The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Richard A. DeMillo: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Richard A. DeMillo, David P. Dobkin, Richard J. Lipton
    Even Data Bases That Lie Can Be Compromised. [Citation Graph (14, 0)][DBLP]
    IEEE Trans. Software Eng., 1978, v:4, n:1, pp:73-75 [Journal]
  2. Richard A. DeMillo, Stanley C. Eisenstat, Richard J. Lipton
    Preserving Average Proximity in Arrays. [Citation Graph (2, 0)][DBLP]
    Commun. ACM, 1978, v:21, n:3, pp:218-231 [Journal]
  3. Richard A. DeMillo, Richard J. Lipton
    The Consistency of ``P = NP'' and Related Problems with Fragments of Number Theory [Citation Graph (1, 0)][DBLP]
    STOC, 1980, pp:45-57 [Conf]
  4. Richard A. DeMillo, Nancy A. Lynch, Michael Merritt
    Cryptographic Protocols [Citation Graph (1, 0)][DBLP]
    STOC, 1982, pp:383-400 [Conf]
  5. Richard A. DeMillo, Richard J. Lipton, Alan J. Perlis
    Social Processes and Proofs of Theorems and Programs. [Citation Graph (1, 0)][DBLP]
    Commun. ACM, 1979, v:22, n:5, pp:271-280 [Journal]
  6. Richard J. Lipton, Stanley C. Eisenstat, Richard A. DeMillo
    Space and Time Hierarchies for Classes of Control Structures and Data Structures. [Citation Graph (1, 0)][DBLP]
    J. ACM, 1976, v:23, n:4, pp:720-732 [Journal]
  7. Richard A. DeMillo, Hsin Pan, Eugene H. Spafford
    Failure and Fault Analysis for Software Debugging. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 1997, pp:515-521 [Conf]
  8. Richard A. DeMillo, Nancy A. Lynch, Michael Merritt
    The Design and Analysis of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1981, pp:71-72 [Conf]
  9. Dan Boneh, Richard A. DeMillo, Richard J. Lipton
    On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1997, pp:37-51 [Conf]
  10. George I. Davida, Richard A. DeMillo, Richard J. Lipton
    Multilevel Secure Distributed System. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1981, pp:308-312 [Conf]
  11. Alberto Apostolico, Gianfranco Bilardi, Franco Bombi, Richard A. DeMillo
    An International Masters in Software Engineering: Experience and Prospects. [Citation Graph (0, 0)][DBLP]
    ICDE, 1995, pp:556-557 [Conf]
  12. Richard A. DeMillo
    Test Adequacy and Program Mutation. [Citation Graph (0, 0)][DBLP]
    ICSE, 1989, pp:355-356 [Conf]
  13. Richard A. DeMillo
    Progress Toward Automated Software Testing. [Citation Graph (0, 0)][DBLP]
    ICSE, 1991, pp:180-183 [Conf]
  14. Hiralal Agrawal, Richard A. DeMillo, Eugene H. Spafford
    Dynamic Slicing in the Presence of Unconstrained Pointers. [Citation Graph (0, 0)][DBLP]
    Symposium on Testing, Analysis, and Verification, 1991, pp:60-73 [Conf]
  15. Richard A. DeMillo, Hsin Pan, Eugene H. Spafford
    Critical Slicing for Software Fault Localization. [Citation Graph (0, 0)][DBLP]
    ISSTA, 1996, pp:121-134 [Conf]
  16. Timothy A. Budd, Richard A. DeMillo, Richard J. Lipton, Frederick G. Sayward
    Theoretical and Emperical Studies on Using Program Mutation to Test the Functional Correctness of Programs. [Citation Graph (0, 0)][DBLP]
    POPL, 1980, pp:220-233 [Conf]
  17. Richard A. DeMillo, Richard J. Lipton, Alan J. Perlis
    Social Processes and Proofs of Theorems and Programs. [Citation Graph (0, 0)][DBLP]
    POPL, 1977, pp:206-214 [Conf]
  18. Richard A. DeMillo
    Software development for next generation communication networks. [Citation Graph (0, 0)][DBLP]
    SIGSOFT FSE, 2000, pp:1- [Conf]
  19. George I. Davida, Richard A. DeMillo, Richard J. Lipton
    Protecting Shared Cryptographic Keys. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1980, pp:100-102 [Conf]
  20. George I. Davida, Richard A. DeMillo, Richard J. Lipton
    A System Architecture to Support a Verifiably Secure Multilevel Security System. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1980, pp:137-144 [Conf]
  21. Richard A. DeMillo, Richard J. Lipton
    Some Connections between Mathematical Logic and Complexity Theory [Citation Graph (0, 0)][DBLP]
    STOC, 1979, pp:153-159 [Conf]
