default search action
Junaid Haroon Siddiqui
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j8]Aatira Anum Ahmad, Abdul Rafae Noor, Hashim Sharif, Usama Hameed, Shoaib Asif, Mubashir Anwar, Ashish Gehani, Fareed Zaffar, Junaid Haroon Siddiqui:
Trimmer: An Automated System for Configuration-Based Software Debloating. IEEE Trans. Software Eng. 48(9): 3485-3505 (2022) - 2021
- [c26]Andrea Maioli, Luca Mottola, Muhammad Hamad Alizai, Junaid Haroon Siddiqui:
Discovering the Hidden Anomalies of Intermittent Computing. EWSN 2021: 1-12 - 2020
- [j7]Maryam Abdul Ghafoor, Muhammad Suleman Mahmood, Junaid Haroon Siddiqui:
Extending symbolic execution for automated testing of stored procedures. Softw. Qual. J. 28(2): 853-887 (2020) - [j6]Saad Ahmed, Naveed Anwar Bhatti, Muhammad Hamad Alizai, Junaid Haroon Siddiqui, Luca Mottola:
Fast and Energy-Efficient State Checkpointing for Intermittent Computing. ACM Trans. Embed. Comput. Syst. 19(6): 45:1-45:27 (2020) - [j5]Saad Ahmed, Muhammad Nawaz, Abu Bakar, Naveed Anwar Bhatti, Muhammad Hamad Alizai, Junaid Haroon Siddiqui, Luca Mottola:
Demystifying Energy Consumption Dynamics in Transiently powered Computers. ACM Trans. Embed. Comput. Syst. 19(6): 47:1-47:25 (2020) - [c25]Saad Ahmed, Qurat ul Ain, Junaid Haroon Siddiqui, Luca Mottola, Muhammad Hamad Alizai:
Intermittent Computing with Dynamic Voltage and Frequency Scaling. EWSN 2020: 97-107 - [c24]Mikhail Afanasov, Naveed Anwar Bhatti, Dennis Campagna, Giacomo Caslini, Fabio Massimo Centonze, Koustabh Dolui, Andrea Maioli, Erica Barone, Muhammad Hamad Alizai, Junaid Haroon Siddiqui, Luca Mottola:
Battery-less zero-maintenance embedded sensing at the mithræum of circus maximus. SenSys 2020: 368-381
2010 – 2019
- 2019
- [j4]Affan Rauf, Muhammad Nawaz, Junaid Haroon Siddiqui:
Effective State Encoding for Breadth-First Generation of Complex Structures. IEEE Trans. Reliab. 68(3): 1154-1167 (2019) - [c23]Saad Ahmed, Naveed Anwar Bhatti, Muhammad Hamad Alizai, Junaid Haroon Siddiqui, Luca Mottola:
Efficient intermittent computing with differential checkpointing. LCTES 2019: 70-81 - [c22]Saad Ahmed, Abu Bakar, Naveed Anwar Bhatti, Muhammad Hamad Alizai, Junaid Haroon Siddiqui, Luca Mottola:
The betrayal of constant power × time: finding the missing Joules of transiently-powered computers. LCTES 2019: 97-109 - [c21]Andrea Maioli, Luca Mottola, Muhammad Hamad Alizai, Junaid Haroon Siddiqui:
On intermittence bugs in the battery-less internet of things (WIP paper). LCTES 2019: 203-207 - [c20]Adriano Branco, Luca Mottola, Muhammad Hamad Alizai, Junaid Haroon Siddiqui:
Intermittent asynchronous peripheral operations. SenSys 2019: 55-67 - 2018
- [j3]Junaid Haroon Siddiqui, Affan Rauf, Maryam Abdul Ghafoor:
Chapter Two - Advances in Software Model Checking. Adv. Comput. 108: 59-89 (2018) - [c19]Muhammad Sohaib Ayub, Junaid Haroon Siddiqui:
Efficiently finding minimal failing input in MapReduce programs. ICSE (Companion Volume) 2018: 177-178 - [c18]Affan Rauf, Muhammad Nawaz, Junaid Haroon Siddiqui:
Efficient iterative deepening for bounded exhaustive generation of complex structures. ICSE (Companion Volume) 2018: 346-347 - [c17]Saad Ahmed, Muhammad Hamad Alizai, Junaid Haroon Siddiqui, Naveed Anwar Bhatti, Luca Mottola:
