The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Peter Sewell: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Peter Sewell
    On Implementations and Semantics of a Concurrent Programming Language. [Citation Graph (0, 0)][DBLP]
    CONCUR, 1997, pp:391-405 [Conf]
  2. Peter Sewell
    From Rewrite to Bisimulation Congruences. [Citation Graph (0, 0)][DBLP]
    CONCUR, 1998, pp:269-284 [Conf]
  3. Moritz Y. Becker, Peter Sewell
    Cassandra: Flexible Trust Management, Applied to Electronic Health Records. [Citation Graph (0, 0)][DBLP]
    CSFW, 2004, pp:139-154 [Conf]
  4. Peter Sewell, Jan Vitek
    Secure Composition of Untrusted Code: Wrappers and Causality Types. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:269-284 [Conf]
  5. Peter Sewell, Jan Vitek
    Secure Composition of Insecure Components. [Citation Graph (0, 0)][DBLP]
    CSFW, 1999, pp:136-150 [Conf]
  6. Keith Wansbrough, Michael Norrish, Peter Sewell, Andrei Serjantov
    Timing UDP: Mechanized Semantics for Sockets, Threads, and Failures. [Citation Graph (0, 0)][DBLP]
    ESOP, 2002, pp:278-294 [Conf]
  7. Andrei Serjantov, Peter Sewell
    Passive Attack Analysis for Connection-Based Anonymity Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2003, pp:116-131 [Conf]
  8. Peter Sewell
    Global/Local Subtyping and Capability Inference for a Distributed pi-calculus. [Citation Graph (0, 0)][DBLP]
    ICALP, 1998, pp:695-706 [Conf]
  9. Peter Sewell, Pawel T. Wojciechowski, Benjamin C. Pierce
    Location-Independent Communication for Mobile Agents: A Two-Level Architecture. [Citation Graph (0, 0)][DBLP]
    ICCL Workshop: Internet Programming Languages, 1998, pp:1-31 [Conf]
  10. Gavin M. Bierman, Michael W. Hicks, Peter Sewell, Gareth Stoyle, Keith Wansbrough
    Dynamic rebinding for marshalling and update, with destruct-time? [Citation Graph (0, 0)][DBLP]
    ICFP, 2003, pp:99-110 [Conf]
  11. James J. Leifer, Gilles Peskine, Peter Sewell, Keith Wansbrough
    Global abstraction-safe marshalling with hash types. [Citation Graph (0, 0)][DBLP]
    ICFP, 2003, pp:87-98 [Conf]
  12. Peter Sewell, James J. Leifer, Keith Wansbrough, Francesco Zappa Nardelli, Mair Allen-Williams, Pierre Habouzit, Viktor Vafeiadis
    Acute: high-level programming language design for distributed computation. [Citation Graph (0, 0)][DBLP]
    ICFP, 2005, pp:15-26 [Conf]
  13. Gian Luca Cattani, Peter Sewell
    Models for Name-Passing Processes: Interleaving and Causal. [Citation Graph (0, 0)][DBLP]
    LICS, 2000, pp:322-332 [Conf]
  14. Peter Sewell
    Bisimulation is Not Finitely (First Order) Equationally Axiomatisable [Citation Graph (0, 0)][DBLP]
    LICS, 1994, pp:62-70 [Conf]
  15. Pawel T. Wojciechowski, Peter Sewell
    Nomadic Pict: Language and Infrastructure Design for Mobile Agents. [Citation Graph (0, 0)][DBLP]
    ASA/MA, 1999, pp:2-12 [Conf]
  16. Moritz Y. Becker, Peter Sewell
    Cassandra: Distributed Access Control Policies with Tunable Expressiveness. [Citation Graph (0, 0)][DBLP]
    POLICY, 2004, pp:159-168 [Conf]
  17. Steve Bishop, Matthew Fairbairn, Michael Norrish, Peter Sewell, Michael Smith, Keith Wansbrough
    Engineering with logic: HOL specification and symbolic-evaluation testing for TCP implementations. [Citation Graph (0, 0)][DBLP]
    POPL, 2006, pp:55-66 [Conf]
  18. Peter Sewell
    Modules, abstract types, and distributed versioning. [Citation Graph (0, 0)][DBLP]
    POPL, 2001, pp:236-247 [Conf]
  19. Gareth Stoyle, Michael W. Hicks, Gavin M. Bierman, Peter Sewell, Iulian Neamtiu
    Mutatis mutandis: safe and predictable dynamic software updating. [Citation Graph (0, 0)][DBLP]
    POPL, 2005, pp:183-194 [Conf]
  20. Asis Unyapoth, Peter Sewell
    Nomadic pict: correct communication infrastructure for mobile computation. [Citation Graph (0, 0)][DBLP]
    POPL, 2001, pp:116-127 [Conf]
