| 2009 |
| 152 | EE | John C. Mitchell,
Arnab Roy,
Mukund Sundararajan:
An Automated Approach for Proving PCL Invariants.
Electr. Notes Theor. Comput. Sci. 234: 93-113 (2009) |
| 2008 |
| 151 | EE | Adam Barth,
Collin Jackson,
John C. Mitchell:
Robust defenses for cross-site request forgery.
ACM Conference on Computer and Communications Security 2008: 75-88 |
| 150 | EE | John C. Mitchell,
Arnab Roy,
Paul Rowe,
Andre Scedrov:
Analysis of EAP-GPSK Authentication Protocol.
ACNS 2008: 309-327 |
| 149 | EE | Sergio Maffeis,
John C. Mitchell,
Ankur Taly:
An Operational Semantics for JavaScript.
APLAS 2008: 307-325 |
| 148 | EE | Lorenzo Martignoni,
Elizabeth Stinson,
Matt Fredrikson,
Somesh Jha,
John C. Mitchell:
A Layered Architecture for Detecting Malicious Behaviors.
RAID 2008: 78-97 |
| 147 | EE | Adam Barth,
Collin Jackson,
John C. Mitchell:
Securing Frame Communication in Browsers.
USENIX Security Symposium 2008: 17-30 |
| 146 | EE | Elizabeth Stinson,
John C. Mitchell:
Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection Methods.
WOOT 2008 |
| 145 | EE | Elizabeth Stinson,
John C. Mitchell:
Characterizing Bots' Remote Control Behavior.
Botnet Detection 2008: 45-64 |
| 144 | EE | Ralf Küsters,
Anupam Datta,
John C. Mitchell,
Ajith Ramanathan:
On the Relationships between Notions of Simulation-Based Security.
J. Cryptology 21(4): 492-546 (2008) |
| 2007 |
| 143 | EE | Adam Barth,
John C. Mitchell,
Anupam Datta,
Sharada Sundaram:
Privacy and Utility in Business Processes.
CSF 2007: 279-294 |
| 142 | EE | Elizabeth Stinson,
John C. Mitchell:
Characterizing Bots' Remote Control Behavior.
DIMVA 2007: 89-108 |
| 141 | EE | Arnab Roy,
Anupam Datta,
Ante Derek,
John C. Mitchell:
Inductive Proofs of Computational Secrecy.
ESORICS 2007: 219-234 |
| 140 | EE | Arnab Roy,
Anupam Datta,
John C. Mitchell:
Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols.
TGC 2007: 312-329 |
| 139 | EE | Anupam Datta,
Ante Derek,
John C. Mitchell,
Arnab Roy:
Protocol Composition Logic (PCL).
Electr. Notes Theor. Comput. Sci. 172: 311-358 (2007) |
| 2006 |
| 138 | EE | Arnab Roy,
Anupam Datta,
Ante Derek,
John C. Mitchell,
Jean-Pierre Seifert:
Secrecy Analysis in Protocol Composition Logic.
ASIAN 2006: 197-213 |
| 137 | EE | Anupam Datta,
Ante Derek,
John C. Mitchell,
Bogdan Warinschi:
Computationally Sound Compositional Logic for Key Exchange Protocols.
CSFW 2006: 321-334 |
| 136 | EE | Adam Barth,
Anupam Datta,
John C. Mitchell,
Helen Nissenbaum:
Privacy and Contextual Integrity: Framework and Applications.
IEEE Symposium on Security and Privacy 2006: 184-198 |
| 135 | EE | Adam Barth,
John C. Mitchell:
Managing Digital Rights using Linear Logic.
LICS 2006: 127-136 |
| 134 | EE | Anupam Datta,
Ante Derek,
John C. Mitchell,
Ajith Ramanathan,
Andre Scedrov:
Games and the Impossibility of Realizable Ideal Functionality.
TCC 2006: 360-379 |
| 133 | EE | Collin Jackson,
Andrew Bortz,
Dan Boneh,
John C. Mitchell:
Protecting browser state from web privacy attacks.
WWW 2006: 737-744 |
| 132 | EE | Collin Jackson,
Andrew Bortz,
Dan Boneh,
John C. Mitchell:
Protecting browser state from web privacy attacks.
WWW 2006: 737-744 |
| 131 | EE | Ninghui Li,
John C. Mitchell:
Understanding SPKI/SDSI using first-order logic.
Int. J. Inf. Sec. 5(1): 48-64 (2006) |
| 130 | EE | John C. Mitchell,
Ajith Ramanathan,
Andre Scedrov,
Vanessa Teague:
A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols.
Theor. Comput. Sci. 353(1-3): 118-164 (2006) |
| 129 | EE | Michael Backes,
Anupam Datta,
Ante Derek,
John C. Mitchell,
Mathieu Turuani:
Compositional analysis of contract-signing protocols.
Theor. Comput. Sci. 367(1-2): 33-56 (2006) |
| 2005 |
| 128 | | Vijay Atluri,
Pierangela Samarati,
Ralf Küsters,
John C. Mitchell:
Proceedings of the 2005 ACM workshop on Formal methods in security engineering, FMSE 2005, Fairfax, VA, USA, November 11, 2005
ACM 2005 |
| 127 | EE | Changhua He,
Mukund Sundararajan,
Anupam Datta,
Ante Derek,
John C. Mitchell:
A modular correctness proof of IEEE 802.11i and TLS.
ACM Conference on Computer and Communications Security 2005: 2-15 |
| 126 | EE | Michael Backes,
Anupam Datta,
Ante Derek,
John C. Mitchell,
Mathieu Turuani:
Compositional Analysis of Contract Signing Protocols.
CSFW 2005: 94-110 |
| 125 | EE | Anupam Datta,
Ante Derek,
John C. Mitchell,
Vitaly Shmatikov,
Mathieu Turuani:
Probabilistic Polynomial-Time Semantics for a Protocol Security Logic.
ICALP 2005: 16-29 |
| 124 | EE | Changhua He,
John C. Mitchell:
Security Analysis and Improvements for IEEE 802.11i.
NDSS 2005 |
| 123 | EE | John C. Mitchell:
Security analysis of network protocols: logical and computational methods.
PPDP 2005: 151-152 |
| 122 | EE | Anupam Datta,
Ralf Küsters,
John C. Mitchell,
Ajith Ramanathan:
On the Relationships Between Notions of Simulation-Based Security.
TCC 2005: 476-494 |
| 121 | EE | Adam Barth,
John C. Mitchell:
Enterprise privacy promises and enforcement.
WITS 2005: 58-66 |
| 120 | EE | Ninghui Li,
John C. Mitchell,
William H. Winsborough:
Beyond proof-of-compliance: security analysis in trust management.
J. ACM 52(3): 474-514 (2005) |
| 119 | EE | Rohit Chadha,
John C. Mitchell,
Andre Scedrov,
Vitaly Shmatikov:
Contract signing, optimism, and advantage.
J. Log. Algebr. Program. 64(2): 189-218 (2005) |
| 118 | EE | Anupam Datta,
Ante Derek,
John C. Mitchell,
Dusko Pavlovic:
A derivation system and compositional logic for security protocols.
Journal of Computer Security 13(3): 423-482 (2005) |
| 2004 |
| 117 | | Jean-Jacques Lévy,
Ernst W. Mayr,
John C. Mitchell:
Exploring New Frontiers of Theoretical Informatics, IFIP 18th World Computer Congress, TC1 3rd International Conference on Theoretical Computer Science (TCS2004), 22-27 August 2004, Toulouse, France
Kluwer 2004 |
| 116 | EE | Ninghui Li,
John C. Mitchell,
Derrick Tong:
Securing Java RMI-Based Distributed Applications.
ACSAC 2004: 262-271 |
| 115 | EE | Anupam Datta,
Ante Derek,
John C. Mitchell,
Dusko Pavlovic:
Abstraction and Refinement in Protocol Derivation.
CSFW 2004: 30- |
| 114 | EE | Ajith Ramanathan,
John C. Mitchell,
Andre Scedrov,
Vanessa Teague:
Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols.
FoSSaCS 2004: 468-483 |
| 113 | EE | Ajay Chander,
Drew Dean,
John C. Mitchell:
A Distributed High Assurance Reference Monitor.
ISC 2004: 231-244 |
| 112 | EE | Neil Chou,
Robert Ledesma,
Yuka Teraguchi,
John C. Mitchell:
Client-Side Defense Against Web-Based Identity Theft.
