default search action
Xi Wang 0005
Person information
- affiliation: University of Washington, Seattle, WA, USA
- affiliation (PhD 2014): Massachusetts Institute of Technology, Cambridge, MA, USA
Other persons with the same name
- Xi Wang — disambiguation page
- Xi Wang 0001 — Fujitsu Laboratories of America, Richardson, TX, USA (and 1 more)
- Xi Wang 0002 — Max-Delbrück-Center for Molecular Medicine, Berlin, Germany (and 2 more)
- Xi Wang 0003 — Ocean University of China, Qingdao, Shandong, China
- Xi Wang 0004 — National University of Singapore, Department of Electrical and Computer Engineering, Singapore
- Xi Wang 0006 — Soochow University, Suzhou, China (and 1 more)
- Xi Wang 0007 — Donghua University, Shanghai, China
- Xi Wang 0008 — Fudan University, Shanghai, China
- Xi Wang 0009 — Texas Tech University, Lubbock, Texas, USA
- Xi Wang 0010 — Central University of Finance and Economics, Beijing, China (and 1 more)
- Xi Wang 0011 — University of Houston, TX, USA
- Xi Wang 0012 — University of Sheffield, UK (and 2 more)
- Xi Wang 0013 — Chinese University of Hong Kong, Department of Computer Science and Engineering, Hong Kong (and 1 more)
- Xi Wang 0014 — University of Chinese Academy of Sciences, Beijing, China (and 1 more)
- Xi Wang 0015 — Xidian University, School of Electro-Mechanical Engineering, Xi'an, China (and 1 more)
- Xi Wang 0016 — Microsoft Cloud and AI, Bejing, China
- Xi Wang 0017 — Shanghai University, School of Computer Engineering and Science, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c36]Jacob Van Geffen, Xi Wang, Emina Torlak, James Bornholt:
Synthesis-Aided Crash Consistency for Storage Systems. ECOOP 2023: 35:1-35:26 - 2022
- [j4]Sorawee Porncharoenwase, Luke Nelson, Xi Wang, Emina Torlak:
A formal foundation for symbolic evaluation with merging. Proc. ACM Program. Lang. 6(POPL): 1-28 (2022) - [c35]Zuyu Shen, Yinzhu Piao, Cong Tan, Ruikai Lin, Xu Zhao, Xi Wang:
Project Co-Art: Improving Children's Imagination Through AI-based Human-Computer Co-creation. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 1597-1602 - 2020
- [j3]Luke Nelson, James Bornholt, Arvind Krishnamurthy, Emina Torlak, Xi Wang:
Noninterference specifications for secure systems. ACM SIGOPS Oper. Syst. Rev. 54(1): 31-39 (2020) - [c34]Jacob Van Geffen, Luke Nelson, Isil Dillig, Xi Wang, Emina Torlak:
Synthesizing JIT Compilers for In-Kernel DSLs. CAV (2) 2020: 564-586 - [c33]Kaiyuan Zhang, Danyang Zhuo, Aditya Akella, Arvind Krishnamurthy, Xi Wang:
Automated Verification of Customizable Middlebox Properties with Gravel. NSDI 2020: 221-239 - [c32]Luke Nelson, Jacob Van Geffen, Emina Torlak, Xi Wang:
Specification and verification in the field: Applying formal methods to BPF just-in-time compilers in the Linux kernel. OSDI 2020: 41-61
2010 – 2019
- 2019
- [c31]Luke Nelson, James Bornholt, Ronghui Gu, Andrew Baumann, Emina Torlak, Xi Wang:
Scaling symbolic evaluation for automated verification of systems code with Serval. SOSP 2019: 225-242 - 2018
- [c30]Pedro Fonseca, Xi Wang, Arvind Krishnamurthy:
MultiNyx: a multi-level abstraction framework for systematic analysis of hypervisors. EuroSys 2018: 23:1-23:12 - [c29]Helgi Sigurbjarnarson, Luke Nelson, Bruno Castro-Karney, James Bornholt, Emina Torlak, Xi Wang:
Nickel: A Framework for Design and Verification of Information Flow Control Systems. OSDI 2018: 287-305 - 2017
- [c28]Pedro Fonseca, Kaiyuan Zhang, Xi Wang, Arvind Krishnamurthy:
An Empirical Study on the Correctness of Formally Verified Distributed Systems. EuroSys 2017: 328-343 - [c27]Eddie Q. Yan, Kaiyuan Zhang, Xi Wang, Karin Strauss, Luis Ceze:
Customizing Progressive JPEG for Efficient Image Storage. HotStorage 2017 - [c26]Luke Nelson, Helgi Sigurbjarnarson, Kaiyuan Zhang, Dylan Johnson, James Bornholt, Emina Torlak, Xi Wang:
Hyperkernel: Push-Button Verification of an OS Kernel. SOSP 2017: 252-269 - 2016
- [j2]Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek, Armando Solar-Lezama:
A differential approach to undefined behavior detection. Commun. ACM 59(3): 99-106 (2016) - [c25]James Bornholt, Antoine Kaufmann, Jialin Li, Arvind Krishnamurthy, Emina Torlak, Xi Wang:
Specifying and Checking File System Crash-Consistency Models. ASPLOS 2016: 83-98 - [c24]Stuart Pernsteiner, Calvin Loncaric, Emina Torlak, Zachary Tatlock, Xi Wang, Michael D. Ernst, Jonathan Jacky:
Investigating Safety of a Radiotherapy Machine Using System Models with Pluggable Checkers. CAV (2) 2016: 23-41 - [c23]Helgi Sigurbjarnarson, James Bornholt, Emina Torlak, Xi Wang:
Push-Button Verification of File Systems via Crash Refinement. OSDI 2016: 1-16 - 2015
- [j1]Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek, Armando Solar-Lezama:
A Differential Approach to Undefined Behavior Detection. ACM Trans. Comput. Syst. 33(1): 1:1-1:29 (2015) - [c22]James R. Wilcox, Doug Woos, Pavel Panchekha, Zachary Tatlock, Xi Wang, Michael D. Ernst, Thomas E. Anderson:
Verdi: a framework for implementing and formally verifying distributed systems. PLDI 2015: 357-368 - [c21]Michael D. Ernst, Dan Grossman, Jon Jacky, Calvin Loncaric, Stuart Pernsteiner, Zachary Tatlock, Emina Torlak, Xi Wang:
Toward a Dependability Case Language and Workflow for a Radiation Therapy System. SNAPL 2015: 103-112 - 2014
- [b1]Xi Wang:
A differential approach to undefined behavior detection. Massachusetts Institute of Technology, Cambridge, MA, USA, 2014 - [c20]David Lazar, Haogang Chen, Xi Wang, Nickolai Zeldovich:
Why does cryptographic software fail?: a case study and open problems. APSys 2014: 7:1-7:7 - [c19]Tian Xiao, Zhenyu Guo, Hucheng Zhou, Jiaxing Zhang, Xu Zhao, Chencheng Ye, Xi Wang, Wei Lin, Wenguang Chen, Lidong Zhou:
Cybertron: pushing the limit on I/O reduction in data-parallel programs. OOPSLA 2014: 895-908 - [c18]Xi Wang, David Lazar, Nickolai Zeldovich, Adam Chlipala, Zachary Tatlock:
Jitk: A Trustworthy In-Kernel Interpreter Infrastructure. OSDI 2014: 33-47 - [c17]Haogang Chen, Taesoo Kim, Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek:
Identifying Information Disclosure in Web Applications with Retroactive Auditing. OSDI 2014: 555-569 - 2013
- [c16]Haogang Chen, Cody Cutler, Taesoo Kim, Yandong Mao, Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek:
Security bugs in embedded interpreters. APSys 2013: 17:1-17:7 - [c15]Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek, Armando Solar-Lezama:
Towards optimization-safe systems: analyzing the impact of undefined behavior. SOSP 2013: 260-275 - 2012
- [c14]Xi Wang, Haogang Chen, Alvin Cheung, Zhihao Jia, Nickolai Zeldovich, M. Frans Kaashoek:
Undefined behavior: what happened to my code? APSys 2012: 9 - [c13]Xi Wang, Haogang Chen, Zhihao Jia, Nickolai Zeldovich, M. Frans Kaashoek:
Improving Integer Security for Systems with KINT. OSDI 2012: 163-177 - 2011
- [c12]Haogang Chen, Yandong Mao, Xi Wang, Dong Zhou, Nickolai Zeldovich, M. Frans Kaashoek:
Linux kernel vulnerabilities: state-of-the-art defenses and open problems. APSys 2011: 5 - [c11]Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek:
Retroactive auditing. APSys 2011: 9 - [c10]Yandong Mao, Haogang Chen, Dong Zhou, Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek:
Software fault isolation with API integrity and multi-principal modules. SOSP 2011: 115-128 - 2010
- [c9]Taesoo Kim, Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek:
Intrusion Recovery Using Selective Re-execution. OSDI 2010: 89-104 - [c8]Ming Wu, Fan Long, Xi Wang, Zhilei Xu, Haoxiang Lin, Xuezheng Liu, Zhenyu Guo, Huayang Guo, Lidong Zhou, Zheng Zhang:
Language-based replay via data flow cut. SIGSOFT FSE 2010: 197-206
2000 – 2009
- 2009
- [c7]Fan Long, Xi Wang, Yang Cai:
Api hyperlinking via structural overlap. ESEC/SIGSOFT FSE 2009: 203-212 - [c6]Alexander Yip, Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek:
Improving application security with data flow assertions. SOSP 2009: 291-304 - 2008
- [c5]Xi Wang, Zhenyu Guo, Xuezheng Liu, Zhilei Xu, Haoxiang Lin, Xiaoge Wang, Zheng Zhang:
Hang analysis: fighting responsiveness bugs. EuroSys 2008: 177-190 - [c4]Haohui Mai, Chongnan Gao, Xuezheng Liu, Xi Wang, Geoffrey M. Voelker:
Towards Automatic Inference of Task Hierarchies in Complex Systems. HotDep 2008 - [c3]Xuezheng Liu, Zhenyu Guo, Xi Wang, Feibo Chen, Xiaochen Lian, Jian Tang, Ming Wu, M. Frans Kaashoek, Zheng Zhang:
D3S: Debugging Deployed Distributed Systems. NSDI 2008: 423-437 - [c2]Zhenyu Guo, Xi Wang, Jian Tang, Xuezheng Liu, Zhilei Xu, Ming Wu, M. Frans Kaashoek, Zheng Zhang:
R2: An Application-Level Kernel for Record and Replay. OSDI 2008: 193-208 - [c1]Xi Wang, Zhilei Xu, Xuezheng Liu, Zhenyu Guo, Xiaoge Wang, Zheng Zhang:
Conditional correlation analysis for safe region-based memory management. PLDI 2008: 45-55
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 19:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint