging in evolving software
JM Al-Kofahi, A Tamrawi, TT Nguyen, HA Nguyen, TN Nguyen
2010 IEEE International Conference on Software Maintenance, 1-10, 2010
302010
SYMake: a build code analysis and refactoring tool for makefiles
A Tamrawi, HA Nguyen, HV Nguyen, TN Nguyen
Proceedings of the 27th IEEE/ACM International Conference on Automated …, 2012
172012
Projected control graph for accurate and efficient analysis of safety and security vulnerabilities
A Tamrawi, S Kothari
2016 23rd Asia-Pacific Software Engineering Conference (APSEC), 113-120, 2016
122016
Modeling lessons from verifying large software systems for safety and security
S Kothari, P Awadhutkar, A Tamrawi, J Mathews
Proceedings of the 2017 Winter Simulation Conference, 109, 2017
92017
Event-flow graphs for efficient path-sensitive analyses
A Tamrawi, S Kothari
arXiv preprint arXiv:1404.1279, 2014
72014
Let's verify linux: Accelerated learning of analytical reasoning through automation and collaboration
S Kothari, A Tamrawi, J Sauceda, J Mathews
2016 IEEE/ACM 38th International Conference on Software Engineering …, 2016
62016
A “human-in-the-loop” approach for resolving complex software anomalies
S Kothari, A Deepak, A Tamrawi, B Holland, S Krishnan
2014 IEEE international conference on systems, man, and cybernetics (SMC …, 2014
62014
Projected control graph for computing relevant program behaviors
A Tamrawi, S Kothari
Science of Computer Programming 163, 93-114, 2018
52018
Comb: Computing relevant program behaviors
B Holland, P Awadhutkar, S Kotharti, A Tamrawi, J Mathews
2018 IEEE/ACM 40th International Conference on Software Engineering …, 2018
52018
Human-machine resolution of Invisible Control Flow?
S Kothari, A Tamrawi, J Mathews
2016 IEEE 24th International Conference on Program Comprehension (ICPC), 1-4, 2016
42016
Insights for practicing engineers from a formal verification study of the linux kernel
S Kothari, P Awadhutkar, A Tamrawi
2016 IEEE International Symposium on Software Reliability Engineering …, 2016
22016
Catastrophic Cyber-Physical Malware
S Kothari, GR Santhanam, P Awadhutkar, B Holland, J Mathews, ...
Versatile Cybersecurity, 201-255, 2018
12018
Rethinking Verification: Accuracy, Efficiency, and Scalability through Human-Machine Collaboration
S Kothari, A Tamrawi, J Mathews
2016 IEEE/ACM 38th International Conference on Software Engineering …, 2016
12016
Evidence-enabled verification for the Linux kernel
AY Tamrawi
12016
DynaDoc: Automated On-Demand Context-Specific Documentation
A Tamrawi, S Ram, P Awadhutkar, B Holland, GR Santhanam, S Kothari
2018 IEEE Third International Workshop on Dynamic Software Documentation …, 2018
2018
Program Analysis for Software Security With growing dependence on software in embedded and cyber-physical systems where vul-nerabilities and malware can lead to disasters …
A TAMRAWI
The system can't perform the operation now. Try again later.
Articles 1–20