2009 |
152 | EE | John C. Mitchell,
Arnab Roy,
Mukund Sundararajan:
An Automated Approach for Proving PCL Invariants.
Electr. Notes Theor. Comput. Sci. 234: 93-113 (2009) |
2008 |
151 | EE | Adam Barth,
Collin Jackson,
John C. Mitchell:
Robust defenses for cross-site request forgery.
ACM Conference on Computer and Communications Security 2008: 75-88 |
150 | EE | John C. Mitchell,
Arnab Roy,
Paul Rowe,
Andre Scedrov:
Analysis of EAP-GPSK Authentication Protocol.
ACNS 2008: 309-327 |
149 | EE | Sergio Maffeis,
John C. Mitchell,
Ankur Taly:
An Operational Semantics for JavaScript.
APLAS 2008: 307-325 |
148 | EE | Lorenzo Martignoni,
Elizabeth Stinson,
Matt Fredrikson,
Somesh Jha,
John C. Mitchell:
A Layered Architecture for Detecting Malicious Behaviors.
RAID 2008: 78-97 |
147 | EE | Adam Barth,
Collin Jackson,
John C. Mitchell:
Securing Frame Communication in Browsers.
USENIX Security Symposium 2008: 17-30 |
146 | EE | Elizabeth Stinson,
John C. Mitchell:
Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection Methods.
WOOT 2008 |
145 | EE | Elizabeth Stinson,
John C. Mitchell:
Characterizing Bots' Remote Control Behavior.
Botnet Detection 2008: 45-64 |
144 | EE | Ralf Küsters,
Anupam Datta,
John C. Mitchell,
Ajith Ramanathan:
On the Relationships between Notions of Simulation-Based Security.
J. Cryptology 21(4): 492-546 (2008) |
2007 |
143 | EE | Adam Barth,
John C. Mitchell,
Anupam Datta,
Sharada Sundaram:
Privacy and Utility in Business Processes.
CSF 2007: 279-294 |
142 | EE | Elizabeth Stinson,
John C. Mitchell:
Characterizing Bots' Remote Control Behavior.
DIMVA 2007: 89-108 |
141 | EE | Arnab Roy,
Anupam Datta,
Ante Derek,
John C. Mitchell:
Inductive Proofs of Computational Secrecy.
ESORICS 2007: 219-234 |
140 | EE | Arnab Roy,
Anupam Datta,
John C. Mitchell:
Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols.
TGC 2007: 312-329 |
139 | EE | Anupam Datta,
Ante Derek,
John C. Mitchell,
Arnab Roy:
Protocol Composition Logic (PCL).
Electr. Notes Theor. Comput. Sci. 172: 311-358 (2007) |
2006 |
138 | EE | Arnab Roy,
Anupam Datta,
Ante Derek,
John C. Mitchell,
Jean-Pierre Seifert:
Secrecy Analysis in Protocol Composition Logic.
ASIAN 2006: 197-213 |
137 | EE | Anupam Datta,
Ante Derek,
John C. Mitchell,
Bogdan Warinschi:
Computationally Sound Compositional Logic for Key Exchange Protocols.
CSFW 2006: 321-334 |
136 | EE | Adam Barth,
Anupam Datta,
John C. Mitchell,
Helen Nissenbaum:
Privacy and Contextual Integrity: Framework and Applications.
IEEE Symposium on Security and Privacy 2006: 184-198 |
135 | EE | Adam Barth,
John C. Mitchell:
Managing Digital Rights using Linear Logic.
LICS 2006: 127-136 |
134 | EE | Anupam Datta,
Ante Derek,
John C. Mitchell,
Ajith Ramanathan,
Andre Scedrov:
Games and the Impossibility of Realizable Ideal Functionality.
TCC 2006: 360-379 |
133 | EE | Collin Jackson,
Andrew Bortz,
Dan Boneh,
John C. Mitchell:
Protecting browser state from web privacy attacks.
WWW 2006: 737-744 |
132 | EE | Collin Jackson,
Andrew Bortz,
Dan Boneh,
John C. Mitchell:
Protecting browser state from web privacy attacks.