  21. Steve Bishop, Matthew Fairbairn, Michael Norrish, Peter Sewell, Michael Smith, Keith Wansbrough
    Rigorous specification and conformance testing techniques for network protocols, as applied to TCP, UDP, and sockets. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2005, pp:265-276 [Conf]
  22. Andrei Serjantov, Peter Sewell, Keith Wansbrough
    The UDP Calculus: Rigorous Semantics for Real Networking. [Citation Graph (0, 0)][DBLP]
    TACS, 2001, pp:535-559 [Conf]
  23. Brian E. Aydemir, Aaron Bohannon, Matthew Fairbairn, J. Nathan Foster, Benjamin C. Pierce, Peter Sewell, Dimitrios Vytiniotis, Geoffrey Washburn, Stephanie Weirich, Steve Zdancewic
    Mechanized Metatheory for the Masses: The PoplMark Challenge. [Citation Graph (0, 0)][DBLP]
    TPHOLs, 2005, pp:50-65 [Conf]
  24. Peter Sewell
    Nonaxiomatisability of Equivalences over Finite State Processes. [Citation Graph (0, 0)][DBLP]
    Ann. Pure Appl. Logic, 1997, v:90, n:1-3, pp:163-191 [Journal]
  25. Peter Sewell
    Preface. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2000, v:41, n:2, pp:- [Journal]
  26. Peter Sewell
    Process Calculi: The End of the Beginning?: (From Thought Experiments to Experimental Semantics). [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:162, n:, pp:317-321 [Journal]
  27. Gian Luca Cattani, Peter Sewell
    Models for name-passing processes: interleaving and causal. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 2004, v:190, n:2, pp:136-178 [Journal]
  28. Andrei Serjantov, Peter Sewell
    Passive-attack analysis for connection-based anonymity systems. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2005, v:4, n:3, pp:172-180 [Journal]
  29. Peter Sewell, Jan Vitek
    Secure Composition of Untrusted Code: Box pi, Wrappers, and Causality. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2003, v:11, n:2, pp:135-188 [Journal]
  30. Peter Sewell
    From rewrite rules to bisimulation congruences. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2002, v:274, n:1-2, pp:183-230 [Journal]
  31. Peter Sewell, Francesco Zappa Nardelli, Scott Owens, Gilles Peskine, Tom Ridge, Susmit Sarkar, Rok Strnisa
    Ott: effective tool support for the working semanticist. [Citation Graph (0, 0)][DBLP]
    ICFP, 2007, pp:1-12 [Conf]
  32. Rok Strnisa, Peter Sewell, Matthew Parkinson
    The java module system: core design and semantic definition. [Citation Graph (0, 0)][DBLP]
    OOPSLA, 2007, pp:499-514 [Conf]
  33. John Billings, Peter Sewell, Mark R. Shinwell, Rok Strnisa
    Type-safe distributed programming for OCaml. [Citation Graph (0, 0)][DBLP]
    ML, 2006, pp:20-31 [Conf]
  34. Gareth Stoyle, Michael W. Hicks, Gavin M. Bierman, Peter Sewell, Iulian Neamtiu
    Mutatis Mutandis: Safe and predictable dynamic software updating. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 2007, v:29, n:4, pp:- [Journal]

  35. Fences in Weak Memory Models. [Citation Graph (, )][DBLP]


  36. A Rigorous Approach to Networking: TCP, from Implementation to Protocol to Service. [Citation Graph (, )][DBLP]


  37. Rigorous Protocol Design in Practice: An Optical Packet-Switch MAC in HOL. [Citation Graph (, )][DBLP]


  38. Memory, an elusive abstraction. [Citation Graph (, )][DBLP]


  39. The semantics of x86-CC multiprocessor machine code. [Citation Graph (, )][DBLP]


  40. The semantics of power and ARM multiprocessor machine code. [Citation Graph (, )][DBLP]


  41. Rigour is good for you and feasible: reflections on formal treatments of C and UDP sockets. [Citation Graph (, )][DBLP]


  42. A Better x86 Memory Model: x86-TSO. [Citation Graph (, )][DBLP]


  43. It Is Time to Mechanize Programming Language Metatheory. [Citation Graph (, )][DBLP]


  44. x86-TSO: a rigorous and usable programmer's model for x86 multiprocessors. [Citation Graph (, )][DBLP]


Search in 0.053secs, Finished in 0.054secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002