Search the dblp DataBase
Richard A. DeMillo :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Richard A. DeMillo , David P. Dobkin , Richard J. Lipton Even Data Bases That Lie Can Be Compromised. [Citation Graph (14, 0)][DBLP ] IEEE Trans. Software Eng., 1978, v:4, n:1, pp:73-75 [Journal ] Richard A. DeMillo , Stanley C. Eisenstat , Richard J. Lipton Preserving Average Proximity in Arrays. [Citation Graph (2, 0)][DBLP ] Commun. ACM, 1978, v:21, n:3, pp:218-231 [Journal ] Richard A. DeMillo , Richard J. Lipton The Consistency of ``P = NP'' and Related Problems with Fragments of Number Theory [Citation Graph (1, 0)][DBLP ] STOC, 1980, pp:45-57 [Conf ] Richard A. DeMillo , Nancy A. Lynch , Michael Merritt Cryptographic Protocols [Citation Graph (1, 0)][DBLP ] STOC, 1982, pp:383-400 [Conf ] Richard A. DeMillo , Richard J. Lipton , Alan J. Perlis Social Processes and Proofs of Theorems and Programs. [Citation Graph (1, 0)][DBLP ] Commun. ACM, 1979, v:22, n:5, pp:271-280 [Journal ] Richard J. Lipton , Stanley C. Eisenstat , Richard A. DeMillo Space and Time Hierarchies for Classes of Control Structures and Data Structures. [Citation Graph (1, 0)][DBLP ] J. ACM, 1976, v:23, n:4, pp:720-732 [Journal ] Richard A. DeMillo , Hsin Pan , Eugene H. Spafford Failure and Fault Analysis for Software Debugging. [Citation Graph (0, 0)][DBLP ] COMPSAC, 1997, pp:515-521 [Conf ] Richard A. DeMillo , Nancy A. Lynch , Michael Merritt The Design and Analysis of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1981, pp:71-72 [Conf ] Dan Boneh , Richard A. DeMillo , Richard J. Lipton On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:37-51 [Conf ] George I. Davida , Richard A. DeMillo , Richard J. Lipton Multilevel Secure Distributed System. [Citation Graph (0, 0)][DBLP ] ICDCS, 1981, pp:308-312 [Conf ] Alberto Apostolico , Gianfranco Bilardi , Franco Bombi , Richard A. DeMillo An International Masters in Software Engineering: Experience and Prospects. [Citation Graph (0, 0)][DBLP ] ICDE, 1995, pp:556-557 [Conf ] Richard A. DeMillo Test Adequacy and Program Mutation. [Citation Graph (0, 0)][DBLP ] ICSE, 1989, pp:355-356 [Conf ] Richard A. DeMillo Progress Toward Automated Software Testing. [Citation Graph (0, 0)][DBLP ] ICSE, 1991, pp:180-183 [Conf ] Hiralal Agrawal , Richard A. DeMillo , Eugene H. Spafford Dynamic Slicing in the Presence of Unconstrained Pointers. [Citation Graph (0, 0)][DBLP ] Symposium on Testing, Analysis, and Verification, 1991, pp:60-73 [Conf ] Richard A. DeMillo , Hsin Pan , Eugene H. Spafford Critical Slicing for Software Fault Localization. [Citation Graph (0, 0)][DBLP ] ISSTA, 1996, pp:121-134 [Conf ] Timothy A. Budd , Richard A. DeMillo , Richard J. Lipton , Frederick G. Sayward Theoretical and Emperical Studies on Using Program Mutation to Test the Functional Correctness of Programs. [Citation Graph (0, 0)][DBLP ] POPL, 1980, pp:220-233 [Conf ] Richard A. DeMillo , Richard J. Lipton , Alan J. Perlis Social Processes and Proofs of Theorems and Programs. [Citation Graph (0, 0)][DBLP ] POPL, 1977, pp:206-214 [Conf ] Richard A. DeMillo Software development for next generation communication networks. [Citation Graph (0, 0)][DBLP ] SIGSOFT FSE, 2000, pp:1- [Conf ] George I. Davida , Richard A. DeMillo , Richard J. Lipton Protecting Shared Cryptographic Keys. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1980, pp:100-102 [Conf ] George I. Davida , Richard A. DeMillo , Richard J. Lipton A System Architecture to Support a Verifiably Secure Multilevel Security System. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1980, pp:137-144 [Conf ] Richard A. DeMillo , Richard J. Lipton Some Connections between Mathematical Logic and Complexity Theory [Citation Graph (0, 0)][DBLP ] STOC, 1979, pp:153-159 [Conf ] Richard J. Lipton , Stanley C. Eisenstat , Richard A. DeMillo The Complexity of Control Structures and Data Structures [Citation Graph (0, 0)][DBLP ] STOC, 1975, pp:186-193 [Conf ] K. Vairavan , Richard A. DeMillo Parallel Scheduling of Programs in a Restricted Model of Computation [Citation Graph (0, 0)][DBLP ] STOC, 1974, pp:248-255 [Conf ] Richard A. DeMillo Database Security. [Citation Graph (0, 0)][DBLP ] VLDB Surveys, 1978, pp:253-256 [Conf ] Richard A. DeMillo Mission-Critical Applications, Commercial Value and Software Quality. [Citation Graph (0, 0)][DBLP ] ACM Comput. Surv., 1996, v:28, n:4es, pp:204- [Journal ] Richard A. DeMillo , Richard J. Lipton A Probabilistic Remark on Algebraic Program Testing. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1978, v:7, n:4, pp:193-195 [Journal ] Richard A. DeMillo , Raymond E. Miller Implicit Computation of Synchronization Primitives. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1979, v:9, n:1, pp:35-38 [Journal ] Richard A. DeMillo , Stanley C. Eisenstat , Richard J. Lipton Space-Time Trade-Offs in Structured Programming: An Improved Combinatorial Embedding Theorem. [Citation Graph (0, 0)][DBLP ] J. ACM, 1980, v:27, n:1, pp:123-127 [Journal ] Richard A. DeMillo , K. Vairavan , E. Sycara-Cyranski A Study of Schedules as Models of Synchronous Parallel Computation. [Citation Graph (0, 0)][DBLP ] J. ACM, 1977, v:24, n:4, pp:544-565 [Journal ] Dan Boneh , Richard A. DeMillo , Richard J. Lipton On the Importance of Eliminating Errors in Cryptographic Computations. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2001, v:14, n:2, pp:101-119 [Journal ] Richard A. DeMillo , Richard J. Lipton A Constructive Generalization of the Borel-Cantelli Lemma with Application to the Complexity of Infinite Strings. [Citation Graph (0, 0)][DBLP ] Mathematical Systems Theory, 1979, v:13, n:, pp:95-104 [Journal ] Hiralal Agrawal , Richard A. DeMillo , Eugene H. Spafford An Execution-Backtracking Approach to Debugging. [Citation Graph (0, 0)][DBLP ] IEEE Software, 1991, v:8, n:3, pp:21-26 [Journal ] Hiralal Agrawal , Richard A. DeMillo , Eugene H. Spafford Debugging with Dynamic Slicing and Backtracking. [Citation Graph (0, 0)][DBLP ] Softw., Pract. Exper., 1993, v:23, n:6, pp:589-616 [Journal ] K. Vairavan , Richard A. DeMillo On the Computational Complexity of a Generalized Scheduling Problem. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1976, v:25, n:11, pp:1967-1073 [Journal ] Richard A. DeMillo , A. Jefferson Offutt Experimental Results from an Automatic Test Case Generator. [Citation Graph (0, 0)][DBLP ] ACM Trans. Softw. Eng. Methodol., 1993, v:2, n:2, pp:109-127 [Journal ] Richard A. DeMillo Introduction to the Special Section. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1994, v:20, n:10, pp:749- [Journal ] Richard A. DeMillo , Richard J. Lipton Defining Software by Continuous, Smooth Functions. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1991, v:17, n:4, pp:383-384 [Journal ] Richard A. DeMillo , Aditya P. Mathur , W. Eric Wong Some Critical Remarks on a Hierarchy of Fault-Detecting Abilities of Test Methods. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1995, v:21, n:10, pp:858-861 [Journal ] Richard A. DeMillo , A. Jefferson Offutt Constraint-Based Automatic Test Data Generation. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1991, v:17, n:9, pp:900-910 [Journal ] Edith W. Martin , Richard A. DeMillo Operational Survivability in Gracefully Degrading Distributed Processing Systems. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1986, v:12, n:6, pp:693-704 [Journal ] Blighted Virtual Neighborhoods and Other Threats to Online Social Experiences. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.303secs