| 2009 |
| 30 | EE | Arjun Guha,
Shriram Krishnamurthi,
Trevor Jim:
Using static analysis for Ajax intrusion detection.
WWW 2009: 561-570 |
| 2007 |
| 29 | EE | Mary F. Fernández,
Trevor Jim,
Kristi Morton,
Nicola Onose,
Jérôme Siméon:
Highly distributed XQuery with DXQ.
SIGMOD Conference 2007: 1159-1161 |
| 28 | EE | Trevor Jim,
Nikhil Swamy,
Michael Hicks:
Defeating script injection attacks with browser-enforced embedded policies.
WWW 2007: 601-610 |
| 27 | EE | Mary F. Fernández,
Trevor Jim,
Kristi Morton,
Nicola Onose,
Jérôme Siméon:
DXQ: a distributed XQuery scripting language.
XIME-P 2007 |
| 2006 |
| 26 | EE | Mohan Rajagopalan,
Matti A. Hiltunen,
Trevor Jim,
Richard D. Schlichting:
System Call Monitoring Using Authenticated System Calls.
IEEE Trans. Dependable Sec. Comput. 3(3): 216-229 (2006) |
| 25 | EE | Nikhil Swamy,
Michael W. Hicks,
Greg Morrisett,
Dan Grossman,
Trevor Jim:
Safe manual memory management in Cyclone.
Sci. Comput. Program. 62(2): 122-144 (2006) |
| 2005 |
| 24 | EE | Mohan Rajagopalan,
Matti A. Hiltunen,
Trevor Jim,
Richard D. Schlichting:
Authenticated System Calls.
DSN 2005: 358-367 |
| 23 | | Serban Jora,
Rittwik Jana,
Yih-Farn Chen,
Matti A. Hiltunen,
Trevor Jim,
Huale Huang,
King Ow,
Ashish K. Singh,
Radhakrishnan Muthumanickam:
An Alerting and Notification Service on the AT&T Enterprise Messaging Network.
EuroIMSA 2005: 215-220 |
| 22 | EE | Christof Fetzer,
Trevor Jim:
Dependable Distributed Computing Using Free Databases.
ISAS 2005: 123-136 |
| 21 | EE | Christof Fetzer,
Gert Pfeifer,
Trevor Jim:
Enhancing DNS Security using the SSL Trust Infrastructure.
WORDS 2005: 21-27 |
| 20 | EE | Jens Palsberg,
Tian Zhao,
Trevor Jim:
Automatic discovery of covariant read-only fields.
ACM Trans. Program. Lang. Syst. 27(1): 126-162 (2005) |
| 2004 |
| 19 | EE | Michael W. Hicks,
J. Gregory Morrisett,
Dan Grossman,
Trevor Jim:
Experience with safe manual memory-management in cyclone.
ISMM 2004: 73-84 |
| 2003 |
| 18 | EE | Frederick Smith,
Dan Grossman,
J. Gregory Morrisett,
Luke Hornof,
Trevor Jim:
Compiling for template-based run-time code generation.
J. Funct. Program. 13(3): 677-708 (2003) |
| 17 | | Yih-Farn Chen,
Huale Huang,
Rittwik Jana,
Trevor Jim,
Matti A. Hiltunen,
Sam John,
Serban Jora,
Radhakrishnan Muthumanickam,
Bin Wei:
iMobile EE - An Enterprise Mobile Service Platform.
Wireless Networks 9(4): 283-297 (2003) |
| 2002 |
| 16 | EE | Dan Grossman,
J. Gregory Morrisett,
Trevor Jim,
Michael W. Hicks,
Yanling Wang,
James Cheney:
Region-Based Memory Management in Cyclone.
PLDI 2002: 282-293 |
| 15 | EE | Trevor Jim,
J. Gregory Morrisett,
Dan Grossman,
Michael W. Hicks,
James Cheney,
Yanling Wang:
Cyclone: A Safe Dialect of C.
USENIX Annual Technical Conference, General Track 2002: 275-288 |
| 2001 |
| 14 | EE | Trevor Jim:
SD3: A Trust Management System with Certified Evaluation.
IEEE Symposium on Security and Privacy 2001: 106-115 |
| 13 | EE | Trevor Jim,
Dan Suciu:
Dynamically Distributed Query Evaluation.
PODS 2001 |
| 2000 |
| 12 | | Trevor Jim:
A Polar Type System.
ICALP Satellite Workshops 2000: 323-338 |
| 11 | EE | Pankaj Kakkar,
Michael McDougall,
Carl A. Gunter,
Trevor Jim:
Certificate Distribution with Local Autonomy.
IWAN 2000: 277-295 |
| 10 | EE | Carl A. Gunter,
Trevor Jim:
Generalized Certificate Revocation.
POPL 2000: 316-329 |
| 9 | | Carl A. Gunter,
Trevor Jim:
Policy-directed certificate retrieval.
Softw., Pract. Exper. 30(15): 1609-1640 (2000) |
| 1999 |
| 8 | | Luke Hornof,
Trevor Jim:
Certifying Compilation and Run-Time Code Generation.
PEPM 1999: 60-74 |
| 7 | | Luke Hornof,
Trevor Jim:
Certifying Compilation and Run-Time Code Generation.
Higher-Order and Symbolic Computation 12(4): 337-375 (1999) |
| 1997 |
| 6 | | Andrew W. Appel,
Trevor Jim:
Shrinking lambda Expressions in Linear Time.
J. Funct. Program. 7(5): 515-540 (1997) |
| 5 | | Jens Palsberg,
Trevor Jim:
Type Inference with Simple Selftypes is NP-complete.
Nord. J. Comput. 4(2): 259-286 (1997) |
| 1996 |
| 4 | EE | Trevor Jim:
What Are Principal Typings and What Are They Good For?
POPL 1996: 42-53 |
| 3 | | Trevor Jim,
Albert R. Meyer:
Full Abstraction and the Context Lemma.
SIAM J. Comput. 25(3): 663-696 (1996) |
| 1991 |
| 2 | | Trevor Jim,
Albert R. Meyer:
Full Abstraction and the Context Lemma.
TACS 1991: 131-151 |
| 1989 |
| 1 | | Andrew W. Appel,
Trevor Jim:
Continuation-Passing, Closure-Passing Style.
POPL 1989: 293-302 |