WWW 2006: 737-744 |
131 | EE | Ninghui Li,
John C. Mitchell:
Understanding SPKI/SDSI using first-order logic.
Int. J. Inf. Sec. 5(1): 48-64 (2006) |
130 | EE | John C. Mitchell,
Ajith Ramanathan,
Andre Scedrov,
Vanessa Teague:
A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols.
Theor. Comput. Sci. 353(1-3): 118-164 (2006) |
129 | EE | Michael Backes,
Anupam Datta,
Ante Derek,
John C. Mitchell,
Mathieu Turuani:
Compositional analysis of contract-signing protocols.
Theor. Comput. Sci. 367(1-2): 33-56 (2006) |
2005 |
128 | | Vijay Atluri,
Pierangela Samarati,
Ralf Küsters,
John C. Mitchell:
Proceedings of the 2005 ACM workshop on Formal methods in security engineering, FMSE 2005, Fairfax, VA, USA, November 11, 2005
ACM 2005 |
127 | EE | Changhua He,
Mukund Sundararajan,
Anupam Datta,
Ante Derek,
John C. Mitchell:
A modular correctness proof of IEEE 802.11i and TLS.
ACM Conference on Computer and Communications Security 2005: 2-15 |
126 | EE | Michael Backes,
Anupam Datta,
Ante Derek,
John C. Mitchell,
Mathieu Turuani:
Compositional Analysis of Contract Signing Protocols.
CSFW 2005: 94-110 |
125 | EE | Anupam Datta,
Ante Derek,
John C. Mitchell,
Vitaly Shmatikov,
Mathieu Turuani:
Probabilistic Polynomial-Time Semantics for a Protocol Security Logic.
ICALP 2005: 16-29 |
124 | EE | Changhua He,
John C. Mitchell:
Security Analysis and Improvements for IEEE 802.11i.
NDSS 2005 |
123 | EE | John C. Mitchell:
Security analysis of network protocols: logical and computational methods.
PPDP 2005: 151-152 |
122 | EE | Anupam Datta,
Ralf Küsters,
John C. Mitchell,
Ajith Ramanathan:
On the Relationships Between Notions of Simulation-Based Security.
TCC 2005: 476-494 |
121 | EE | Adam Barth,
John C. Mitchell:
Enterprise privacy promises and enforcement.
WITS 2005: 58-66 |
120 | EE | Ninghui Li,
John C. Mitchell,
William H. Winsborough:
Beyond proof-of-compliance: security analysis in trust management.
J. ACM 52(3): 474-514 (2005) |
119 | EE | Rohit Chadha,
John C. Mitchell,
Andre Scedrov,
Vitaly Shmatikov:
Contract signing, optimism, and advantage.
J. Log. Algebr. Program. 64(2): 189-218 (2005) |
118 | EE | Anupam Datta,
Ante Derek,
John C. Mitchell,
Dusko Pavlovic:
A derivation system and compositional logic for security protocols.
Journal of Computer Security 13(3): 423-482 (2005) |
2004 |
117 | | Jean-Jacques Lévy,
Ernst W. Mayr,
John C. Mitchell:
Exploring New Frontiers of Theoretical Informatics, IFIP 18th World Computer Congress, TC1 3rd International Conference on Theoretical Computer Science (TCS2004), 22-27 August 2004, Toulouse, France
Kluwer 2004 |
116 | EE | Ninghui Li,
John C. Mitchell,
Derrick Tong:
Securing Java RMI-Based Distributed Applications.
ACSAC 2004: 262-271 |
115 | EE | Anupam Datta,
Ante Derek,
John C. Mitchell,
Dusko Pavlovic:
Abstraction and Refinement in Protocol Derivation.
CSFW 2004: 30- |
114 | EE | Ajith Ramanathan,
John C. Mitchell,
Andre Scedrov,
Vanessa Teague:
Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols.
FoSSaCS 2004: 468-483 |
113 | EE | Ajay Chander,
Drew Dean,
John C. Mitchell:
A Distributed High Assurance Reference Monitor.
ISC 2004: 231-244 |
112 | EE | Neil Chou,
Robert Ledesma,
Yuka Teraguchi,
John C. Mitchell:
Client-Side Defense Against Web-Based Identity Theft.
NDSS 2004 |
111 | EE | Adam Barth,
John C. Mitchell,
Justin Rosenstein:
Conflict and combination in privacy policy languages.
WPES 2004: 45-46 |
110 | EE | Changhua He,
John C. Mitchell:
Analysis of the 802.11i 4-way handshake.
Workshop on Wireless Security 2004: 43-50 |
109 | | Ajay Chander,
Drew Dean,
John C. Mitchell:
Reconstructing Trust Management.
Journal of Computer Security 12(1): 131-164 (2004) |
108 | | Nancy A. Durgin,
Patrick Lincoln,
John C. Mitchell:
Multiset rewriting and the complexity of bounded security protocols.
Journal of Computer Security 12(2): 247-311 (2004) |
2003 |
107 | EE | Paulo Mateus,
John C. Mitchell,
Andre Scedrov:
Composition of Cryptographic Protocols in a Probabilistic Polynomial-Time Process Calculus.
CONCUR 2003: 323-345 |
106 | EE | Rohit Chadha,
John C. Mitchell,
Andre Scedrov,
Vitaly Shmatikov:
Contract Signing, Optimism, and Advantage.
CONCUR 2003: 361-377 |
105 | EE | Anupam Datta,
Ante Derek,
John C. Mitchell,
Dusko Pavlovic:
A Derivation System for Security Protocols and its Logical Formalization.
CSFW 2003: 109-125 |
104 | EE | Ninghui Li,
John C. Mitchell:
Understanding SPKI/SDSI Using First-Order Logic.
CSFW 2003: 89- |
103 | EE | Ninghui Li,
John C. Mitchell:
A Role-based Trust-management Framework.
DISCEX (1) 2003: 201- |
102 | EE | Anupam Datta,
Ante Derek,
John C. Mitchell,
Dusko Pavlovic:
Secure protocol composition.
FMSE 2003: 11-23 |
101 | EE | Michael Backes,
Catherine Meadows,
John C. Mitchell:
Relating cryptography and formal methods: a panel.
FMSE 2003: 61-66 |
100 | EE | Ninghui Li,
William H. Winsborough,
John C. Mitchell:
Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management.
IEEE Symposium on Security and Privacy 2003: 123-139 |
99 | EE | David Lie,
John C. Mitchell,
Chandramohan A. Thekkath,
Mark Horowitz:
Specifying and Verifying Hardware for Tamper-Resistant Software.
IEEE Symposium on Security and Privacy 2003: 166- |
98 | EE | Ninghui Li,
John C. Mitchell:
DATALOG with Constraints: A Foundation for Trust Management Languages.
PADL 2003: 58-73 |
97 | EE | Stephen N. Freund,
John C. Mitchell:
A Type System for the Java Bytecode Language and Verifier.
J. Autom. Reasoning 30(3-4): 271-321 (2003) |
96 | | Ninghui Li,
William H. Winsborough,
John C. Mitchell:
Distributed Credential Chain Discovery in Trust Management.
Journal of Computer Security 11(1): 35-86 (2003) |
95 | | Nancy A. Durgin,
John C. Mitchell,
Dusko Pavlovic:
A Compositional Logic for Proving Security Properties of Protocols.
Journal of Computer Security 11(4): 677-722 (2003) |
94 | EE | Mourad Debbabi,
Nancy A. Durgin,
Mohamed Mejri,
John C. Mitchell:
Security by typing.
STTT 4(4): 472-495 (2003) |
2002 |
93 | EE | Ninghui Li,
John C. Mitchell,
William H. Winsborough:
Design of a Role-Based Trust-Management Framework.
IEEE Symposium on Security and Privacy 2002: 114-130 |
92 | EE | Iliano Cervesato,
Nancy A. Durgin,
Patrick Lincoln,
John C. Mitchell,
Andre Scedrov:
A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis.
ISSS 2002: 356-383 |
91 | EE | John C. Mitchell,
Vanessa Teague:
Autonomous Nodes and Distributed Mechanisms.