NDSS 2004 |
| 111 | EE | Adam Barth,
John C. Mitchell,
Justin Rosenstein:
Conflict and combination in privacy policy languages.
WPES 2004: 45-46 |
| 110 | EE | Changhua He,
John C. Mitchell:
Analysis of the 802.11i 4-way handshake.
Workshop on Wireless Security 2004: 43-50 |
| 109 | | Ajay Chander,
Drew Dean,
John C. Mitchell:
Reconstructing Trust Management.
Journal of Computer Security 12(1): 131-164 (2004) |
| 108 | | Nancy A. Durgin,
Patrick Lincoln,
John C. Mitchell:
Multiset rewriting and the complexity of bounded security protocols.
Journal of Computer Security 12(2): 247-311 (2004) |
| 2003 |
| 107 | EE | Paulo Mateus,
John C. Mitchell,
Andre Scedrov:
Composition of Cryptographic Protocols in a Probabilistic Polynomial-Time Process Calculus.
CONCUR 2003: 323-345 |
| 106 | EE | Rohit Chadha,
John C. Mitchell,
Andre Scedrov,
Vitaly Shmatikov:
Contract Signing, Optimism, and Advantage.
CONCUR 2003: 361-377 |
| 105 | EE | Anupam Datta,
Ante Derek,
John C. Mitchell,
Dusko Pavlovic:
A Derivation System for Security Protocols and its Logical Formalization.
CSFW 2003: 109-125 |
| 104 | EE | Ninghui Li,
John C. Mitchell:
Understanding SPKI/SDSI Using First-Order Logic.
CSFW 2003: 89- |
| 103 | EE | Ninghui Li,
John C. Mitchell:
A Role-based Trust-management Framework.
DISCEX (1) 2003: 201- |
| 102 | EE | Anupam Datta,
Ante Derek,
John C. Mitchell,
Dusko Pavlovic:
Secure protocol composition.
FMSE 2003: 11-23 |
| 101 | EE | Michael Backes,
Catherine Meadows,
John C. Mitchell:
Relating cryptography and formal methods: a panel.
FMSE 2003: 61-66 |
| 100 | EE | Ninghui Li,
William H. Winsborough,
John C. Mitchell:
Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management.
IEEE Symposium on Security and Privacy 2003: 123-139 |
| 99 | EE | David Lie,
John C. Mitchell,
Chandramohan A. Thekkath,
Mark Horowitz:
Specifying and Verifying Hardware for Tamper-Resistant Software.
IEEE Symposium on Security and Privacy 2003: 166- |
| 98 | EE | Ninghui Li,
John C. Mitchell:
DATALOG with Constraints: A Foundation for Trust Management Languages.
PADL 2003: 58-73 |
| 97 | EE | Stephen N. Freund,
John C. Mitchell:
A Type System for the Java Bytecode Language and Verifier.
J. Autom. Reasoning 30(3-4): 271-321 (2003) |
| 96 | | Ninghui Li,
William H. Winsborough,
John C. Mitchell:
Distributed Credential Chain Discovery in Trust Management.
Journal of Computer Security 11(1): 35-86 (2003) |
| 95 | | Nancy A. Durgin,
John C. Mitchell,
Dusko Pavlovic:
A Compositional Logic for Proving Security Properties of Protocols.
Journal of Computer Security 11(4): 677-722 (2003) |
| 94 | EE | Mourad Debbabi,
Nancy A. Durgin,
Mohamed Mejri,
John C. Mitchell:
Security by typing.
STTT 4(4): 472-495 (2003) |
| 2002 |
| 93 | EE | Ninghui Li,
John C. Mitchell,
William H. Winsborough:
Design of a Role-Based Trust-Management Framework.
IEEE Symposium on Security and Privacy 2002: 114-130 |
| 92 | EE | Iliano Cervesato,
Nancy A. Durgin,
Patrick Lincoln,
John C. Mitchell,
Andre Scedrov:
A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis.
ISSS 2002: 356-383 |
| 91 | EE | John C. Mitchell,
Vanessa Teague:
Autonomous Nodes and Distributed Mechanisms.
ISSS 2002: 58-83 |
| 90 | EE | John C. Mitchell:
Multiset Rewriting and Security Protocol Analysis.
RTA 2002: 19-22 |
| 89 | EE | Vitaly Shmatikov,
John C. Mitchell:
Finite-state analysis of two contract signing protocols.
Theor. Comput. Sci. 283(2): 419-450 (2002) |
| 2001 |
| 88 | EE | Ninghui Li,
William H. Winsborough,
John C. Mitchell:
Distributed credential chain discovery in trust management: extended abstract.
ACM Conference on Computer and Communications Security 2001: 156-165 |
| 87 | EE | Nancy A. Durgin,
John C. Mitchell,
Dusko Pavlovic:
A Compositional Logic for Protocol Correctness.
CSFW 2001: 241- |
| 86 | EE | Ajay Chander,
John C. Mitchell,
Drew Dean:
A State-Transition Model of Trust Management and Access Control.
CSFW 2001: 27-43 |
| 85 | EE | John C. Mitchell:
Probabilistic Polynomial-Time Process Calculus and Security Protocol Analysis.
ESOP 2001: 23-29 |
| 84 | | John C. Mitchell,
Ajith Ramanathan,
Andre Scedrov,
Vanessa Teague:
Probabilistic Polynominal-Time Process Calculus and Security Protocol Analysis.
LICS 2001: 3-8 |
| 83 | EE | John C. Mitchell:
Programming language methods in computer security.
POPL 2001: 1-3 |
| 82 | EE | John C. Mitchell,
Ajith Ramanathan,
Andre Scedrov,
Vanessa Teague:
A Probabilistic Polynomial-time Calculus For Analysis of Cryptographic Protocols (Preliminary Report).
Electr. Notes Theor. Comput. Sci. 45: (2001) |
| 2000 |
| 81 | EE | David Lie,
Chandramohan A. Thekkath,
Mark Mitchell,
Patrick Lincoln,
Dan Boneh,
John C. Mitchell,
Mark Horowitz:
Architectural Support for Copy and Tamper Resistant Software.
ASPLOS 2000: 168-177 |
| 80 | EE | Iliano Cervesato,
Nancy A. Durgin,
John C. Mitchell,
Patrick Lincoln,
Andre Scedrov:
Relating Strands and Multiset Rewriting for Security Protocol Analysis.
CSFW 2000: 35-51 |
| 79 | EE | Vitaly Shmatikov,
John C. Mitchell:
Analysis of Abuse-Free Contract Signing.
Financial Cryptography 2000: 174-191 |
| 78 | EE | Vitaly Shmatikov,
John C. Mitchell:
Analysis of a Fair Exchange Protocol.
NDSS 2000 |
| 1999 |
| 77 | EE | Iliano Cervesato,
Nancy A. Durgin,
Patrick Lincoln,
John C. Mitchell,
Andre Scedrov:
A Meta-Notation for Protocol Analysis.
CSFW 1999: 55-69 |
| 76 | EE | Stephen N. Freund,
John C. Mitchell:
A Formal Framework for the Java Bytecode Language and Verifier.
OOPSLA 1999: 147-166 |
| 75 | EE | Patrick Lincoln,
John C. Mitchell,
Mark Mitchell,
Andre Scedrov:
Probabilistic Polynomial-Time Equivalence and Security Analysis.
World Congress on Formal Methods 1999: 776-793 |
| 74 | EE | Stephen N. Freund,
John C. Mitchell:
The type system for object initializatiion in the Jave bytecode language.
ACM Trans. Program. Lang. Syst. 21(6): 1196-1250 (1999) |
| 73 | EE | Viviana Bono,
John C. Mitchell,
Amit Patel,
Vitaly Shmatikov:
A Core Calculus of Classes and Objects.
Electr. Notes Theor. Comput. Sci. 20: (1999) |
| 72 | EE | Robert Harper,
John C. Mitchell:
Parametricity and Variants of Girard's J Operator.
Inf. Process. Lett. 70(1): 1-5 (1999) |
| 71 | EE | Patrick Lincoln,
John C. Mitchell,
Andre Scedrov:
Optimization Complexity of Linear Logic Proof Games.
Theor. Comput. Sci. 227(1-2): 299-331 (1999) |
| 1998 |
| 70 | EE | Patrick Lincoln,
John C. Mitchell,
Mark Mitchell,
Andre Scedrov:
A Probabilistic Poly-Time Framework for Protocol Analysis.
ACM Conference on Computer and Communications Security 1998: 112-121 |
| 69 | | John C. Mitchell:
Finite-State Analysis of Security Protocols.
CAV 1998: 71-76 |
| 68 | EE | John C. Mitchell,
Mark Mitchell,
Andre Scedrov:
A Linguistic Characterization of Bounded Oracle Computation and Probabilistic Polynomial Time.
FOCS 1998: 725-733 |
| 67 | EE | Stephen N. Freund,
John C. Mitchell:
A Type System for Object Initialization in the Java Bytecode Language.
OOPSLA 1998: 310-327 |
| 66 | | Kathleen Fisher,
John C. Mitchell:
On the Relationship Between Classes, Objects, and Data Abstraction.
TAPOS 4(1): 3-25 (1998) |
| 1997 |
| 65 | EE | John C. Mitchell,
Mark Mitchell,
Ulrich Stern:
Automated analysis of cryptographic protocols using Mur-phi.
IEEE Symposium on Security and Privacy 1997: 141-151 |
| 64 | | Ole Agesen,
Stephen N. Freund,
John C. Mitchell:
Adding Type Parameterization to the Java Language.
OOPSLA 1997: 49-65 |
| 63 | EE | Stephen N. Freund,
John C. Mitchell:
A Type System For Object Initialization In the Java Bytecode Language.
Electr. Notes Theor. Comput. Sci. 10: (1997) |
| 62 | | Robert Harper,
John C. Mitchell:
ML and Beyond.
SIGPLAN Notices 32(1): 80-85 (1997) |
| 1996 |
| 61 | | John C. Mitchell,
Ramesh Viswanathan:
Effective Models of Polymorphism, Subtyping and Recursion (Extended Abstract).
ICALP 1996: 170-181 |
| 60 | | Carl A. Gunter,
John C. Mitchell,
David Notkin:
Strategic Directions in Software Engineering and Programming Languages.
ACM Comput. Surv. 28(4): 727-737 (1996) |
| 59 | | Robert Harper,
John C. Mitchell:
ML and Beyond.
ACM Comput. Surv. 28(4es): 219 (1996) |
| 58 | EE | Patrick Lincoln,
John C. Mitchell,
Andre Scedrov:
Linear logic proof games and optimization.
Bulletin of Symbolic Logic 2(3): 322-338 (1996) |
| 57 | EE | Patrick Lincoln,
John C. Mitchell,
Andre Scedrov:
The Complexity of Local Proof Search in Linear Logic.
Electr. Notes Theor. Comput. Sci. 3: (1996) |
| 56 | | John C. Mitchell,
Ramesh Viswanathan:
Standard ML-NJ Weak Polymorphism and Imperative Constructs.
Inf. Comput. 127(2): 102-116 (1996) |
| 1995 |
| 55 | | Kathleen Fisher,
John C. Mitchell:
A Delegation-based Object Calculus with Subtying.
FCT 1995: 42-61 |
| 54 | | My Hoang,
John C. Mitchell:
Lower Bounds on Type Inference with Subtypes.
POPL 1995: 176-185 |
| 53 | | Kathleen Fisher,
John C. Mitchell:
The Development of Type Systems for Object-Oriented Languages.
TAPOS 1(3): 189-220 (1995) |
| 1994 |
| 52 | | Masami Hagiya,
John C. Mitchell:
Theoretical Aspects of Computer Software, International Conference TACS '94, Sendai, Japan, April 19-22, 1994, Proceedings
Springer 1994 |
| 51 | | Dinesh Katiyar,
David C. Luckham,
John C. Mitchell:
A Type System for Prototyping Languages.
POPL 1994: 138-150 |
| 50 | | Kathleen Fisher,
John C. Mitchell:
Notes on Typed Object-Oriented Programming.
TACS 1994: 844-885 |
| 49 | | Dinesh Katiyar,
David C. Luckham,
John C. Mitchell:
Polymorphism and Subtyping in Interfaces.
Workshop on Interface Definition Languages 1994: 22-34 |
| 48 | | Luca Cardelli,
Simone Martini,
John C. Mitchell,
Andre Scedrov:
An Extension of System F with Subtyping
Inf. Comput. 109(1/2): 4-56 (1994) |
| 47 | | Kathleen Fisher,
Furio Honsell,
John C. Mitchell:
A lambda Calculus of Objects and Method Specialization.
Nord. J. Comput. 1(1): 3-37 (1994) |
| 1993 |
| 46 | | My Hoang,
John C. Mitchell,
Ramesh Viswanathan:
Standard ML-NJ weak polymorphism and imperative constructs
LICS 1993: 15-25 |
| 45 | | John C. Mitchell,
Furio Honsell,
Kathleen Fisher:
A lambda calculus of objects and method specialization
LICS 1993: 26-38 |
| 44 | EE | Robert Harper,
John C. Mitchell:
On the Type Structure of Standard ML.
ACM Trans. Program. Lang. Syst. 15(2): 211-252 (1993) |
| 43 | | Lalita Jategaonkar,
John C. Mitchell:
Type Inference with Extended Pattern Matching and Subtypes.
Fundam. Inform. 19(1/2): 127-165 (1993) |
| 42 | | John C. Mitchell:
On Abstraction and the Expressive Power of Programming Languages.
Sci. Comput. Program. 21(2): 141-163 (1993) |
| 1992 |
| 41 | | John C. Mitchell,
Andre Scedrov:
Notes on Sconing and Relators.
CSL 1992: 352-378 |
| 40 | | Patrick Lincoln,
John C. Mitchell:
Operational aspects of linear lambda calculus
LICS 1992: 235-246 |
| 39 | | Patrick Lincoln,
John C. Mitchell:
Algorithmic Aspects of Type Inference with Subtypes.
POPL 1992: 293-304 |
| 38 | | Kim B. Bruce,
John C. Mitchell:
PER Models of Subtyping, Recursive Types and Higher-Order Polymorphism.
POPL 1992: 316-327 |
| 37 | | Patrick Lincoln,
John C. Mitchell,
Andre Scedrov,
Natarajan Shankar:
Decision Problems for Propositional Linear Logic.
Ann. Pure Appl. Logic 56(1-3): 239-311 (1992) |
| 1991 |
| 36 | | Paris C. Kanellakis,
Harry G. Mairson,
John C. Mitchell:
Unification and ML-Type Reconstruction.
Computational Logic - Essays in Honor of Alan Robinson 1991: 444-478 |
| 35 | | Stuart A. Kurtz,
John C. Mitchell,
Michael J. O'Donnell:
Connecting Formal Semantics to Constructive Intuitions.
Constructivity in Computer Science 1991: 1-21 |
| 34 | | John C. Mitchell,
Sigurd Meldal,
Neel Madhav:
An Extension of Standard ML Modules with Subtyping and Inheritance.
POPL 1991: 270-278 |
| 33 | | John C. Mitchell:
On Abstraction and the Expressive Power of Programming Languages.
TACS 1991: 290-310 |
| 32 | | Luca Cardelli,
Simone Martini,
John C. Mitchell,
Andre Scedrov:
An Extension of System F with Subtyping.
TACS 1991: 750-770 |
| 31 | | John C. Mitchell,
Eugenio Moggi:
Kripke-Style Models for Typed lambda Calculus.
Ann. Pure Appl. Logic 51(1-2): 99-124 (1991) |
| 30 | | John C. Mitchell:
Type Inference With Simple Subtypes.
J. Funct. Program. 1(3): 245-285 (1991) |
| 29 | | Luca Cardelli,
John C. Mitchell:
Operations on Records.
Mathematical Structures in Computer Science 1(1): 3-48 (1991) |
| 1990 |
| 28 | | Patrick Lincoln,
John C. Mitchell,
Andre Scedrov,
Natarajan Shankar:
Decision Problems for Propositional Linear Logic
FOCS 1990: 662-671 |
| 27 | EE | Brian T. Howard,
John C. Mitchell:
Operational and Axiomatic Semantics of PCF.
LISP and Functional Programming 1990: 298-306 |
| 26 | | John C. Mitchell:
Toward a Typed Foundation for Method Specialization and Inheritance.
POPL 1990: 109-124 |
| 25 | | Robert Harper,
John C. Mitchell,
Eugenio Moggi:
Higher-Order Modules and the Phase Distinction.
POPL 1990: 341-354 |
| 24 | | John C. Mitchell:
Type Systems for Programming Languages.
Handbook of Theoretical Computer Science, Volume B: Formal Models and Sematics (B) 1990: 365-458 |
| 23 | | Kim B. Bruce,
Albert R. Meyer,
John C. Mitchell:
The Semantics of Second-Order Lambda Calculus
Inf. Comput. 85(1): 76-134 (1990) |
| 1989 |
| 22 | | Luca Cardelli,
John C. Mitchell:
Operations in Records.
Category Theory and Computer Science 1989: 75-81 |
| 21 | EE | Peter S. Canning,
William R. Cook,
Walter L. Hill,
Walter G. Olthoff,
John C. Mitchell:
F-Bounded Polymorphism for Object-Oriented Programming.
FPCA 1989: 273-280 |
| 20 | | Luca Cardelli,
John C. Mitchell:
Operations on Records.
Mathematical Foundations of Programming Semantics 1989: 22-52 |
| 19 | | Paris C. Kanellakis,
John C. Mitchell:
Polymorphic Unification and ML Typing.
POPL 1989: 105-115 |
| 1988 |
| 18 | EE | Lalita Jategaonkar,
John C. Mitchell:
ML with Extended Pattern Matching and Subtypes.
LISP and Functional Programming 1988: 198-211 |
| 17 | | John C. Mitchell,
Robert Harper:
The Essence of ML.
POPL 1988: 28-46 |
| 16 | EE | John C. Mitchell,
Gordon D. Plotkin:
Abstract Types Have Existential Type.
ACM Trans. Program. Lang. Syst. 10(3): 470-502 (1988) |
| 15 | | John C. Mitchell:
Polymorphic Type Inference and Containment
Inf. Comput. 76(2/3): 211-249 (1988) |
| 1987 |
| 14 | | John C. Mitchell,
Eugenio Moggi:
Kripke-Style models for typed lambda calculus
LICS 1987: 303-314 |
| 13 | | Albert R. Meyer,
John C. Mitchell,
Eugenio Moggi,
Richard Statman:
Empty Types in Polymorphic Lambda Calculus.
POPL 1987: 253-262 |
| 1986 |
| 12 | | John C. Mitchell:
A Type-Inference Approach to Reduction Properties and Semantics of Polymorphic Expressions (Summary).
LISP and Functional Programming 1986: 308-319 |
| 11 | | John C. Mitchell:
Representation Independence and Data Abstraction.
POPL 1986: 263-276 |
| 10 | | John C. Mitchell,
Michael J. O'Donnell:
Realisability Semantics for Error-Tolerant Logics.
TARK 1986: 363-382 |
| 1985 |
| 9 | | John C. Mitchell,
Albert R. Meyer:
Second-Order Logical Relations (Extended Abstract).
Logic of Programs 1985: 225-236 |
| 8 | | John C. Mitchell,
Gordon D. Plotkin:
Abstract Types Have Existential Type.
POPL 1985: 37-51 |
| 1984 |
| 7 | | John C. Mitchell:
Semantic Models for Second-Order Lambda Calculus
FOCS 1984: 289-299 |
| 6 | | John C. Mitchell:
Coercion and Type Inference.
POPL 1984: 175-185 |
| 5 | | Cynthia Dwork,
Paris C. Kanellakis,
John C. Mitchell:
On the Sequential Nature of Unification.
J. Log. Program. 1(1): 35-50 (1984) |
| 1983 |
| 4 | EE | John C. Mitchell:
Inference Rules for Functional and Inclusion Dependencies.
PODS 1983: 58-69 |
| 3 | | Albert R. Meyer,
John C. Mitchell:
Termination Assertions for Recursive Programs: Completeness and Axiomatic Definability
Information and Control 56(1/2): 112-138 (1983) |
| 2 | | John C. Mitchell:
The Implication Problem for Functional and Inclusion Dependencies
Information and Control 56(3): 154-173 (1983) |
| 1982 |
| 1 | | Albert R. Meyer,
John C. Mitchell:
Axiomatic Definability and Completeness for Recursive Programs.
POPL 1982: 337-346 |