|
Search the dblp DataBase
Geoff W. Hamilton:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Geoff W. Hamilton, S. B. Jones
Extending Deforestation for First Order functional Programs. [Citation Graph (0, 0)][DBLP] Functional Programming, 1991, pp:134-145 [Conf]
- Benjamin Aziz, David Gray, Geoff W. Hamilton
A Static Analysis of PKI-Based Systems. [Citation Graph (0, 0)][DBLP] ICTCS, 2005, pp:51-65 [Conf]
- Benjamin Aziz, Geoff W. Hamilton
A Denotational Semantics for the Pi-Calculus. [Citation Graph (0, 0)][DBLP] IWFM, 2001, pp:- [Conf]
- Geoff W. Hamilton
Compile-Time Garbage Collection for Lazy Functional Languages [Citation Graph (0, 0)][DBLP] IWMM, 1995, pp:119-144 [Conf]
- Geoff W. Hamilton
Higher Order Deforestation. [Citation Graph (0, 0)][DBLP] PLILP, 1996, pp:213-227 [Conf]
- Geoff W. Hamilton
Sharing Analysis of Lazy First-Order Functional Programs. [Citation Graph (0, 0)][DBLP] WSA, 1992, pp:68-78 [Conf]
- Geoff W. Hamilton, S. B. Jones
Transforming Programs to Eliminate Intermediate Structures. [Citation Graph (0, 0)][DBLP] JTASPEFT/WSA, 1991, pp:182-188 [Conf]
- Bernadette Power, Geoff W. Hamilton
Declassification: Transforming Java Programs to Remove Intermediate Classes. [Citation Graph (0, 0)][DBLP] SCAM, 2005, pp:183-192 [Conf]
- Benjamin Aziz, Geoff W. Hamilton, David Gray
A Denotational Approach to the Static Analysis of Cryptographic Processes. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2005, v:118, n:, pp:19-36 [Journal]
- Geoff W. Hamilton
Higher Order Deforestation. [Citation Graph (0, 0)][DBLP] Fundam. Inform., 2006, v:69, n:1-2, pp:39-61 [Journal]
- Geoff W. Hamilton
Usage Counting Analysis for Lazy Functional Languages. [Citation Graph (0, 0)][DBLP] Inf. Comput., 1998, v:146, n:2, pp:100-137 [Journal]
- Benjamin Aziz, Geoff W. Hamilton, David Gray
A static analysis of cryptographic processes: the denotational approach. [Citation Graph (0, 0)][DBLP] J. Log. Algebr. Program., 2005, v:64, n:2, pp:285-320 [Journal]
Detecting Man-in-the-Middle Attacks by Precise Timing. [Citation Graph (, )][DBLP]
Search in 0.203secs, Finished in 0.204secs
|