ISSS 2002: 58-83 |
90 | EE | John C. Mitchell:
Multiset Rewriting and Security Protocol Analysis.
RTA 2002: 19-22 |
89 | EE | Vitaly Shmatikov,
John C. Mitchell:
Finite-state analysis of two contract signing protocols.
Theor. Comput. Sci. 283(2): 419-450 (2002) |
2001 |
88 | EE | Ninghui Li,
William H. Winsborough,
John C. Mitchell:
Distributed credential chain discovery in trust management: extended abstract.
ACM Conference on Computer and Communications Security 2001: 156-165 |
87 | EE | Nancy A. Durgin,
John C. Mitchell,
Dusko Pavlovic:
A Compositional Logic for Protocol Correctness.
CSFW 2001: 241- |
86 | EE | Ajay Chander,
John C. Mitchell,
Drew Dean:
A State-Transition Model of Trust Management and Access Control.
CSFW 2001: 27-43 |
85 | EE | John C. Mitchell:
Probabilistic Polynomial-Time Process Calculus and Security Protocol Analysis.
ESOP 2001: 23-29 |
84 | | John C. Mitchell,
Ajith Ramanathan,
Andre Scedrov,
Vanessa Teague:
Probabilistic Polynominal-Time Process Calculus and Security Protocol Analysis.
LICS 2001: 3-8 |
83 | EE | John C. Mitchell:
Programming language methods in computer security.
POPL 2001: 1-3 |
82 | EE | John C. Mitchell,
Ajith Ramanathan,
Andre Scedrov,
Vanessa Teague:
A Probabilistic Polynomial-time Calculus For Analysis of Cryptographic Protocols (Preliminary Report).
Electr. Notes Theor. Comput. Sci. 45: (2001) |
2000 |
81 | EE | David Lie,
Chandramohan A. Thekkath,
Mark Mitchell,
Patrick Lincoln,
Dan Boneh,
John C. Mitchell,
Mark Horowitz:
Architectural Support for Copy and Tamper Resistant Software.
ASPLOS 2000: 168-177 |
80 | EE | Iliano Cervesato,
Nancy A. Durgin,
John C. Mitchell,
Patrick Lincoln,
Andre Scedrov:
Relating Strands and Multiset Rewriting for Security Protocol Analysis.
CSFW 2000: 35-51 |
79 | EE | Vitaly Shmatikov,
John C. Mitchell:
Analysis of Abuse-Free Contract Signing.
Financial Cryptography 2000: 174-191 |
78 | EE | Vitaly Shmatikov,
John C. Mitchell:
Analysis of a Fair Exchange Protocol.
NDSS 2000 |
1999 |
77 | EE | Iliano Cervesato,
Nancy A. Durgin,
Patrick Lincoln,
John C. Mitchell,
Andre Scedrov:
A Meta-Notation for Protocol Analysis.
CSFW 1999: 55-69 |
76 | EE | Stephen N. Freund,
John C. Mitchell:
A Formal Framework for the Java Bytecode Language and Verifier.
OOPSLA 1999: 147-166 |
75 | EE | Patrick Lincoln,
John C. Mitchell,
Mark Mitchell,
Andre Scedrov:
Probabilistic Polynomial-Time Equivalence and Security Analysis.
World Congress on Formal Methods 1999: 776-793 |
74 | EE | Stephen N. Freund,
John C. Mitchell:
The type system for object initializatiion in the Jave bytecode language.
ACM Trans. Program. Lang. Syst. 21(6): 1196-1250 (1999) |
73 | EE | Viviana Bono,
John C. Mitchell,
Amit Patel,
Vitaly Shmatikov:
A Core Calculus of Classes and Objects.
Electr. Notes Theor. Comput. Sci. 20: (1999) |
72 | EE | Robert Harper,
John C. Mitchell:
Parametricity and Variants of Girard's J Operator.
Inf. Process. Lett. 70(1): 1-5 (1999) |
71 | EE | Patrick Lincoln,
John C. Mitchell,
Andre Scedrov:
Optimization Complexity of Linear Logic Proof Games.
