The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Trevor Jim: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, Richard D. Schlichting
    Authenticated System Calls. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:358-367 [Conf]
  2. Serban Jora, Rittwik Jana, Yih-Farn Chen, Matti A. Hiltunen, Trevor Jim, Huale Huang, King Ow, Ashish K. Singh, Radhakrishnan Muthumanickam
    An Alerting and Notification Service on the AT&T Enterprise Messaging Network. [Citation Graph (0, 0)][DBLP]
    EuroIMSA, 2005, pp:215-220 [Conf]
  3. Trevor Jim
    A Polar Type System. [Citation Graph (0, 0)][DBLP]
    ICALP Satellite Workshops, 2000, pp:323-338 [Conf]
  4. Christof Fetzer, Trevor Jim
    Dependable Distributed Computing Using Free Databases. [Citation Graph (0, 0)][DBLP]
    ISAS, 2005, pp:123-136 [Conf]
  5. Pankaj Kakkar, Michael McDougall, Carl A. Gunter, Trevor Jim
    Certificate Distribution with Local Autonomy. [Citation Graph (0, 0)][DBLP]
    IWAN, 2000, pp:277-295 [Conf]
  6. Michael W. Hicks, J. Gregory Morrisett, Dan Grossman, Trevor Jim
    Experience with safe manual memory-management in cyclone. [Citation Graph (0, 0)][DBLP]
    ISMM, 2004, pp:73-84 [Conf]
  7. Luke Hornof, Trevor Jim
    Certifying Compilation and Run-Time Code Generation. [Citation Graph (0, 0)][DBLP]
    PEPM, 1999, pp:60-74 [Conf]
  8. Dan Grossman, J. Gregory Morrisett, Trevor Jim, Michael W. Hicks, Yanling Wang, James Cheney
    Region-Based Memory Management in Cyclone. [Citation Graph (0, 0)][DBLP]
    PLDI, 2002, pp:282-293 [Conf]
  9. Trevor Jim, Dan Suciu
    Dynamically Distributed Query Evaluation. [Citation Graph (0, 0)][DBLP]
    PODS, 2001, pp:- [Conf]
  10. Andrew W. Appel, Trevor Jim
    Continuation-Passing, Closure-Passing Style. [Citation Graph (0, 0)][DBLP]
    POPL, 1989, pp:293-302 [Conf]
  11. Trevor Jim
    What Are Principal Typings and What Are They Good For? [Citation Graph (0, 0)][DBLP]
    POPL, 1996, pp:42-53 [Conf]
  12. Carl A. Gunter, Trevor Jim
    Generalized Certificate Revocation. [Citation Graph (0, 0)][DBLP]
    POPL, 2000, pp:316-329 [Conf]
  13. Trevor Jim
    SD3: A Trust Management System with Certified Evaluation. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2001, pp:106-115 [Conf]
  14. Trevor Jim, Albert R. Meyer
    Full Abstraction and the Context Lemma. [Citation Graph (0, 0)][DBLP]
    TACS, 1991, pp:131-151 [Conf]
  15. Trevor Jim, J. Gregory Morrisett, Dan Grossman, Michael W. Hicks, James Cheney, Yanling Wang
    Cyclone: A Safe Dialect of C. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, General Track, 2002, pp:275-288 [Conf]
  16. Christof Fetzer, Gert Pfeifer, Trevor Jim
    Enhancing DNS Security using the SSL Trust Infrastructure. [Citation Graph (0, 0)][DBLP]
    WORDS, 2005, pp:21-27 [Conf]
  17. Andrew W. Appel, Trevor Jim
    Shrinking lambda Expressions in Linear Time. [Citation Graph (0, 0)][DBLP]
    J. Funct. Program., 1997, v:7, n:5, pp:515-540 [Journal]
  18. Frederick Smith, Dan Grossman, J. Gregory Morrisett, Luke Hornof, Trevor Jim
    Compiling for template-based run-time code generation. [Citation Graph (0, 0)][DBLP]
    J. Funct. Program., 2003, v:13, n:3, pp:677-708 [Journal]
  19. Luke Hornof, Trevor Jim
    Certifying Compilation and Run-Time Code Generation. [Citation Graph (0, 0)][DBLP]
    Higher-Order and Symbolic Computation, 1999, v:12, n:4, pp:337-375 [Journal]
  20. Jens Palsberg, Trevor Jim
    Type Inference with Simple Selftypes is NP-complete. [Citation Graph (0, 0)][DBLP]
    Nord. J. Comput., 1997, v:4, n:2, pp:259-286 [Journal]
  21. Nikhil Swamy, Michael W. Hicks, Greg Morrisett, Dan Grossman, Trevor Jim
    Safe manual memory management in Cyclone. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 2006, v:62, n:2, pp:122-144 [Journal]
  22. Trevor Jim, Albert R. Meyer
    Full Abstraction and the Context Lemma. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1996, v:25, n:3, pp:663-696 [Journal]
  23. Carl A. Gunter, Trevor Jim
    Policy-directed certificate retrieval. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 2000, v:30, n:15, pp:1609-1640 [Journal]
  24. Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, Richard D. Schlichting
    System Call Monitoring Using Authenticated System Calls. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:3, pp:216-229 [Journal]
  25. Jens Palsberg, Tian Zhao, Trevor Jim
    Automatic discovery of covariant read-only fields. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 2005, v:27, n:1, pp:126-162 [Journal]
  26. Yih-Farn Chen, Huale Huang, Rittwik Jana, Trevor Jim, Matti A. Hiltunen, Sam John, Serban Jora, Radhakrishnan Muthumanickam, Bin Wei
    iMobile EE - An Enterprise Mobile Service Platform. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2003, v:9, n:4, pp:283-297 [Journal]
  27. Mary F. Fernández, Trevor Jim, Kristi Morton, Nicola Onose, Jérôme Siméon
    Highly distributed XQuery with DXQ. [Citation Graph (0, 0)][DBLP]
    SIGMOD Conference, 2007, pp:1159-1161 [Conf]
  28. Trevor Jim, Nikhil Swamy, Michael Hicks
    Defeating script injection attacks with browser-enforced embedded policies. [Citation Graph (0, 0)][DBLP]
    WWW, 2007, pp:601-610 [Conf]

  29. Semantics and algorithms for data-dependent grammars. [Citation Graph (, )][DBLP]


  30. Using static analysis for Ajax intrusion detection. [Citation Graph (, )][DBLP]


  31. DXQ: a distributed XQuery scripting language. [Citation Graph (, )][DBLP]


Search in 0.006secs, Finished in 0.007secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002