The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Stephen Magill: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Stephen Magill, Bradley Skaggs, Mauricio Papa, John Hale
    Implementation and Verification of Programmable Security. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:285-299 [Conf]
  2. Mauricio Papa, Oliver Bremer, Stephen Magill, John Hale, Sujeet Shenoi
    Simulation and Analysis of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:89-100 [Conf]
  3. Kevin Donnelly, Tyler Gibson, Neel Krishnaswami, Stephen Magill, Sungwoo Park
    The Inverse Method for the Logic of Bunched Implications. [Citation Graph (0, 0)][DBLP]
    LPAR, 2004, pp:466-480 [Conf]
  4. Stephen Magill, Josh Berdine, Edmund M. Clarke, Byron Cook
    Arithmetic Strengthening for Shape Analysis. [Citation Graph (0, 0)][DBLP]
    SAS, 2007, pp:419-436 [Conf]

  5. THOR: A Tool for Reasoning about Shape and Arithmetic. [Citation Graph (, )][DBLP]


  6. Finding heap-bounds for hardware synthesis. [Citation Graph (, )][DBLP]


  7. Automatic numeric abstractions for heap-manipulating programs. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.001secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002