Theor. Comput. Sci. 227(1-2): 299-331 (1999) |
1998 |
70 | EE | Patrick Lincoln,
John C. Mitchell,
Mark Mitchell,
Andre Scedrov:
A Probabilistic Poly-Time Framework for Protocol Analysis.
ACM Conference on Computer and Communications Security 1998: 112-121 |
69 | | John C. Mitchell:
Finite-State Analysis of Security Protocols.
CAV 1998: 71-76 |
68 | EE | John C. Mitchell,
Mark Mitchell,
Andre Scedrov:
A Linguistic Characterization of Bounded Oracle Computation and Probabilistic Polynomial Time.
FOCS 1998: 725-733 |
67 | EE | Stephen N. Freund,
John C. Mitchell:
A Type System for Object Initialization in the Java Bytecode Language.
OOPSLA 1998: 310-327 |
66 | | Kathleen Fisher,
John C. Mitchell:
On the Relationship Between Classes, Objects, and Data Abstraction.
TAPOS 4(1): 3-25 (1998) |
1997 |
65 | EE | John C. Mitchell,
Mark Mitchell,
Ulrich Stern:
Automated analysis of cryptographic protocols using Mur-phi.
IEEE Symposium on Security and Privacy 1997: 141-151 |
64 | | Ole Agesen,
Stephen N. Freund,
John C. Mitchell:
Adding Type Parameterization to the Java Language.
OOPSLA 1997: 49-65 |
63 | EE | Stephen N. Freund,
John C. Mitchell:
A Type System For Object Initialization In the Java Bytecode Language.
Electr. Notes Theor. Comput. Sci. 10: (1997) |
62 | | Robert Harper,
John C. Mitchell:
ML and Beyond.
SIGPLAN Notices 32(1): 80-85 (1997) |
1996 |
61 | | John C. Mitchell,
Ramesh Viswanathan:
Effective Models of Polymorphism, Subtyping and Recursion (Extended Abstract).
ICALP 1996: 170-181 |
60 | | Carl A. Gunter,
John C. Mitchell,
David Notkin:
Strategic Directions in Software Engineering and Programming Languages.
ACM Comput. Surv. 28(4): 727-737 (1996) |
59 | | Robert Harper,
John C. Mitchell:
ML and Beyond.
ACM Comput. Surv. 28(4es): 219 (1996) |
58 | EE | Patrick Lincoln,
John C. Mitchell,
Andre Scedrov:
Linear logic proof games and optimization.
Bulletin of Symbolic Logic 2(3): 322-338 (1996) |
57 | EE | Patrick Lincoln,
John C. Mitchell,
Andre Scedrov:
The Complexity of Local Proof Search in Linear Logic.
Electr. Notes Theor. Comput. Sci. 3: (1996) |
56 | | John C. Mitchell,
Ramesh Viswanathan:
Standard ML-NJ Weak Polymorphism and Imperative Constructs.
Inf. Comput. 127(2): 102-116 (1996) |
1995 |
55 | | Kathleen Fisher,
John C. Mitchell:
A Delegation-based Object Calculus with Subtying.
FCT 1995: 42-61 |
54 | | My Hoang,
John C. Mitchell:
Lower Bounds on Type Inference with Subtypes.
POPL 1995: 176-185 |
53 | | Kathleen Fisher,
John C. Mitchell:
The Development of Type Systems for Object-Oriented Languages.
TAPOS 1(3): 189-220 (1995) |
1994 |
52 | | Masami Hagiya,
John C. Mitchell:
Theoretical Aspects of Computer Software, International Conference TACS '94, Sendai, Japan, April 19-22, 1994, Proceedings
Springer 1994 |
51 | | Dinesh Katiyar,
David C. Luckham,
John C. Mitchell:
A Type System for Prototyping Languages.
POPL 1994: 138-150 |
50 | | Kathleen Fisher,
John C. Mitchell:
Notes on Typed Object-Oriented Programming.
TACS 1994: 844-885 |
49 | | Dinesh Katiyar,
David C. Luckham,
John C. Mitchell:
Polymorphism and Subtyping in Interfaces.
