Universal classes of hash functions JL Carter, MN Wegman Proceedings of the ninth annual ACM symposium on Theory of computing, 106-112, 1977 | 3901 | 1977 |
Efficiently computing static single assignment form and the control dependence graph R Cytron, J Ferrante, BK Rosen, MN Wegman, FK Zadeck ACM Transactions on Programming Languages and Systems (TOPLAS) 13 (4), 451-490, 1991 | 3526 | 1991 |
New hash functions and their use in authentication and set equality MN Wegman, JL Carter Journal of computer and system sciences 22 (3), 265-279, 1981 | 1866 | 1981 |
Constant propagation with conditional branches MN Wegman, FK Zadeck ACM Transactions on Programming Languages and Systems (TOPLAS) 13 (2), 181-210, 1991 | 978 | 1991 |
Global value numbers and redundant computations BK Rosen, MN Wegman, FK Zadeck Proceedings of the 15th ACM SIGPLAN-SIGACT symposium on Principles of …, 1988 | 830 | 1988 |
Linear unification MS Paterson, MN Wegman Proceedings of the eighth annual ACM symposium on Theory of computing, 181-186, 1976 | 830 | 1976 |
Analysis of pointers and structures DR Chase, M Wegman, FK Zadeck ACM SIGPLAN Notices 25 (6), 296-310, 1990 | 800 | 1990 |
An efficient method of computing static single assignment form R Cytron, J Ferrante, BK Rosen, MN Wegman, FK Zadeck Proceedings of the 16th ACM SIGPLAN-SIGACT symposium on Principles of …, 1989 | 757 | 1989 |
Detecting equality of variables in programs B Alpern, MN Wegman, FK Zadeck Proceedings of the 15th ACM SIGPLAN-SIGACT symposium on Principles of …, 1988 | 736 | 1988 |
A comprehensive sequence analysis program for the IBM personal computer C Queen, LJ Korn Oxford University Press 12 (1Part2), 581-599, 1984 | 662 | 1984 |
A fast and usually linear algorithm for global flow analysis SL Graham, M Wegman Journal of the ACM (JACM) 23 (1), 172-202, 1976 | 257 | 1976 |
Data compression method VS Miller, MN Wegman US Patent 4,814,746, 1989 | 255 | 1989 |
Computer analysis of nucleic acid regulatory sequences. LJ Korn, CL Queen, MN Wegman Proceedings of the National Academy of Sciences 74 (10), 4401-4405, 1977 | 253 | 1977 |
Execution Patterns in Object-Oriented Visualization. W De Pauw, DH Lorenz, JM Vlissides, MN Wegman COOTS 98, 16-16, 1998 | 225 | 1998 |
New classes and applications of hash functions MN Wegman, JL Carter 20th Annual Symposium on Foundations of Computer Science (sfcs 1979), 175-182, 1979 | 175 | 1979 |
Equivalence of free Boolean graphs can be decided probabilistically in polynomial time M Blum, AK Chandra, MN Wegman Information Processing Letters, 1980 | 173 | 1980 |
Exact and approximate membership testers L Carter, R Floyd, J Gill, G Markowsky, M Wegman Proceedings of the tenth annual ACM symposium on Theory of computing, 59-65, 1978 | 166 | 1978 |
Variations on a theme by Ziv and Lempel VS Miller, MN Wegman Combinatorial algorithms on words, 131-140, 1985 | 143 | 1985 |
Detecting spam email using multiple spam classifiers V Rajan, M Wegman, R Segal, J Crawford, J Kephart, S Hershkop US Patent App. 11/029,069, 2006 | 131* | 2006 |
Using software repositories to investigate socio-technical congruence in development projects G Valetto, M Helander, K Ehrlich, S Chulani, M Wegman, C Williams Fourth International Workshop on Mining Software Repositories (MSR'07: ICSE …, 2007 | 129 | 2007 |