[ Home | Bio | Research | Activities | Teaching ]
@INPROCEEDINGS{yu13:icst,
author = {Tingting Yu and Xiao Qu and Mithun Acharya and Gregg Rothermel},
title = {Oracle-Based Regression Test Selection},
booktitle = {Proceedings of the 6th IEEE International Conference on Software Testing, Verification, and Validation},
month = {March},
year = {2013},
location = {Luxembourg},
}

@INPROCEEDINGS{acharya12:fse-tool,
author = {Mithun Acharya and Brian Robinson},
title = {Practical Change Impact Analysis Based on Static Program Slicing for Industrial Software Systems},
booktitle = {Proceedings of the 20th ACM SIGSOFT Symposium on Foundations of Software Engineering (FSE), Research Tool Demonstrations},
month = {November},
year = {2012},
location = {Cary, NC, USA},
}

@INPROCEEDINGS{qu12:icsm,
author = {Xiao Qu and Mithun Acharya and Brian Robinson},
title = {Configuration Selection Using Code Change Impact Analysis for Regression Testing},
booktitle = {Proceedings of the 28th IEEE International Conference on Software Maintenance (ICSM)},
month = {September},
year = {2012},
pages = {129--138},
location = {Riva del Garda, Trento, Italy},
}

@INPROCEEDINGS{qu11:issre,
author = {Xiao Qu and Mithun Acharya and Brian Robinson},
title = {Impact Analysis of Configuration Changes for Test Case Selection},
booktitle = {Proceedings of the 22nd IEEE Symposium on Software Reliability Engineering (ISSRE)},
month = {November/December},
year = {2011},
pages = {140--149},
location = {Hiroshima, Japan},
}

@INPROCEEDINGS{acharya11:icse-seip,
author = {Mithun Acharya and Brian Robinson},
title = {Practical Change Impact Analysis Based on Static Program Slicing for Industrial Software Systems},
booktitle = {Proceedings of the 33rd ACM SIGSOFT International Conference on Software Engineering (ICSE), Software Engineering in Practice Track},
month = {May},
year = {2011},
pages = {746--765},
location = {Waikiki, Honolulu, Hawaii, USA},
}

@INCOLLECTION{acharya11:book-chapter,
author = {Mithun Acharya and Tao Xie},
title = {Static API Specification Mining: Exploiting Source Code Model Checking},
booktitle = {Mining Software Specifications: Methodologies and Applications},
chapter = {5},
pages = {113--158},
publisher = {Chapman & Hall/CRC Data Mining and Knowledge Discovery Series},
year = {2011},
editor = {David Lo and Siau-Cheng Khoo and Jiawei Han and Chao Liu},
}

@PATENT{westhoff10:patent,
author = {Dirk Westhoff and Joao Girao and Mithun Acharya},
title = {Method for Distributing Keys for Encrypted Data Transmission in a Preferably Wireless Sensor Network},
year = {2010},
number = {7702905},
location = {US},
}

@INPROCEEDINGS{acharya09:ase,
author = {Mithun Acharya and Tao Xie},
title = {Mining Health Models for Performance Monitoring of Services},
booktitle = {Proceedings of the 24th IEEE/ACM International Conference on Automated Software Engineering (ASE)},
month = {November},
year = {2009},
pages = {409--420},
location = {Auckland, New Zealand},
}

@INPROCEEDINGS{acharya09:fase,
author = {Mithun Acharya and Tao Xie},
title = {Mining {API} Error-Handling Specifications from Source Code},
booktitle = {Proceedings of the ETAPS 2009 Fundamental Approaches to Software Engineering (FASE), LNCS 5503},
month = {March},
year = {2009},
pages = {370--384},
location = {York, United Kingdom},
}

@PHDTHESIS{acharya09:phdthesis,
Author = {Mithun Acharya},
Title = {Mining {API} Specifications from Source Code for Software Reliability},
School = {North Carolina State University},
Year = {2009},
}

@INPROCEEDINGS{xie08:nsfngs,
author = {Tao Xie and Mithun Acharya and Suresh Thummalapenta and Kunal Taneja},
title = {Improving Software Reliability and Productivity via Mining Program Source Code},
booktitle = {Proceedings of the NSF Next Generation Software Program Workshop at IPDPS 2008 (NSFNGS)},
month = {April},
year = {2008},
pages = {1--5},
location = {Miami, Florida},
}

@INPROCEEDINGS{thuente07:milcom,
author = {David Thuente and Ben Newlin and Mithun Acharya},
title = {Jamming Vulnerabilities of 802.11e},
booktitle = {Proceedings of the 26th IEEE Communications Society Military Communications Conference (MILCOM)},
month = {October},
year = {2007},
pages = {1--7},
location = {Orlando, Florida, USA},
}

@INPROCEEDINGS{acharya07:fse,
author = {Mithun Acharya and Tao Xie and Jian Pei and Jun Xu},
title = {Mining {API} Patterns as Partial Orders from Source Code: From Usage Scenarios to Specifications},
booktitle = {Proceedings of the 6th joint meeting of European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE)},
month = {September},
year = {2007},
pages = {25--34},
location = {Dubrovnik, Croatia},
}

@TECHREPORT{acharya07:ncsu-tr,
author = {Mithun Acharya and Tao Xie},
title = {Static Detection of {API} Error-Handling Bugs via Mining Source Code},
institution = {North Carolina State University Department of Computer Science},
type = {Technical Report},
number = {TR-2007-35},
month = {October},
year = {2007},
}

@INPROCEEDINGS{acharya06:issre,
author = {Mithun Acharya and Tao Xie and Jun Xu},
title = {Mining Interface Specifications for Generating Checkable Robustness Properties},
booktitle = {Proceedings of the 17th IEEE International Symposium on Software Reliability Engineering (ISSRE)},
month = {November},
year = {2006},
location = {Raleigh, NC, USA},
pages = {311--320},
}

@INPROCEEDINGS{thuente06:milcom,
author = {David Thuente and Mithun Acharya},
title = {Intelligent Jamming in Wireless Networks with Applications to 802.11b and Other Networks},
booktitle = {Proceedings of the 25th IEEE Communications Society Military Communications Conference (MILCOM)},
month = {October},
year = {2006},
pages = {1075--1081},
location = {Washington DC, USA},
}

@ARTICLE{westhoff06:tmc,
author = {Dirk Westhoff and Joao Girao and Mithun Acharya},
title = {Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution and Routing Adaptation},
journal = {IEEE Transactions on Mobile Computing (TMC)},
year = {2006},
olume = {5},
number = {10},
month = {October},
pages = {1417--1431},
}

@INPROCEEDINGS{acharya06:ase-sp,
author = {Mithun Acharya and Tanu Sharma and Jun Xu and Tao Xie},
title = {Effective Generation of Interface Robustness Properties for Static Analysis},
booktitle = {Proceedings of the 21st IEEE/ACM International Conference on Automated Software Engineering (ASE), Short Paper},
month = {September},
year = {2006},
pages = {293--296},
location = {Tokyo, Japan},
}

@INPROCEEDINGS{acharya05:opnetwork,
author = {Mithun Acharya and David Thuente},
title = {Intelligent Jamming Attacks, Counterattacks and (Counter)^2 Attacks in 802.11b Wireless Networks},
booktitle = {Proceedings of OPNETWORK},
month = {August},
year = {2005},
location = {Washington DC, USA},
}

@INPROCEEDINGS{acharya05:wiopt,
author = {Mithun Acharya and Joao Girao and Dirk Westhoff},
title = {Secure Comparison of Encrypted Data in Wireless Sensor Networks},
booktitle = {Proceedings of the 3rd IEEE/ACM International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt)},
month = {April},
year = {2005},
pages = {47--53},
location = {Riva del Garda, Trentino, Italy},
}

@INPROCEEDINGS{acharya04:opnetwork,
author = {Mithun Acharya and Tanu Sharma and David Thuente and David Sizemore},
title = {Intelligent Jamming in 802.11b Wireless Networks},
booktitle = {Proceedings of OPNETWORK},
month = {August},
year = {2004},
location = {Washington DC, USA},
}

@ARTICLE{acharya03:sigcse,
author = {Mithun Acharya and Robert Funderlic},
title = {Laurel and Hardy Model for Analyzing Process Synchronization Algorithms and Primitives},
journal = {ACM SIGCSE},
year = {2003},
volume = {5},
number = {10},
month = {June},
pages = {107--110},
}

@MASTERSTHESIS{acharya03:mastersthesis,
Author = {Mithun Acharya},
Title = {{NAMO NAMAHA}: {N}etwork {A}ssisted {M}ulticast {O}verlay {C}onstructio{N} {A}lgorithms for {M}obile {A}d {H}oc {A}pplications},
School = {North Carolina State University},
Year = {2003},
}


[ Home | Bio | Research | Activities | Teaching ]