dblp.uni-trier.dewww.uni-trier.de

John C. Mitchell

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
152EEJohn C. Mitchell, Arnab Roy, Mukund Sundararajan: An Automated Approach for Proving PCL Invariants. Electr. Notes Theor. Comput. Sci. 234: 93-113 (2009)
2008
151EEAdam Barth, Collin Jackson, John C. Mitchell: Robust defenses for cross-site request forgery. ACM Conference on Computer and Communications Security 2008: 75-88
150EEJohn C. Mitchell, Arnab Roy, Paul Rowe, Andre Scedrov: Analysis of EAP-GPSK Authentication Protocol. ACNS 2008: 309-327
149EESergio Maffeis, John C. Mitchell, Ankur Taly: An Operational Semantics for JavaScript. APLAS 2008: 307-325
148EELorenzo Martignoni, Elizabeth Stinson, Matt Fredrikson, Somesh Jha, John C. Mitchell: A Layered Architecture for Detecting Malicious Behaviors. RAID 2008: 78-97
147EEAdam Barth, Collin Jackson, John C. Mitchell: Securing Frame Communication in Browsers. USENIX Security Symposium 2008: 17-30
146EEElizabeth Stinson, John C. Mitchell: Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection Methods. WOOT 2008
145EEElizabeth Stinson, John C. Mitchell: Characterizing Bots' Remote Control Behavior. Botnet Detection 2008: 45-64
144EERalf Küsters, Anupam Datta, John C. Mitchell, Ajith Ramanathan: On the Relationships between Notions of Simulation-Based Security. J. Cryptology 21(4): 492-546 (2008)
2007
143EEAdam Barth, John C. Mitchell, Anupam Datta, Sharada Sundaram: Privacy and Utility in Business Processes. CSF 2007: 279-294
142EEElizabeth Stinson, John C. Mitchell: Characterizing Bots' Remote Control Behavior. DIMVA 2007: 89-108
141EEArnab Roy, Anupam Datta, Ante Derek, John C. Mitchell: Inductive Proofs of Computational Secrecy. ESORICS 2007: 219-234
140EEArnab Roy, Anupam Datta, John C. Mitchell: Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols. TGC 2007: 312-329
139EEAnupam Datta, Ante Derek, John C. Mitchell, Arnab Roy: Protocol Composition Logic (PCL). Electr. Notes Theor. Comput. Sci. 172: 311-358 (2007)
2006
138EEArnab Roy, Anupam Datta, Ante Derek, John C. Mitchell, Jean-Pierre Seifert: Secrecy Analysis in Protocol Composition Logic. ASIAN 2006: 197-213
137EEAnupam Datta, Ante Derek, John C. Mitchell, Bogdan Warinschi: Computationally Sound Compositional Logic for Key Exchange Protocols. CSFW 2006: 321-334
136EEAdam Barth, Anupam Datta, John C. Mitchell, Helen Nissenbaum: Privacy and Contextual Integrity: Framework and Applications. IEEE Symposium on Security and Privacy 2006: 184-198
135EEAdam Barth, John C. Mitchell: Managing Digital Rights using Linear Logic. LICS 2006: 127-136
134EEAnupam Datta, Ante Derek, John C. Mitchell, Ajith Ramanathan, Andre Scedrov: Games and the Impossibility of Realizable Ideal Functionality. TCC 2006: 360-379
133EECollin Jackson, Andrew Bortz, Dan Boneh, John C. Mitchell: Protecting browser state from web privacy attacks. WWW 2006: 737-744
132EECollin Jackson, Andrew Bortz, Dan Boneh, John C. Mitchell: Protecting browser state from web privacy attacks. WWW 2006: 737-744
131EENinghui Li, John C. Mitchell: Understanding SPKI/SDSI using first-order logic. Int. J. Inf. Sec. 5(1): 48-64 (2006)
130EEJohn C. Mitchell, Ajith Ramanathan, Andre Scedrov, Vanessa Teague: A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols. Theor. Comput. Sci. 353(1-3): 118-164 (2006)
129EEMichael Backes, Anupam Datta, Ante Derek, John C. Mitchell, Mathieu Turuani: Compositional analysis of contract-signing protocols. Theor. Comput. Sci. 367(1-2): 33-56 (2006)
2005
128 Vijay Atluri, Pierangela Samarati, Ralf Küsters, John C. Mitchell: Proceedings of the 2005 ACM workshop on Formal methods in security engineering, FMSE 2005, Fairfax, VA, USA, November 11, 2005 ACM 2005
127EEChanghua He, Mukund Sundararajan, Anupam Datta, Ante Derek, John C. Mitchell: A modular correctness proof of IEEE 802.11i and TLS. ACM Conference on Computer and Communications Security 2005: 2-15
126EEMichael Backes, Anupam Datta, Ante Derek, John C. Mitchell, Mathieu Turuani: Compositional Analysis of Contract Signing Protocols. CSFW 2005: 94-110
125EEAnupam Datta, Ante Derek, John C. Mitchell, Vitaly Shmatikov, Mathieu Turuani: Probabilistic Polynomial-Time Semantics for a Protocol Security Logic. ICALP 2005: 16-29
124EEChanghua He, John C. Mitchell: Security Analysis and Improvements for IEEE 802.11i. NDSS 2005
123EEJohn C. Mitchell: Security analysis of network protocols: logical and computational methods. PPDP 2005: 151-152
122EEAnupam Datta, Ralf Küsters, John C. Mitchell, Ajith Ramanathan: On the Relationships Between Notions of Simulation-Based Security. TCC 2005: 476-494
121EEAdam Barth, John C. Mitchell: Enterprise privacy promises and enforcement. WITS 2005: 58-66
120EENinghui Li, John C. Mitchell, William H. Winsborough: Beyond proof-of-compliance: security analysis in trust management. J. ACM 52(3): 474-514 (2005)
119EERohit Chadha, John C. Mitchell, Andre Scedrov, Vitaly Shmatikov: Contract signing, optimism, and advantage. J. Log. Algebr. Program. 64(2): 189-218 (2005)
118EEAnupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic: A derivation system and compositional logic for security protocols. Journal of Computer Security 13(3): 423-482 (2005)
2004
117 Jean-Jacques Lévy, Ernst W. Mayr, John C. Mitchell: Exploring New Frontiers of Theoretical Informatics, IFIP 18th World Computer Congress, TC1 3rd International Conference on Theoretical Computer Science (TCS2004), 22-27 August 2004, Toulouse, France Kluwer 2004
116EENinghui Li, John C. Mitchell, Derrick Tong: Securing Java RMI-Based Distributed Applications. ACSAC 2004: 262-271
115EEAnupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic: Abstraction and Refinement in Protocol Derivation. CSFW 2004: 30-
114EEAjith Ramanathan, John C. Mitchell, Andre Scedrov, Vanessa Teague: Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols. FoSSaCS 2004: 468-483
113EEAjay Chander, Drew Dean, John C. Mitchell: A Distributed High Assurance Reference Monitor. ISC 2004: 231-244
112EENeil Chou, Robert Ledesma, Yuka Teraguchi, John C. Mitchell: Client-Side Defense Against Web-Based Identity Theft. NDSS 2004
111EEAdam Barth, John C. Mitchell, Justin Rosenstein: Conflict and combination in privacy policy languages. WPES 2004: 45-46
110EEChanghua He, John C. Mitchell: Analysis of the 802.11i 4-way handshake. Workshop on Wireless Security 2004: 43-50
109 Ajay Chander, Drew Dean, John C. Mitchell: Reconstructing Trust Management. Journal of Computer Security 12(1): 131-164 (2004)
108 Nancy A. Durgin, Patrick Lincoln, John C. Mitchell: Multiset rewriting and the complexity of bounded security protocols. Journal of Computer Security 12(2): 247-311 (2004)
2003
107EEPaulo Mateus, John C. Mitchell, Andre Scedrov: Composition of Cryptographic Protocols in a Probabilistic Polynomial-Time Process Calculus. CONCUR 2003: 323-345
106EERohit Chadha, John C. Mitchell, Andre Scedrov, Vitaly Shmatikov: Contract Signing, Optimism, and Advantage. CONCUR 2003: 361-377
105EEAnupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic: A Derivation System for Security Protocols and its Logical Formalization. CSFW 2003: 109-125
104EENinghui Li, John C. Mitchell: Understanding SPKI/SDSI Using First-Order Logic. CSFW 2003: 89-
103EENinghui Li, John C. Mitchell: A Role-based Trust-management Framework. DISCEX (1) 2003: 201-
102EEAnupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic: Secure protocol composition. FMSE 2003: 11-23
101EEMichael Backes, Catherine Meadows, John C. Mitchell: Relating cryptography and formal methods: a panel. FMSE 2003: 61-66
100EENinghui Li, William H. Winsborough, John C. Mitchell: Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management. IEEE Symposium on Security and Privacy 2003: 123-139
99EEDavid Lie, John C. Mitchell, Chandramohan A. Thekkath, Mark Horowitz: Specifying and Verifying Hardware for Tamper-Resistant Software. IEEE Symposium on Security and Privacy 2003: 166-
98EENinghui Li, John C. Mitchell: DATALOG with Constraints: A Foundation for Trust Management Languages. PADL 2003: 58-73
97EEStephen N. Freund, John C. Mitchell: A Type System for the Java Bytecode Language and Verifier. J. Autom. Reasoning 30(3-4): 271-321 (2003)
96 Ninghui Li, William H. Winsborough, John C. Mitchell: Distributed Credential Chain Discovery in Trust Management. Journal of Computer Security 11(1): 35-86 (2003)
95 Nancy A. Durgin, John C. Mitchell, Dusko Pavlovic: A Compositional Logic for Proving Security Properties of Protocols. Journal of Computer Security 11(4): 677-722 (2003)
94EEMourad Debbabi, Nancy A. Durgin, Mohamed Mejri, John C. Mitchell: Security by typing. STTT 4(4): 472-495 (2003)
2002
93EENinghui Li, John C. Mitchell, William H. Winsborough: Design of a Role-Based Trust-Management Framework. IEEE Symposium on Security and Privacy 2002: 114-130
92EEIliano Cervesato, Nancy A. Durgin, Patrick Lincoln, John C. Mitchell, Andre Scedrov: A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis. ISSS 2002: 356-383
91EEJohn C. Mitchell, Vanessa Teague: Autonomous Nodes and Distributed Mechanisms. ISSS 2002: 58-83
90EEJohn C. Mitchell: Multiset Rewriting and Security Protocol Analysis. RTA 2002: 19-22
89EEVitaly Shmatikov, John C. Mitchell: Finite-state analysis of two contract signing protocols. Theor. Comput. Sci. 283(2): 419-450 (2002)
2001
88EENinghui Li, William H. Winsborough, John C. Mitchell: Distributed credential chain discovery in trust management: extended abstract. ACM Conference on Computer and Communications Security 2001: 156-165
87EENancy A. Durgin, John C. Mitchell, Dusko Pavlovic: A Compositional Logic for Protocol Correctness. CSFW 2001: 241-
86EEAjay Chander, John C. Mitchell, Drew Dean: A State-Transition Model of Trust Management and Access Control. CSFW 2001: 27-43
85EEJohn C. Mitchell: Probabilistic Polynomial-Time Process Calculus and Security Protocol Analysis. ESOP 2001: 23-29
84 John C. Mitchell, Ajith Ramanathan, Andre Scedrov, Vanessa Teague: Probabilistic Polynominal-Time Process Calculus and Security Protocol Analysis. LICS 2001: 3-8
83EEJohn C. Mitchell: Programming language methods in computer security. POPL 2001: 1-3
82EEJohn C. Mitchell, Ajith Ramanathan, Andre Scedrov, Vanessa Teague: A Probabilistic Polynomial-time Calculus For Analysis of Cryptographic Protocols (Preliminary Report). Electr. Notes Theor. Comput. Sci. 45: (2001)
