Search the dblp DataBase
Trevor Jim :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Mohan Rajagopalan , Matti A. Hiltunen , Trevor Jim , Richard D. Schlichting Authenticated System Calls. [Citation Graph (0, 0)][DBLP ] DSN, 2005, pp:358-367 [Conf ] Serban Jora , Rittwik Jana , Yih-Farn Chen , Matti A. Hiltunen , Trevor Jim , Huale Huang , King Ow , Ashish K. Singh , Radhakrishnan Muthumanickam An Alerting and Notification Service on the AT&T Enterprise Messaging Network. [Citation Graph (0, 0)][DBLP ] EuroIMSA, 2005, pp:215-220 [Conf ] Trevor Jim A Polar Type System. [Citation Graph (0, 0)][DBLP ] ICALP Satellite Workshops, 2000, pp:323-338 [Conf ] Christof Fetzer , Trevor Jim Dependable Distributed Computing Using Free Databases. [Citation Graph (0, 0)][DBLP ] ISAS, 2005, pp:123-136 [Conf ] Pankaj Kakkar , Michael McDougall , Carl A. Gunter , Trevor Jim Certificate Distribution with Local Autonomy. [Citation Graph (0, 0)][DBLP ] IWAN, 2000, pp:277-295 [Conf ] Michael W. Hicks , J. Gregory Morrisett , Dan Grossman , Trevor Jim Experience with safe manual memory-management in cyclone. [Citation Graph (0, 0)][DBLP ] ISMM, 2004, pp:73-84 [Conf ] Luke Hornof , Trevor Jim Certifying Compilation and Run-Time Code Generation. [Citation Graph (0, 0)][DBLP ] PEPM, 1999, pp:60-74 [Conf ] Dan Grossman , J. Gregory Morrisett , Trevor Jim , Michael W. Hicks , Yanling Wang , James Cheney Region-Based Memory Management in Cyclone. [Citation Graph (0, 0)][DBLP ] PLDI, 2002, pp:282-293 [Conf ] Trevor Jim , Dan Suciu Dynamically Distributed Query Evaluation. [Citation Graph (0, 0)][DBLP ] PODS, 2001, pp:- [Conf ] Andrew W. Appel , Trevor Jim Continuation-Passing, Closure-Passing Style. [Citation Graph (0, 0)][DBLP ] POPL, 1989, pp:293-302 [Conf ] Trevor Jim What Are Principal Typings and What Are They Good For? [Citation Graph (0, 0)][DBLP ] POPL, 1996, pp:42-53 [Conf ] Carl A. Gunter , Trevor Jim Generalized Certificate Revocation. [Citation Graph (0, 0)][DBLP ] POPL, 2000, pp:316-329 [Conf ] Trevor Jim SD3: A Trust Management System with Certified Evaluation. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2001, pp:106-115 [Conf ] Trevor Jim , Albert R. Meyer Full Abstraction and the Context Lemma. [Citation Graph (0, 0)][DBLP ] TACS, 1991, pp:131-151 [Conf ] Trevor Jim , J. Gregory Morrisett , Dan Grossman , Michael W. Hicks , James Cheney , Yanling Wang Cyclone: A Safe Dialect of C. [Citation Graph (0, 0)][DBLP ] USENIX Annual Technical Conference, General Track, 2002, pp:275-288 [Conf ] Christof Fetzer , Gert Pfeifer , Trevor Jim Enhancing DNS Security using the SSL Trust Infrastructure. [Citation Graph (0, 0)][DBLP ] WORDS, 2005, pp:21-27 [Conf ] Andrew W. Appel , Trevor Jim Shrinking lambda Expressions in Linear Time. [Citation Graph (0, 0)][DBLP ] J. Funct. Program., 1997, v:7, n:5, pp:515-540 [Journal ] Frederick Smith , Dan Grossman , J. Gregory Morrisett , Luke Hornof , Trevor Jim Compiling for template-based run-time code generation. [Citation Graph (0, 0)][DBLP ] J. Funct. Program., 2003, v:13, n:3, pp:677-708 [Journal ] Luke Hornof , Trevor Jim Certifying Compilation and Run-Time Code Generation. [Citation Graph (0, 0)][DBLP ] Higher-Order and Symbolic Computation, 1999, v:12, n:4, pp:337-375 [Journal ] Jens Palsberg , Trevor Jim Type Inference with Simple Selftypes is NP-complete. [Citation Graph (0, 0)][DBLP ] Nord. J. Comput., 1997, v:4, n:2, pp:259-286 [Journal ] Nikhil Swamy , Michael W. Hicks , Greg Morrisett , Dan Grossman , Trevor Jim Safe manual memory management in Cyclone. [Citation Graph (0, 0)][DBLP ] Sci. Comput. Program., 2006, v:62, n:2, pp:122-144 [Journal ] Trevor Jim , Albert R. Meyer Full Abstraction and the Context Lemma. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1996, v:25, n:3, pp:663-696 [Journal ] Carl A. Gunter , Trevor Jim Policy-directed certificate retrieval. [Citation Graph (0, 0)][DBLP ] Softw., Pract. Exper., 2000, v:30, n:15, pp:1609-1640 [Journal ] Mohan Rajagopalan , Matti A. Hiltunen , Trevor Jim , Richard D. Schlichting System Call Monitoring Using Authenticated System Calls. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:3, pp:216-229 [Journal ] Jens Palsberg , Tian Zhao , Trevor Jim Automatic discovery of covariant read-only fields. [Citation Graph (0, 0)][DBLP ] ACM Trans. Program. Lang. Syst., 2005, v:27, n:1, pp:126-162 [Journal ] Yih-Farn Chen , Huale Huang , Rittwik Jana , Trevor Jim , Matti A. Hiltunen , Sam John , Serban Jora , Radhakrishnan Muthumanickam , Bin Wei iMobile EE - An Enterprise Mobile Service Platform. [Citation Graph (0, 0)][DBLP ] Wireless Networks, 2003, v:9, n:4, pp:283-297 [Journal ] Mary F. Fernández , Trevor Jim , Kristi Morton , Nicola Onose , Jérôme Siméon Highly distributed XQuery with DXQ. [Citation Graph (0, 0)][DBLP ] SIGMOD Conference, 2007, pp:1159-1161 [Conf ] Trevor Jim , Nikhil Swamy , Michael Hicks Defeating script injection attacks with browser-enforced embedded policies. [Citation Graph (0, 0)][DBLP ] WWW, 2007, pp:601-610 [Conf ] Semantics and algorithms for data-dependent grammars. [Citation Graph (, )][DBLP ] Using static analysis for Ajax intrusion detection. [Citation Graph (, )][DBLP ] DXQ: a distributed XQuery scripting language. [Citation Graph (, )][DBLP ] Search in 0.006secs, Finished in 0.007secs