Yahoo Canada Web Search

Search results

  1. David Van Horn is an associate professor of computer science at the University of Maryland, where he directs the PLUM lab and advises Technica hackathon. His research interests include program analysis, verification, security, logic, and algorithms.

  2. David Van Horn is an Associate Professor in the Department of Computer Science and the Institute for Advanced Computer Studies (UMIACS) at the University of Maryland, College Park. His research interests are in programming languages and formal methods, where he works toward making the construction of reusable, trusted software components possible and effective.

  3. 114. 2010. Sound and precise malware analysis for Android via pushdown reachability and entry-point saturation. S Liang, AW Keep, M Might, S Lyde, T Gilray, P Aldous, D Van Horn. Proceedings of the Third ACM workshop on Security and privacy in smartphones ….

  4. BACKGROUND. David Van Horn is an assosicate professor in the Department of Computer Science with a joint appointment in the University of Maryland Institute for Advanced Computer Studies. He is a core faculty member in the Maryland Cybersecurity Center and co-director of the Lab for Programming Languages at the University of Maryland (PLUM).

    • Associate Professor
    • 5250 Iribe Center
  5. www.umiacs.umd.edu › people › dvanhornDavid Van Horn | UMIACS

    David Van Horn is a researcher and educator in program analysis, programming languages, software engineering, verification and security. He is an associate professor at the University of Maryland and a member of the Maryland Cybersecurity Center and the Lab for Programming Languages.

  6. David Van Horn is an associate professor of computer science at UMIACS, University of Maryland. He leads and participates in several research projects on verification, security, and programming languages.

  7. People also ask

  8. Phuc C. Nguyen, Sam Tobin-Hochstadt, David Van Horn. Comments: This paper unifies and expands upon the work presented in the papers "Soft contract verification" [ arXiv:1307.6239 ], and "Relatively complete counterexamples for higher-order programs" [ arXiv:1411.3967 ]. It also subsumes the work in the paper "Higher-order symbolic execution via ...