Towards smaller checkpoints for better intermittent computing: poster abstract. IPSN 2018: 132-133 - [i1]Muhammad Zubair Malik, Muhammad Nawaz, Nimrah Mustafa, Junaid Haroon Siddiqui:
Search Based Code Generation for Machine Learning Programs. CoRR abs/1801.09373 (2018) - 2017
- [c16]Muhammad Sohaib Ayub, Waqas ur Rehman, Junaid Haroon Siddiqui:
Experience Report: Verifying MPI Java Programs Using Software Model Checking. ISSRE 2017: 294-304 - 2016
- [c15]Maryam Abdul Ghafoor, Junaid Haroon Siddiqui:
Cross Platform Bug Correlation Using Stack Traces. FIT 2016: 199-204 - [c14]Maryam Abdul Ghafoor, Muhammad Suleman Mahmood, Junaid Haroon Siddiqui:
Effective Partial Order Reduction in Model Checking Database Applications. ICST 2016: 146-156 - [c13]Muhammad Suleman Mahmood, Maryam Abdul Ghafoor, Junaid Haroon Siddiqui:
Symbolic execution of stored procedures in database management systems. ASE 2016: 519-530 - [c12]Waqas ur Rehman, Muhammad Sohaib Ayub, Junaid Haroon Siddiqui:
Verification of MPI Java programs using software model checking. PPoPP 2016: 55:1-55:2 - [c11]Saad Ahmed, Hassan Ali Khan, Junaid Haroon Siddiqui, Jó Ágila Bitsch, Muhammad Hamad Alizai:
Incremental Checkpointing for Interruptible Computations: Poster Abstract. SenSys 2016: 350-351 - 2014
- [c10]Sarmad Makhdoom, Muhammad Adeel Khan, Junaid Haroon Siddiqui:
Incremental symbolic execution for automated test suite maintenance. ASE 2014: 271-276 - 2013
- [j2]Junaid Haroon Siddiqui, Sarfraz Khurshid:
Scaling symbolic execution using staged analysis. Innov. Syst. Softw. Eng. 9(2): 119-131 (2013) - [c9]Nicolás Rosner, Junaid Haroon Siddiqui, Nazareno Aguirre, Sarfraz Khurshid, Marcelo F. Frias:
Ranger: Parallel analysis of alloy models by range partitioning. ASE 2013: 147-157 - 2012
- [j1]Diego Funes, Junaid Haroon Siddiqui, Sarfraz Khurshid:
Ranged Model Checking. ACM SIGSOFT Softw. Eng. Notes 37(6): 1-5 (2012) - [c8]Junaid Haroon Siddiqui, Darko Marinov, Sarfraz Khurshid:
Lightweight Data-Flow Analysis for Execution-Driven Constraint Solving. ICST 2012: 91-100 - [c7]Junaid Haroon Siddiqui, Sarfraz Khurshid:
Scaling symbolic execution using ranged analysis. OOPSLA 2012: 523-536 - [c6]Junaid Haroon Siddiqui, Sarfraz Khurshid:
Staged symbolic execution. SAC 2012: 1339-1346 - 2011
- [c5]Junaid Haroon Siddiqui, Sarfraz Khurshid:
Symbolic Execution of Alloy Models. ICFEM 2011: 340-355 - [c4]Muhammad Zubair Malik, Junaid Haroon Siddiqui, Sarfraz Khurshid:
Constraint-Based Program Debugging Using Data Structure Repair. ICST 2011: 190-199
2000 – 2009
- 2009
- [c3]Junaid Haroon Siddiqui, Sarfraz Khurshid:
An Empirical Study of Structural Constraint Solving Techniques. ICFEM 2009: 88-106 - [c2]Junaid Haroon Siddiqui, Sarfraz Khurshid:
PKorat: Parallel Generation of Structurally Complex Test Inputs. ICST 2009: 250-259 - [c1]Junaid Haroon Siddiqui, Darko Marinov, Sarfraz Khurshid:
Optimizing a Structural Constraint Solver for Efficient Software Checking. ASE 2009: 615-619
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint