2009 | ||
---|---|---|
152 | EE | John C. Mitchell, Arnab Roy, Mukund Sundararajan: An Automated Approach for Proving PCL Invariants. Electr. Notes Theor. Comput. Sci. 234: 93-113 (2009) |
2008 | ||
151 | EE | Adam Barth, Collin Jackson, John C. Mitchell: Robust defenses for cross-site request forgery. ACM Conference on Computer and Communications Security 2008: 75-88 |
150 | EE | John C. Mitchell, Arnab Roy, Paul Rowe, Andre Scedrov: Analysis of EAP-GPSK Authentication Protocol. ACNS 2008: 309-327 |
149 | EE | Sergio Maffeis, John C. Mitchell, Ankur Taly: An Operational Semantics for JavaScript. APLAS 2008: 307-325 |
148 | EE | Lorenzo Martignoni, Elizabeth Stinson, Matt Fredrikson, Somesh Jha, John C. Mitchell: A Layered Architecture for Detecting Malicious Behaviors. RAID 2008: 78-97 |
147 | EE | Adam Barth, Collin Jackson, John C. Mitchell: Securing Frame Communication in Browsers. USENIX Security Symposium 2008: 17-30 |
146 | EE | Elizabeth Stinson, John C. Mitchell: Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection Methods. WOOT 2008 |
145 | EE | Elizabeth Stinson, John C. Mitchell: Characterizing Bots' Remote Control Behavior. Botnet Detection 2008: 45-64 |
144 | EE | Ralf Küsters, Anupam Datta, John C. Mitchell, Ajith Ramanathan: On the Relationships between Notions of Simulation-Based Security. J. Cryptology 21(4): 492-546 (2008) |
2007 | ||
143 | EE | Adam Barth, John C. Mitchell, Anupam Datta, Sharada Sundaram: Privacy and Utility in Business Processes. CSF 2007: 279-294 |
142 | EE | Elizabeth Stinson, John C. Mitchell: Characterizing Bots' Remote Control Behavior. DIMVA 2007: 89-108 |
141 | EE | Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell: Inductive Proofs of Computational Secrecy. ESORICS 2007: 219-234 |
140 | EE | Arnab Roy, Anupam Datta, John C. Mitchell: Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols. TGC 2007: 312-329 |
139 | EE | Anupam Datta, Ante Derek, John C. Mitchell, Arnab Roy: Protocol Composition Logic (PCL). Electr. Notes Theor. Comput. Sci. 172: 311-358 (2007) |
2006 | ||
138 | EE | Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell, Jean-Pierre Seifert: Secrecy Analysis in Protocol Composition Logic. ASIAN 2006: 197-213 |
137 | EE | Anupam Datta, Ante Derek, John C. Mitchell, Bogdan Warinschi: Computationally Sound Compositional Logic for Key Exchange Protocols. CSFW 2006: 321-334 |
136 | EE | Adam Barth, Anupam Datta, John C. Mitchell, Helen Nissenbaum: Privacy and Contextual Integrity: Framework and Applications. IEEE Symposium on Security and Privacy 2006: 184-198 |
135 | EE | Adam Barth, John C. Mitchell: Managing Digital Rights using Linear Logic. LICS 2006: 127-136 |
134 | EE | Anupam Datta, Ante Derek, John C. Mitchell, Ajith Ramanathan, Andre Scedrov: Games and the Impossibility of Realizable Ideal Functionality. TCC 2006: 360-379 |
133 | EE | Collin Jackson, Andrew Bortz, Dan Boneh, John C. Mitchell: Protecting browser state from web privacy attacks. WWW 2006: 737-744 |
132 | EE | Collin Jackson, Andrew Bortz, Dan Boneh, John C. Mitchell: Protecting browser state from web privacy attacks. WWW 2006: 737-744 |
131 | EE | Ninghui Li, John C. Mitchell: Understanding SPKI/SDSI using first-order logic. Int. J. Inf. Sec. 5(1): 48-64 (2006) |
130 | EE | John C. Mitchell, Ajith Ramanathan, Andre Scedrov, Vanessa Teague: A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols. Theor. Comput. Sci. 353(1-3): 118-164 (2006) |
129 | EE | Michael Backes, Anupam Datta, Ante Derek, John C. Mitchell, Mathieu Turuani: Compositional analysis of contract-signing protocols. Theor. Comput. Sci. 367(1-2): 33-56 (2006) |
2005 | ||
128 | Vijay Atluri, Pierangela Samarati, Ralf Küsters, John C. Mitchell: Proceedings of the 2005 ACM workshop on Formal methods in security engineering, FMSE 2005, Fairfax, VA, USA, November 11, 2005 ACM 2005 | |
127 | EE | Changhua He, Mukund Sundararajan, Anupam Datta, Ante Derek, John C. Mitchell: A modular correctness proof of IEEE 802.11i and TLS. ACM Conference on Computer and Communications Security 2005: 2-15 |
126 | EE | Michael Backes, Anupam Datta, Ante Derek, John C. Mitchell, Mathieu Turuani: Compositional Analysis of Contract Signing Protocols. CSFW 2005: 94-110 |
125 | EE | Anupam Datta, Ante Derek, John C. Mitchell, Vitaly Shmatikov, Mathieu Turuani: Probabilistic Polynomial-Time Semantics for a Protocol Security Logic. ICALP 2005: 16-29 |
124 | EE | Changhua He, John C. Mitchell: Security Analysis and Improvements for IEEE 802.11i. NDSS 2005 |
123 | EE | John C. Mitchell: Security analysis of network protocols: logical and computational methods. PPDP 2005: 151-152 |
122 | EE | Anupam Datta, Ralf Küsters, John C. Mitchell, Ajith Ramanathan: On the Relationships Between Notions of Simulation-Based Security. TCC 2005: 476-494 |
121 | EE | Adam Barth, John C. Mitchell: Enterprise privacy promises and enforcement. WITS 2005: 58-66 |
120 | EE | Ninghui Li, John C. Mitchell, William H. Winsborough: Beyond proof-of-compliance: security analysis in trust management. J. ACM 52(3): 474-514 (2005) |
119 | EE | Rohit Chadha, John C. Mitchell, Andre Scedrov, Vitaly Shmatikov: Contract signing, optimism, and advantage. J. Log. Algebr. Program. 64(2): 189-218 (2005) |
118 | EE | Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic: A derivation system and compositional logic for security protocols. Journal of Computer Security 13(3): 423-482 (2005) |
2004 | ||
117 | Jean-Jacques Lévy, Ernst W. Mayr, John C. Mitchell: Exploring New Frontiers of Theoretical Informatics, IFIP 18th World Computer Congress, TC1 3rd International Conference on Theoretical Computer Science (TCS2004), 22-27 August 2004, Toulouse, France Kluwer 2004 | |
116 | EE | Ninghui Li, John C. Mitchell, Derrick Tong: Securing Java RMI-Based Distributed Applications. ACSAC 2004: 262-271 |
115 | EE | Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic: Abstraction and Refinement in Protocol Derivation. CSFW 2004: 30- |
114 | EE | Ajith Ramanathan, John C. Mitchell, Andre Scedrov, Vanessa Teague: Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols. FoSSaCS 2004: 468-483 |
113 | EE | Ajay Chander, Drew Dean, John C. Mitchell: A Distributed High Assurance Reference Monitor. ISC 2004: 231-244 |
112 | EE | Neil Chou, Robert Ledesma, Yuka Teraguchi, John C. Mitchell: Client-Side Defense Against Web-Based Identity Theft. NDSS 2004 |
111 | EE | Adam Barth, John C. Mitchell, Justin Rosenstein: Conflict and combination in privacy policy languages. WPES 2004: 45-46 |
110 | EE | Changhua He, John C. Mitchell: Analysis of the 802.11i 4-way handshake. Workshop on Wireless Security 2004: 43-50 |
109 | Ajay Chander, Drew Dean, John C. Mitchell: Reconstructing Trust Management. Journal of Computer Security 12(1): 131-164 (2004) | |
108 | Nancy A. Durgin, Patrick Lincoln, John C. Mitchell: Multiset rewriting and the complexity of bounded security protocols. Journal of Computer Security 12(2): 247-311 (2004) | |
2003 | ||
107 | EE | Paulo Mateus, John C. Mitchell, Andre Scedrov: Composition of Cryptographic Protocols in a Probabilistic Polynomial-Time Process Calculus. CONCUR 2003: 323-345 |
106 | EE | Rohit Chadha, John C. Mitchell, Andre Scedrov, Vitaly Shmatikov: Contract Signing, Optimism, and Advantage. CONCUR 2003: 361-377 |
105 | EE | Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic: A Derivation System for Security Protocols and its Logical Formalization. CSFW 2003: 109-125 |
104 | EE | Ninghui Li, John C. Mitchell: Understanding SPKI/SDSI Using First-Order Logic. CSFW 2003: 89- |
103 | EE | Ninghui Li, John C. Mitchell: A Role-based Trust-management Framework. DISCEX (1) 2003: 201- |
102 | EE | Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic: Secure protocol composition. FMSE 2003: 11-23 |
101 | EE | Michael Backes, Catherine Meadows, John C. Mitchell: Relating cryptography and formal methods: a panel. FMSE 2003: 61-66 |
100 | EE | Ninghui Li, William H. Winsborough, John C. Mitchell: Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management. IEEE Symposium on Security and Privacy 2003: 123-139 |
99 | EE | David Lie, John C. Mitchell, Chandramohan A. Thekkath, Mark Horowitz: Specifying and Verifying Hardware for Tamper-Resistant Software. IEEE Symposium on Security and Privacy 2003: 166- |
98 | EE | Ninghui Li, John C. Mitchell: DATALOG with Constraints: A Foundation for Trust Management Languages. PADL 2003: 58-73 |
97 | EE | Stephen N. Freund, John C. Mitchell: A Type System for the Java Bytecode Language and Verifier. J. Autom. Reasoning 30(3-4): 271-321 (2003) |
96 | Ninghui Li, William H. Winsborough, John C. Mitchell: Distributed Credential Chain Discovery in Trust Management. Journal of Computer Security 11(1): 35-86 (2003) | |
95 | Nancy A. Durgin, John C. Mitchell, Dusko Pavlovic: A Compositional Logic for Proving Security Properties of Protocols. Journal of Computer Security 11(4): 677-722 (2003) | |
94 | EE | Mourad Debbabi, Nancy A. Durgin, Mohamed Mejri, John C. Mitchell: Security by typing. STTT 4(4): 472-495 (2003) |
2002 | ||
93 | EE | Ninghui Li, John C. Mitchell, William H. Winsborough: Design of a Role-Based Trust-Management Framework. IEEE Symposium on Security and Privacy 2002: 114-130 |
92 | EE | Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln, John C. Mitchell, Andre Scedrov: A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis. ISSS 2002: 356-383 |
91 | EE | John C. Mitchell, Vanessa Teague: Autonomous Nodes and Distributed Mechanisms. ISSS 2002: 58-83 |
90 | EE | John C. Mitchell: Multiset Rewriting and Security Protocol Analysis. RTA 2002: 19-22 |
89 | EE | Vitaly Shmatikov, John C. Mitchell: Finite-state analysis of two contract signing protocols. Theor. Comput. Sci. 283(2): 419-450 (2002) |
2001 | ||
88 | EE | Ninghui Li, William H. Winsborough, John C. Mitchell: Distributed credential chain discovery in trust management: extended abstract. ACM Conference on Computer and Communications Security 2001: 156-165 |
87 | EE | Nancy A. Durgin, John C. Mitchell, Dusko Pavlovic: A Compositional Logic for Protocol Correctness. CSFW 2001: 241- |
86 | EE | Ajay Chander, John C. Mitchell, Drew Dean: A State-Transition Model of Trust Management and Access Control. CSFW 2001: 27-43 |
85 | EE | John C. Mitchell: Probabilistic Polynomial-Time Process Calculus and Security Protocol Analysis. ESOP 2001: 23-29 |
84 | John C. Mitchell, Ajith Ramanathan, Andre Scedrov, Vanessa Teague: Probabilistic Polynominal-Time Process Calculus and Security Protocol Analysis. LICS 2001: 3-8 | |
83 | EE | John C. Mitchell: Programming language methods in computer security. POPL 2001: 1-3 |
82 | EE | John C. Mitchell, Ajith Ramanathan, Andre Scedrov, Vanessa Teague: A Probabilistic Polynomial-time Calculus For Analysis of Cryptographic Protocols (Preliminary Report). Electr. Notes Theor. Comput. Sci. 45: (2001) |
2000 | ||
81 | EE | David Lie, Chandramohan A. Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John C. Mitchell, Mark Horowitz: Architectural Support for Copy and Tamper Resistant Software. ASPLOS 2000: 168-177 |
80 | EE | Iliano Cervesato, Nancy A. Durgin, John C. Mitchell, Patrick Lincoln, Andre Scedrov: Relating Strands and Multiset Rewriting for Security Protocol Analysis. CSFW 2000: 35-51 |
79 | EE | Vitaly Shmatikov, John C. Mitchell: Analysis of Abuse-Free Contract Signing. Financial Cryptography 2000: 174-191 |
78 | EE | Vitaly Shmatikov, John C. Mitchell: Analysis of a Fair Exchange Protocol. NDSS 2000 |
1999 | ||
77 | EE | Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln, John C. Mitchell, Andre Scedrov: A Meta-Notation for Protocol Analysis. CSFW 1999: 55-69 |
76 | EE | Stephen N. Freund, John C. Mitchell: A Formal Framework for the Java Bytecode Language and Verifier. OOPSLA 1999: 147-166 |
75 | EE | Patrick Lincoln, John C. Mitchell, Mark Mitchell, Andre Scedrov: Probabilistic Polynomial-Time Equivalence and Security Analysis. World Congress on Formal Methods 1999: 776-793 |
74 | EE | Stephen N. Freund, John C. Mitchell: The type system for object initializatiion in the Jave bytecode language. ACM Trans. Program. Lang. Syst. 21(6): 1196-1250 (1999) |
73 | EE | Viviana Bono, John C. Mitchell, Amit Patel, Vitaly Shmatikov: A Core Calculus of Classes and Objects. Electr. Notes Theor. Comput. Sci. 20: (1999) |
72 | EE | Robert Harper, John C. Mitchell: Parametricity and Variants of Girard's J Operator. Inf. Process. Lett. 70(1): 1-5 (1999) |
71 | EE | Patrick Lincoln, John C. Mitchell, Andre Scedrov: Optimization Complexity of Linear Logic Proof Games. Theor. Comput. Sci. 227(1-2): 299-331 (1999) |
1998 | ||
70 | EE | Patrick Lincoln, John C. Mitchell, Mark Mitchell, Andre Scedrov: A Probabilistic Poly-Time Framework for Protocol Analysis. ACM Conference on Computer and Communications Security 1998: 112-121 |
69 | John C. Mitchell: Finite-State Analysis of Security Protocols. CAV 1998: 71-76 | |
68 | EE | John C. Mitchell, Mark Mitchell, Andre Scedrov: A Linguistic Characterization of Bounded Oracle Computation and Probabilistic Polynomial Time. FOCS 1998: 725-733 |
67 | EE | Stephen N. Freund, John C. Mitchell: A Type System for Object Initialization in the Java Bytecode Language. OOPSLA 1998: 310-327 |
66 | Kathleen Fisher, John C. Mitchell: On the Relationship Between Classes, Objects, and Data Abstraction. TAPOS 4(1): 3-25 (1998) | |
1997 | ||
65 | EE | John C. Mitchell, Mark Mitchell, Ulrich Stern: Automated analysis of cryptographic protocols using Mur-phi. IEEE Symposium on Security and Privacy 1997: 141-151 |
64 | Ole Agesen, Stephen N. Freund, John C. Mitchell: Adding Type Parameterization to the Java Language. OOPSLA 1997: 49-65 | |
63 | EE | Stephen N. Freund, John C. Mitchell: A Type System For Object Initialization In the Java Bytecode Language. Electr. Notes Theor. Comput. Sci. 10: (1997) |
62 | Robert Harper, John C. Mitchell: ML and Beyond. SIGPLAN Notices 32(1): 80-85 (1997) | |
1996 | ||
61 | John C. Mitchell, Ramesh Viswanathan: Effective Models of Polymorphism, Subtyping and Recursion (Extended Abstract). ICALP 1996: 170-181 | |
60 | Carl A. Gunter, John C. Mitchell, David Notkin: Strategic Directions in Software Engineering and Programming Languages. ACM Comput. Surv. 28(4): 727-737 (1996) | |
59 | Robert Harper, John C. Mitchell: ML and Beyond. ACM Comput. Surv. 28(4es): 219 (1996) | |
58 | EE | Patrick Lincoln, John C. Mitchell, Andre Scedrov: Linear logic proof games and optimization. Bulletin of Symbolic Logic 2(3): 322-338 (1996) |
57 | EE | Patrick Lincoln, John C. Mitchell, Andre Scedrov: The Complexity of Local Proof Search in Linear Logic. Electr. Notes Theor. Comput. Sci. 3: (1996) |
56 | John C. Mitchell, Ramesh Viswanathan: Standard ML-NJ Weak Polymorphism and Imperative Constructs. Inf. Comput. 127(2): 102-116 (1996) | |
1995 | ||
55 | Kathleen Fisher, John C. Mitchell: A Delegation-based Object Calculus with Subtying. FCT 1995: 42-61 | |
54 | My Hoang, John C. Mitchell: Lower Bounds on Type Inference with Subtypes. POPL 1995: 176-185 | |
53 | Kathleen Fisher, John C. Mitchell: The Development of Type Systems for Object-Oriented Languages. TAPOS 1(3): 189-220 (1995) | |
1994 | ||
52 | Masami Hagiya, John C. Mitchell: Theoretical Aspects of Computer Software, International Conference TACS '94, Sendai, Japan, April 19-22, 1994, Proceedings Springer 1994 | |
51 | Dinesh Katiyar, David C. Luckham, John C. Mitchell: A Type System for Prototyping Languages. POPL 1994: 138-150 | |
50 | Kathleen Fisher, John C. Mitchell: Notes on Typed Object-Oriented Programming. TACS 1994: 844-885 | |
49 | Dinesh Katiyar, David C. Luckham, John C. Mitchell: Polymorphism and Subtyping in Interfaces. Workshop on Interface Definition Languages 1994: 22-34 | |
48 | Luca Cardelli, Simone Martini, John C. Mitchell, Andre Scedrov: An Extension of System F with Subtyping Inf. Comput. 109(1/2): 4-56 (1994) | |
47 | Kathleen Fisher, Furio Honsell, John C. Mitchell: A lambda Calculus of Objects and Method Specialization. Nord. J. Comput. 1(1): 3-37 (1994) | |
1993 | ||
46 | My Hoang, John C. Mitchell, Ramesh Viswanathan: Standard ML-NJ weak polymorphism and imperative constructs LICS 1993: 15-25 | |
45 | John C. Mitchell, Furio Honsell, Kathleen Fisher: A lambda calculus of objects and method specialization LICS 1993: 26-38 | |
44 | EE | Robert Harper, John C. Mitchell: On the Type Structure of Standard ML. ACM Trans. Program. Lang. Syst. 15(2): 211-252 (1993) |
43 | Lalita Jategaonkar, John C. Mitchell: Type Inference with Extended Pattern Matching and Subtypes. Fundam. Inform. 19(1/2): 127-165 (1993) | |
42 | John C. Mitchell: On Abstraction and the Expressive Power of Programming Languages. Sci. Comput. Program. 21(2): 141-163 (1993) | |
1992 | ||
41 | John C. Mitchell, Andre Scedrov: Notes on Sconing and Relators. CSL 1992: 352-378 | |
40 | Patrick Lincoln, John C. Mitchell: Operational aspects of linear lambda calculus LICS 1992: 235-246 | |
39 | Patrick Lincoln, John C. Mitchell: Algorithmic Aspects of Type Inference with Subtypes. POPL 1992: 293-304 | |
38 | Kim B. Bruce, John C. Mitchell: PER Models of Subtyping, Recursive Types and Higher-Order Polymorphism. POPL 1992: 316-327 | |
37 | Patrick Lincoln, John C. Mitchell, Andre Scedrov, Natarajan Shankar: Decision Problems for Propositional Linear Logic. Ann. Pure Appl. Logic 56(1-3): 239-311 (1992) | |
1991 | ||
36 | Paris C. Kanellakis, Harry G. Mairson, John C. Mitchell: Unification and ML-Type Reconstruction. Computational Logic - Essays in Honor of Alan Robinson 1991: 444-478 | |
35 | Stuart A. Kurtz, John C. Mitchell, Michael J. O'Donnell: Connecting Formal Semantics to Constructive Intuitions. Constructivity in Computer Science 1991: 1-21 | |
34 | John C. Mitchell, Sigurd Meldal, Neel Madhav: An Extension of Standard ML Modules with Subtyping and Inheritance. POPL 1991: 270-278 | |
33 | John C. Mitchell: On Abstraction and the Expressive Power of Programming Languages. TACS 1991: 290-310 | |
32 | Luca Cardelli, Simone Martini, John C. Mitchell, Andre Scedrov: An Extension of System F with Subtyping. TACS 1991: 750-770 | |
31 | John C. Mitchell, Eugenio Moggi: Kripke-Style Models for Typed lambda Calculus. Ann. Pure Appl. Logic 51(1-2): 99-124 (1991) | |
30 | John C. Mitchell: Type Inference With Simple Subtypes. J. Funct. Program. 1(3): 245-285 (1991) | |
29 | Luca Cardelli, John C. Mitchell: Operations on Records. Mathematical Structures in Computer Science 1(1): 3-48 (1991) | |
1990 | ||
28 | Patrick Lincoln, John C. Mitchell, Andre Scedrov, Natarajan Shankar: Decision Problems for Propositional Linear Logic FOCS 1990: 662-671 | |
27 | EE | Brian T. Howard, John C. Mitchell: Operational and Axiomatic Semantics of PCF. LISP and Functional Programming 1990: 298-306 |
26 | John C. Mitchell: Toward a Typed Foundation for Method Specialization and Inheritance. POPL 1990: 109-124 | |
25 | Robert Harper, John C. Mitchell, Eugenio Moggi: Higher-Order Modules and the Phase Distinction. POPL 1990: 341-354 | |
24 | John C. Mitchell: Type Systems for Programming Languages. Handbook of Theoretical Computer Science, Volume B: Formal Models and Sematics (B) 1990: 365-458 | |
23 | Kim B. Bruce, Albert R. Meyer, John C. Mitchell: The Semantics of Second-Order Lambda Calculus Inf. Comput. 85(1): 76-134 (1990) | |
1989 | ||
22 | Luca Cardelli, John C. Mitchell: Operations in Records. Category Theory and Computer Science 1989: 75-81 | |
21 | EE | Peter S. Canning, William R. Cook, Walter L. Hill, Walter G. Olthoff, John C. Mitchell: F-Bounded Polymorphism for Object-Oriented Programming. FPCA 1989: 273-280 |
20 | Luca Cardelli, John C. Mitchell: Operations on Records. Mathematical Foundations of Programming Semantics 1989: 22-52 | |
19 | Paris C. Kanellakis, John C. Mitchell: Polymorphic Unification and ML Typing. POPL 1989: 105-115 | |
1988 | ||
18 | EE | Lalita Jategaonkar, John C. Mitchell: ML with Extended Pattern Matching and Subtypes. LISP and Functional Programming 1988: 198-211 |
17 | John C. Mitchell, Robert Harper: The Essence of ML. POPL 1988: 28-46 | |
16 | EE | John C. Mitchell, Gordon D. Plotkin: Abstract Types Have Existential Type. ACM Trans. Program. Lang. Syst. 10(3): 470-502 (1988) |
15 | John C. Mitchell: Polymorphic Type Inference and Containment Inf. Comput. 76(2/3): 211-249 (1988) | |
1987 | ||
14 | John C. Mitchell, Eugenio Moggi: Kripke-Style models for typed lambda calculus LICS 1987: 303-314 | |
13 | Albert R. Meyer, John C. Mitchell, Eugenio Moggi, Richard Statman: Empty Types in Polymorphic Lambda Calculus. POPL 1987: 253-262 | |
1986 | ||
12 | John C. Mitchell: A Type-Inference Approach to Reduction Properties and Semantics of Polymorphic Expressions (Summary). LISP and Functional Programming 1986: 308-319 | |
11 | John C. Mitchell: Representation Independence and Data Abstraction. POPL 1986: 263-276 | |
10 | John C. Mitchell, Michael J. O'Donnell: Realisability Semantics for Error-Tolerant Logics. TARK 1986: 363-382 | |
1985 | ||
9 | John C. Mitchell, Albert R. Meyer: Second-Order Logical Relations (Extended Abstract). Logic of Programs 1985: 225-236 | |
8 | John C. Mitchell, Gordon D. Plotkin: Abstract Types Have Existential Type. POPL 1985: 37-51 | |
1984 | ||
7 | John C. Mitchell: Semantic Models for Second-Order Lambda Calculus FOCS 1984: 289-299 | |
6 | John C. Mitchell: Coercion and Type Inference. POPL 1984: 175-185 | |
5 | Cynthia Dwork, Paris C. Kanellakis, John C. Mitchell: On the Sequential Nature of Unification. J. Log. Program. 1(1): 35-50 (1984) | |
1983 | ||
4 | EE | John C. Mitchell: Inference Rules for Functional and Inclusion Dependencies. PODS 1983: 58-69 |
3 | Albert R. Meyer, John C. Mitchell: Termination Assertions for Recursive Programs: Completeness and Axiomatic Definability Information and Control 56(1/2): 112-138 (1983) | |
2 | John C. Mitchell: The Implication Problem for Functional and Inclusion Dependencies Information and Control 56(3): 154-173 (1983) | |
1982 | ||
1 | Albert R. Meyer, John C. Mitchell: Axiomatic Definability and Completeness for Recursive Programs. POPL 1982: 337-346 |