• R. M. Jensen, M. M. Veloso, and R. E. Bryant, ``State-Set Branching: Leveraging BDDs for Heuristic Search,'' Artificial Intelligence, Vol. 172, Issues 2-3 (February, 2008), pp. 103-139.
•R. E. Bryant, D. Kroening, J. Ouaknine, S. A. Seshia, O. Strichman, and B. Brady, ``Deciding Bit-Vector Arithmetic with Abstraction,'' Tools and Algorithms for the Construction and Analysis of Systems TACAS 2007, March, 2007. Available as http://www.cs.cmu.edu/~bryant/pubdir/tacas07.
•M. Christodorescu, S. Jha, S. A. Seshia, D. Song, and R. E. Bryant, ``Semantics Aware Malware Detection,'' IEEE Symposium on Security and Privacy, May, 2005, pp. 32-46.
• V. Ganapathy, S. A. Seshia, S. Jha, T. W. Reps, and R. E. Bryant, ``Automatic Discovery of API-Level Exploits,'' International Conference on Software Engineering ICSE 05, May, 2005, pp. 312-321.
• S. A. Seshia, R. E. Bryant, and K. S. Stevens, ``Modeling and Verifying Circuits Using Generalized Relative Timing,'' IEEE International Symposium on Asynchronous Circuits and Systems, ASYNC 05, March, 2005, pp. 98-108.