2000
81EEDavid Lie, Chandramohan A. Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John C. Mitchell, Mark Horowitz: Architectural Support for Copy and Tamper Resistant Software. ASPLOS 2000: 168-177
80EEIliano Cervesato, Nancy A. Durgin, John C. Mitchell, Patrick Lincoln, Andre Scedrov: Relating Strands and Multiset Rewriting for Security Protocol Analysis. CSFW 2000: 35-51
79EEVitaly Shmatikov, John C. Mitchell: Analysis of Abuse-Free Contract Signing. Financial Cryptography 2000: 174-191
78EEVitaly Shmatikov, John C. Mitchell: Analysis of a Fair Exchange Protocol. NDSS 2000
1999
77EEIliano Cervesato, Nancy A. Durgin, Patrick Lincoln, John C. Mitchell, Andre Scedrov: A Meta-Notation for Protocol Analysis. CSFW 1999: 55-69
76EEStephen N. Freund, John C. Mitchell: A Formal Framework for the Java Bytecode Language and Verifier. OOPSLA 1999: 147-166
75EEPatrick Lincoln, John C. Mitchell, Mark Mitchell, Andre Scedrov: Probabilistic Polynomial-Time Equivalence and Security Analysis. World Congress on Formal Methods 1999: 776-793
74EEStephen N. Freund, John C. Mitchell: The type system for object initializatiion in the Jave bytecode language. ACM Trans. Program. Lang. Syst. 21(6): 1196-1250 (1999)
73EEViviana Bono, John C. Mitchell, Amit Patel, Vitaly Shmatikov: A Core Calculus of Classes and Objects. Electr. Notes Theor. Comput. Sci. 20: (1999)
72EERobert Harper, John C. Mitchell: Parametricity and Variants of Girard's J Operator. Inf. Process. Lett. 70(1): 1-5 (1999)
71EEPatrick Lincoln, John C. Mitchell, Andre Scedrov: Optimization Complexity of Linear Logic Proof Games. Theor. Comput. Sci. 227(1-2): 299-331 (1999)
1998
70EEPatrick Lincoln, John C. Mitchell, Mark Mitchell, Andre Scedrov: A Probabilistic Poly-Time Framework for Protocol Analysis. ACM Conference on Computer and Communications Security 1998: 112-121
69 John C. Mitchell: Finite-State Analysis of Security Protocols. CAV 1998: 71-76
68EEJohn C. Mitchell, Mark Mitchell, Andre Scedrov: A Linguistic Characterization of Bounded Oracle Computation and Probabilistic Polynomial Time. FOCS 1998: 725-733
67EEStephen N. Freund, John C. Mitchell: A Type System for Object Initialization in the Java Bytecode Language. OOPSLA 1998: 310-327
66 Kathleen Fisher, John C. Mitchell: On the Relationship Between Classes, Objects, and Data Abstraction. TAPOS 4(1): 3-25 (1998)
1997
65EEJohn C. Mitchell, Mark Mitchell, Ulrich Stern: Automated analysis of cryptographic protocols using Mur-phi. IEEE Symposium on Security and Privacy 1997: 141-151
64 Ole Agesen, Stephen N. Freund, John C. Mitchell: Adding Type Parameterization to the Java Language. OOPSLA 1997: 49-65
63EEStephen N. Freund, John C. Mitchell: A Type System For Object Initialization In the Java Bytecode Language. Electr. Notes Theor. Comput. Sci. 10: (1997)
62 Robert Harper, John C. Mitchell: ML and Beyond. SIGPLAN Notices 32(1): 80-85 (1997)
1996
61 John C. Mitchell, Ramesh Viswanathan: Effective Models of Polymorphism, Subtyping and Recursion (Extended Abstract). ICALP 1996: 170-181
60 Carl A. Gunter, John C. Mitchell, David Notkin: Strategic Directions in Software Engineering and Programming Languages. ACM Comput. Surv. 28(4): 727-737 (1996)
59 Robert Harper, John C. Mitchell: ML and Beyond. ACM Comput. Surv. 28(4es): 219 (1996)
58EEPatrick Lincoln, John C. Mitchell, Andre Scedrov: Linear logic proof games and optimization. Bulletin of Symbolic Logic 2(3): 322-338 (1996)
57EEPatrick Lincoln, John C. Mitchell, Andre Scedrov: The Complexity of Local Proof Search in Linear Logic. Electr. Notes Theor. Comput. Sci. 3: (1996)
56 John C. Mitchell, Ramesh Viswanathan: Standard ML-NJ Weak Polymorphism and Imperative Constructs. Inf. Comput. 127(2): 102-116 (1996)
1995
55 Kathleen Fisher, John C. Mitchell: A Delegation-based Object Calculus with Subtying. FCT 1995: 42-61
54 My Hoang, John C. Mitchell: Lower Bounds on Type Inference with Subtypes. POPL 1995: 176-185
53 Kathleen Fisher, John C. Mitchell: The Development of Type Systems for Object-Oriented Languages. TAPOS 1(3): 189-220 (1995)
1994
52 Masami Hagiya, John C. Mitchell: Theoretical Aspects of Computer Software, International Conference TACS '94, Sendai, Japan, April 19-22, 1994, Proceedings Springer 1994
51 Dinesh Katiyar, David C. Luckham, John C. Mitchell: A Type System for Prototyping Languages. POPL 1994: 138-150
50 Kathleen Fisher, John C. Mitchell: Notes on Typed Object-Oriented Programming. TACS 1994: 844-885
49 Dinesh Katiyar, David C. Luckham, John C. Mitchell: Polymorphism and Subtyping in Interfaces. Workshop on Interface Definition Languages 1994: 22-34
48 Luca Cardelli, Simone Martini, John C. Mitchell, Andre Scedrov: An Extension of System F with Subtyping Inf. Comput. 109(1/2): 4-56 (1994)
47 Kathleen Fisher, Furio Honsell, John C. Mitchell: A lambda Calculus of Objects and Method Specialization. Nord. J. Comput. 1(1): 3-37 (1994)
1993
46 My Hoang, John C. Mitchell, Ramesh Viswanathan: Standard ML-NJ weak polymorphism and imperative constructs LICS 1993: 15-25
45 John C. Mitchell, Furio Honsell, Kathleen Fisher: A lambda calculus of objects and method specialization LICS 1993: 26-38
44EERobert Harper, John C. Mitchell: On the Type Structure of Standard ML. ACM Trans. Program. Lang. Syst. 15(2): 211-252 (1993)
43 Lalita Jategaonkar, John C. Mitchell: Type Inference with Extended Pattern Matching and Subtypes. Fundam. Inform. 19(1/2): 127-165 (1993)
42 John C. Mitchell: On Abstraction and the Expressive Power of Programming Languages. Sci. Comput. Program. 21(2): 141-163 (1993)
1992
41 John C. Mitchell, Andre Scedrov: Notes on Sconing and Relators. CSL 1992: 352-378
40 Patrick Lincoln, John C. Mitchell: Operational aspects of linear lambda calculus LICS 1992: 235-246
39 Patrick Lincoln, John C. Mitchell: Algorithmic Aspects of Type Inference with Subtypes. POPL 1992: 293-304
38 Kim B. Bruce, John C. Mitchell: PER Models of Subtyping, Recursive Types and Higher-Order Polymorphism. POPL 1992: 316-327
37 Patrick Lincoln, John C. Mitchell, Andre Scedrov, Natarajan Shankar: Decision Problems for Propositional Linear Logic. Ann. Pure Appl. Logic 56(1-3): 239-311 (1992)
1991
36 Paris C. Kanellakis, Harry G. Mairson, John C. Mitchell: Unification and ML-Type Reconstruction. Computational Logic - Essays in Honor of Alan Robinson 1991: 444-478
35 Stuart A. Kurtz, John C. Mitchell, Michael J. O'Donnell: Connecting Formal Semantics to Constructive Intuitions. Constructivity in Computer Science 1991: 1-21
34 John C. Mitchell, Sigurd Meldal, Neel Madhav: An Extension of Standard ML Modules with Subtyping and Inheritance. POPL 1991: 270-278
33 John C. Mitchell: On Abstraction and the Expressive Power of Programming Languages. TACS 1991: 290-310
32 Luca Cardelli, Simone Martini, John C. Mitchell, Andre Scedrov: An Extension of System F with Subtyping. TACS 1991: 750-770
31 John C. Mitchell, Eugenio Moggi: Kripke-Style Models for Typed lambda Calculus. Ann. Pure Appl. Logic 51(1-2): 99-124 (1991)
30 John C. Mitchell: Type Inference With Simple Subtypes. J. Funct. Program. 1(3): 245-285 (1991)
29 Luca Cardelli, John C. Mitchell: Operations on Records. Mathematical Structures in Computer Science 1(1): 3-48 (1991)
1990
28 Patrick Lincoln, John C. Mitchell, Andre Scedrov, Natarajan Shankar: Decision Problems for Propositional Linear Logic FOCS 1990: 662-671
27EEBrian T. Howard, John C. Mitchell: Operational and Axiomatic Semantics of PCF. LISP and Functional Programming 1990: 298-306
26 John C. Mitchell: Toward a Typed Foundation for Method Specialization and Inheritance. POPL 1990: 109-124
25 Robert Harper, John C. Mitchell, Eugenio Moggi: Higher-Order Modules and the Phase Distinction. POPL 1990: 341-354
24 John C. Mitchell: Type Systems for Programming Languages. Handbook of Theoretical Computer Science, Volume B: Formal Models and Sematics (B) 1990: 365-458
23 Kim B. Bruce, Albert R. Meyer, John C. Mitchell: The Semantics of Second-Order Lambda Calculus Inf. Comput. 85(1): 76-134 (1990)
1989
22 Luca Cardelli, John C. Mitchell: Operations in Records. Category Theory and Computer Science 1989: 75-81
21EEPeter S. Canning, William R. Cook, Walter L. Hill, Walter G. Olthoff, John C. Mitchell: F-Bounded Polymorphism for Object-Oriented Programming. FPCA 1989: 273-280
20 Luca Cardelli, John C. Mitchell: Operations on Records. Mathematical Foundations of Programming Semantics 1989: 22-52
19 Paris C. Kanellakis, John C. Mitchell: Polymorphic Unification and ML Typing. POPL 1989: 105-115
1988
18EELalita Jategaonkar, John C. Mitchell: ML with Extended Pattern Matching and Subtypes. LISP and Functional Programming 1988: 198-211
17 John C. Mitchell, Robert Harper: The Essence of ML. POPL 1988: 28-46
16EEJohn C. Mitchell, Gordon D. Plotkin: Abstract Types Have Existential Type. ACM Trans. Program. Lang. Syst. 10(3): 470-502 (1988)
15 John C. Mitchell: Polymorphic Type Inference and Containment Inf. Comput. 76(2/3): 211-249 (1988)
1987
14 John C. Mitchell, Eugenio Moggi: Kripke-Style models for typed lambda calculus LICS 1987: 303-314
13 Albert R. Meyer, John C. Mitchell, Eugenio Moggi, Richard Statman: Empty Types in Polymorphic Lambda Calculus. POPL 1987: 253-262
1986
12 John C. Mitchell: A Type-Inference Approach to Reduction Properties and Semantics of Polymorphic Expressions (Summary). LISP and Functional Programming 1986: 308-319
11 John C. Mitchell: Representation Independence and Data Abstraction. POPL 1986: 263-276
10 John C. Mitchell, Michael J. O'Donnell: Realisability Semantics for Error-Tolerant Logics. TARK 1986: 363-382
1985
9 John C. Mitchell, Albert R. Meyer: Second-Order Logical Relations (Extended Abstract). Logic of Programs 1985: 225-236
8 John C. Mitchell, Gordon D. Plotkin: Abstract Types Have Existential Type. POPL 1985: 37-51
1984
7 John C. Mitchell: Semantic Models for Second-Order Lambda Calculus FOCS 1984: 289-299
6 John C. Mitchell: Coercion and Type Inference. POPL 1984: 175-185
5 Cynthia Dwork, Paris C. Kanellakis, John C. Mitchell: On the Sequential Nature of Unification. J. Log. Program. 1(1): 35-50 (1984)
1983
4EEJohn C. Mitchell: Inference Rules for Functional and Inclusion Dependencies. PODS 1983: 58-69
3 Albert R. Meyer, John C. Mitchell: Termination Assertions for Recursive Programs: Completeness and Axiomatic Definability Information and Control 56(1/2): 112-138 (1983)
2 John C. Mitchell: The Implication Problem for Functional and Inclusion Dependencies Information and Control 56(3): 154-173 (1983)
1982
1 Albert R. Meyer, John C. Mitchell: Axiomatic Definability and Completeness for Recursive Programs. POPL 1982: 337-346

Coauthor Index

1Ole Agesen [64]
2Vijayalakshmi Atluri (Vijay Atluri) [128]
3Michael Backes [101] [126] [129]
4Adam Barth [111] [121] [135] [136] [143] [147] [151]
5Dan Boneh [81] [132] [133]
6Viviana Bono [73]
7Andrew Bortz [132] [133]
8Kim B. Bruce [23] [38]
9Peter S. Canning [21]
10Luca Cardelli [20] [22] [29] [32] [48]
11Iliano Cervesato [77] [80] [92]
12Rohit Chadha [106] [119]
13Ajay Chander [86] [109] [113]
14Neil Chou [112]
15William R. Cook [21]
16Anupam Datta [102] [105] [115] [118] [122] [125] [126] [127] [129] [134] [136] [137] [138] [139] [140] [141] [143] [144]
17Drew Dean [86] [109] [113]
18Mourad Debbabi [94]
19Ante Derek [102] [105] [115] [118] [125] [126] [127] [129] [134] [137] [138] [139] [141]
20Nancy A. Durgin [77] [80] [87] [92] [94] [95] [108]
21Cynthia Dwork [5]
22Kathleen Fisher [45] [47] [50] [53] [55] [66]
23Matt Fredrikson [148]
24Stephen N. Freund [63] [64] [67] [74] [76] [97]
25Carl A. Gunter [60]
26Masami Hagiya [52]
27Robert Harper [17] [25] [44] [59] [62] [72]
28Changhua He [110] [124] [127]
29Walter L. Hill [21]
30My Hoang [46] [54]
31Furio Honsell [45] [47]
32Mark Horowitz [81] [99]
33Brian T. Howard [27]
34Collin Jackson [132] [133] [147] [151]
35Lalita Jategaonkar Jagadeesan (Lalita Jategaonkar) [18] [43]
36Somesh Jha [148]
37Paris C. Kanellakis [5] [19] [36]
38Dinesh Katiyar [49] [51]
39Stuart A. Kurtz [35]
40Ralf Küsters [122] [128] [144]
41Robert Ledesma [112]
42Jean-Jacques Lévy [117]
43Ninghui Li [88] [93] [96] [98] [100] [103] [104] [116] [120] [131]
44David Lie [81] [99]
45Patrick Lincoln [28] [37] [39] [40] [57] [58] [70] [71] [75] [77] [80] [81] [92] [108]
46David C. Luckham [49] [51]
47Neel Madhav [34]
48Sergio Maffeis [149]
49Harry G. Mairson [36]
50Lorenzo Martignoni [148]
51Simone Martini [32] [48]
52Paulo Mateus [107]
53Ernst W. Mayr [117]
54Catherine Meadows [101]
55Mohamed Mejri [94]
56Sigurd Meldal [34]
57Albert R. Meyer [1] [3] [9] [13] [23]
58Mark Mitchell [65] [68] [70] [75] [81]
59Eugenio Moggi [13] [14] [25] [31]
60Helen Nissenbaum [136]
61David Notkin [60]
62Michael J. O'Donnell [10] [35]
63Walter G. Olthoff [21]
64Amit Patel [73]
65Dusko Pavlovic [87] [95] [102] [105] [115] [118]
66Gordon D. Plotkin [8] [16]
67Ajith Ramanathan [82] [84] [114] [122] [130] [134] [144]
68Justin Rosenstein [111]
69Paul Rowe [150]
70Arnab Roy [138] [139] [140] [141] [150] [152]
71Pierangela Samarati [128]
72Andre Scedrov [28] [32] [37] [41] [48] [57] [58] [68] [70] [71] [75] [77] [80] [82] [84] [92] [106] [107] [114] [119] [130] [134] [150]
73Jean-Pierre Seifert [138]
74Natarajan Shankar [28] [37]
75Vitaly Shmatikov [73] [78] [79] [89] [106] [119] [125]
76Richard Statman [13]
77Ulrich Stern [65]
78Elizabeth Stinson [142] [145] [146] [148]
79Sharada Sundaram [143]
80Mukund Sundararajan [127] [152]
81Ankur Taly [149]
82Vanessa Teague [82] [84] [91] [114] [130]
83Yuka Teraguchi [112]
84Chandramohan A. Thekkath [81] [99]
85Derrick Tong [116]
86Mathieu Turuani [125] [126] [129]
87Ramesh Viswanathan [46] [56] [61]
88Bogdan Warinschi [137]
89William H. Winsborough [88] [93] [96] [100] [120]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)