Workshop on Interface Definition Languages 1994: 22-34 |
48 | | Luca Cardelli,
Simone Martini,
John C. Mitchell,
Andre Scedrov:
An Extension of System F with Subtyping
Inf. Comput. 109(1/2): 4-56 (1994) |
47 | | Kathleen Fisher,
Furio Honsell,
John C. Mitchell:
A lambda Calculus of Objects and Method Specialization.
Nord. J. Comput. 1(1): 3-37 (1994) |
1993 |
46 | | My Hoang,
John C. Mitchell,
Ramesh Viswanathan:
Standard ML-NJ weak polymorphism and imperative constructs
LICS 1993: 15-25 |
45 | | John C. Mitchell,
Furio Honsell,
Kathleen Fisher:
A lambda calculus of objects and method specialization
LICS 1993: 26-38 |
44 | EE | Robert Harper,
John C. Mitchell:
On the Type Structure of Standard ML.
ACM Trans. Program. Lang. Syst. 15(2): 211-252 (1993) |
43 | | Lalita Jategaonkar,
John C. Mitchell:
Type Inference with Extended Pattern Matching and Subtypes.
Fundam. Inform. 19(1/2): 127-165 (1993) |
42 | | John C. Mitchell:
On Abstraction and the Expressive Power of Programming Languages.
Sci. Comput. Program. 21(2): 141-163 (1993) |
1992 |
41 | | John C. Mitchell,
Andre Scedrov:
Notes on Sconing and Relators.
CSL 1992: 352-378 |
40 | | Patrick Lincoln,
John C. Mitchell:
Operational aspects of linear lambda calculus
LICS 1992: 235-246 |
39 | | Patrick Lincoln,
John C. Mitchell:
Algorithmic Aspects of Type Inference with Subtypes.
POPL 1992: 293-304 |
38 | | Kim B. Bruce,
John C. Mitchell:
PER Models of Subtyping, Recursive Types and Higher-Order Polymorphism.
POPL 1992: 316-327 |
37 | | Patrick Lincoln,
John C. Mitchell,
Andre Scedrov,
Natarajan Shankar:
Decision Problems for Propositional Linear Logic.
Ann. Pure Appl. Logic 56(1-3): 239-311 (1992) |
1991 |
36 | | Paris C. Kanellakis,
Harry G. Mairson,
John C. Mitchell:
Unification and ML-Type Reconstruction.
Computational Logic - Essays in Honor of Alan Robinson 1991: 444-478 |
35 | | Stuart A. Kurtz,
John C. Mitchell,
Michael J. O'Donnell:
Connecting Formal Semantics to Constructive Intuitions.
Constructivity in Computer Science 1991: 1-21 |
34 | | John C. Mitchell,
Sigurd Meldal,
Neel Madhav:
An Extension of Standard ML Modules with Subtyping and Inheritance.
POPL 1991: 270-278 |
33 | | John C. Mitchell:
On Abstraction and the Expressive Power of Programming Languages.
TACS 1991: 290-310 |
32 | | Luca Cardelli,
Simone Martini,
John C. Mitchell,
Andre Scedrov:
An Extension of System F with Subtyping.
TACS 1991: 750-770 |
31 | | John C. Mitchell,
Eugenio Moggi:
Kripke-Style Models for Typed lambda Calculus.
Ann. Pure Appl. Logic 51(1-2): 99-124 (1991) |
30 | | John C. Mitchell:
Type Inference With Simple Subtypes.
J. Funct. Program. 1(3): 245-285 (1991) |
29 | | Luca Cardelli,
John C. Mitchell:
Operations on Records.
Mathematical Structures in Computer Science 1(1): 3-48 (1991) |
1990 |
28 | | Patrick Lincoln,
John C. Mitchell,
Andre Scedrov,
Natarajan Shankar:
Decision Problems for Propositional Linear Logic
FOCS 1990: 662-671 |
27 | EE | Brian T. Howard,
John C. Mitchell:
Operational and Axiomatic Semantics of PCF.
LISP and Functional Programming 1990: 298-306 |
26 | | John C. Mitchell:
Toward a Typed Foundation for Method Specialization and Inheritance.
POPL 1990: 109-124 |
25 | | Robert Harper,
John C. Mitchell,
Eugenio Moggi:
Higher-Order Modules and the Phase Distinction.
POPL 1990: 341-354 |
24 | | John C. Mitchell:
Type Systems for Programming Languages.
Handbook of Theoretical Computer Science, Volume B: Formal Models and Sematics (B) 1990: 365-458 |
23 | | Kim B. Bruce,
Albert R. Meyer,
John C. Mitchell:
The Semantics of Second-Order Lambda Calculus
Inf. Comput. 85(1): 76-134 (1990) |
1989 |
22 | | Luca Cardelli,
John C. Mitchell:
Operations in Records.
Category Theory and Computer Science 1989: 75-81 |
21 | EE | Peter S. Canning,
William R. Cook,
Walter L. Hill,
Walter G. Olthoff,
John C. Mitchell:
F-Bounded Polymorphism for Object-Oriented Programming.
FPCA 1989: 273-280 |
20 | | Luca Cardelli,
John C. Mitchell:
Operations on Records.
Mathematical Foundations of Programming Semantics 1989: 22-52 |
19 | | Paris C. Kanellakis,
John C. Mitchell:
Polymorphic Unification and ML Typing.
POPL 1989: 105-115 |
1988 |
18 | EE | Lalita Jategaonkar,
John C. Mitchell:
ML with Extended Pattern Matching and Subtypes.
LISP and Functional Programming 1988: 198-211 |
17 | | John C. Mitchell,
Robert Harper:
The Essence of ML.
POPL 1988: 28-46 |
16 | EE | John C. Mitchell,
Gordon D. Plotkin:
Abstract Types Have Existential Type.
ACM Trans. Program. Lang. Syst. 10(3): 470-502 (1988) |
15 | | John C. Mitchell:
Polymorphic Type Inference and Containment
Inf. Comput. 76(2/3): 211-249 (1988) |
1987 |
14 | | John C. Mitchell,
Eugenio Moggi:
Kripke-Style models for typed lambda calculus
LICS 1987: 303-314 |
13 | | Albert R. Meyer,
John C. Mitchell,
Eugenio Moggi,
Richard Statman:
Empty Types in Polymorphic Lambda Calculus.
POPL 1987: 253-262 |
1986 |
12 | | John C. Mitchell:
A Type-Inference Approach to Reduction Properties and Semantics of Polymorphic Expressions (Summary).
LISP and Functional Programming 1986: 308-319 |
11 | | John C. Mitchell:
Representation Independence and Data Abstraction.
POPL 1986: 263-276 |
10 | | John C. Mitchell,
Michael J. O'Donnell:
Realisability Semantics for Error-Tolerant Logics.
TARK 1986: 363-382 |
1985 |
9 | | John C. Mitchell,
Albert R. Meyer:
Second-Order Logical Relations (Extended Abstract).
Logic of Programs 1985: 225-236 |
8 | | John C. Mitchell,
Gordon D. Plotkin:
Abstract Types Have Existential Type.
POPL 1985: 37-51 |
1984 |
7 | | John C. Mitchell:
Semantic Models for Second-Order Lambda Calculus
FOCS 1984: 289-299 |
6 | | John C. Mitchell:
Coercion and Type Inference.
POPL 1984: 175-185 |
5 | | Cynthia Dwork,
Paris C. Kanellakis,
John C. Mitchell:
On the Sequential Nature of Unification.
J. Log. Program. 1(1): 35-50 (1984) |
1983 |
4 | EE | John C. Mitchell:
Inference Rules for Functional and Inclusion Dependencies.
PODS 1983: 58-69 |
3 | | Albert R. Meyer,
John C. Mitchell:
Termination Assertions for Recursive Programs: Completeness and Axiomatic Definability
Information and Control 56(1/2): 112-138 (1983) |
2 | | John C. Mitchell:
The Implication Problem for Functional and Inclusion Dependencies
Information and Control 56(3): 154-173 (1983) |
1982 |
1 | | Albert R. Meyer,
John C. Mitchell:
Axiomatic Definability and Completeness for Recursive Programs.
POPL 1982: 337-346 |