  22. Richard J. Lipton, Stanley C. Eisenstat, Richard A. DeMillo
    The Complexity of Control Structures and Data Structures [Citation Graph (0, 0)][DBLP]
    STOC, 1975, pp:186-193 [Conf]
  23. K. Vairavan, Richard A. DeMillo
    Parallel Scheduling of Programs in a Restricted Model of Computation [Citation Graph (0, 0)][DBLP]
    STOC, 1974, pp:248-255 [Conf]
  24. Richard A. DeMillo
    Database Security. [Citation Graph (0, 0)][DBLP]
    VLDB Surveys, 1978, pp:253-256 [Conf]
  25. Richard A. DeMillo
    Mission-Critical Applications, Commercial Value and Software Quality. [Citation Graph (0, 0)][DBLP]
    ACM Comput. Surv., 1996, v:28, n:4es, pp:204- [Journal]
  26. Richard A. DeMillo, Richard J. Lipton
    A Probabilistic Remark on Algebraic Program Testing. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1978, v:7, n:4, pp:193-195 [Journal]
  27. Richard A. DeMillo, Raymond E. Miller
    Implicit Computation of Synchronization Primitives. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1979, v:9, n:1, pp:35-38 [Journal]
  28. Richard A. DeMillo, Stanley C. Eisenstat, Richard J. Lipton
    Space-Time Trade-Offs in Structured Programming: An Improved Combinatorial Embedding Theorem. [Citation Graph (0, 0)][DBLP]
    J. ACM, 1980, v:27, n:1, pp:123-127 [Journal]
  29. Richard A. DeMillo, K. Vairavan, E. Sycara-Cyranski
    A Study of Schedules as Models of Synchronous Parallel Computation. [Citation Graph (0, 0)][DBLP]
    J. ACM, 1977, v:24, n:4, pp:544-565 [Journal]
  30. Dan Boneh, Richard A. DeMillo, Richard J. Lipton
    On the Importance of Eliminating Errors in Cryptographic Computations. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2001, v:14, n:2, pp:101-119 [Journal]
  31. Richard A. DeMillo, Richard J. Lipton
    A Constructive Generalization of the Borel-Cantelli Lemma with Application to the Complexity of Infinite Strings. [Citation Graph (0, 0)][DBLP]
    Mathematical Systems Theory, 1979, v:13, n:, pp:95-104 [Journal]
  32. Hiralal Agrawal, Richard A. DeMillo, Eugene H. Spafford
    An Execution-Backtracking Approach to Debugging. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 1991, v:8, n:3, pp:21-26 [Journal]
  33. Hiralal Agrawal, Richard A. DeMillo, Eugene H. Spafford
    Debugging with Dynamic Slicing and Backtracking. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 1993, v:23, n:6, pp:589-616 [Journal]
  34. K. Vairavan, Richard A. DeMillo
    On the Computational Complexity of a Generalized Scheduling Problem. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1976, v:25, n:11, pp:1967-1073 [Journal]
  35. Richard A. DeMillo, A. Jefferson Offutt
    Experimental Results from an Automatic Test Case Generator. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Softw. Eng. Methodol., 1993, v:2, n:2, pp:109-127 [Journal]
  36. Richard A. DeMillo
    Introduction to the Special Section. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1994, v:20, n:10, pp:749- [Journal]
  37. Richard A. DeMillo, Richard J. Lipton
    Defining Software by Continuous, Smooth Functions. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1991, v:17, n:4, pp:383-384 [Journal]
  38. Richard A. DeMillo, Aditya P. Mathur, W. Eric Wong
    Some Critical Remarks on a Hierarchy of Fault-Detecting Abilities of Test Methods. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1995, v:21, n:10, pp:858-861 [Journal]
  39. Richard A. DeMillo, A. Jefferson Offutt
    Constraint-Based Automatic Test Data Generation. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1991, v:17, n:9, pp:900-910 [Journal]
  40. Edith W. Martin, Richard A. DeMillo
    Operational Survivability in Gracefully Degrading Distributed Processing Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1986, v:12, n:6, pp:693-704 [Journal]

  41. Blighted Virtual Neighborhoods and Other Threats to Online Social Experiences. [Citation Graph (, )][DBLP]


Search in 0.035secs, Finished in 0.038secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002