dblp.uni-trier.dewww.uni-trier.de

Trevor Jim Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2009
30EEArjun Guha, Shriram Krishnamurthi, Trevor Jim: Using static analysis for Ajax intrusion detection. WWW 2009: 561-570
2007
29EEMary F. Fernández, Trevor Jim, Kristi Morton, Nicola Onose, Jérôme Siméon: Highly distributed XQuery with DXQ. SIGMOD Conference 2007: 1159-1161
28EETrevor Jim, Nikhil Swamy, Michael Hicks: Defeating script injection attacks with browser-enforced embedded policies. WWW 2007: 601-610
27EEMary F. Fernández, Trevor Jim, Kristi Morton, Nicola Onose, Jérôme Siméon: DXQ: a distributed XQuery scripting language. XIME-P 2007
2006
26EEMohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, Richard D. Schlichting: System Call Monitoring Using Authenticated System Calls. IEEE Trans. Dependable Sec. Comput. 3(3): 216-229 (2006)
25EENikhil Swamy, Michael W. Hicks, Greg Morrisett, Dan Grossman, Trevor Jim: Safe manual memory management in Cyclone. Sci. Comput. Program. 62(2): 122-144 (2006)
2005
24EEMohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, Richard D. Schlichting: Authenticated System Calls. DSN 2005: 358-367
23 Serban Jora, Rittwik Jana, Yih-Farn Chen, Matti A. Hiltunen, Trevor Jim, Huale Huang, King Ow, Ashish K. Singh, Radhakrishnan Muthumanickam: An Alerting and Notification Service on the AT&T Enterprise Messaging Network. EuroIMSA 2005: 215-220
22EEChristof Fetzer, Trevor Jim: Dependable Distributed Computing Using Free Databases. ISAS 2005: 123-136
21EEChristof Fetzer, Gert Pfeifer, Trevor Jim: Enhancing DNS Security using the SSL Trust Infrastructure. WORDS 2005: 21-27
20EEJens Palsberg, Tian Zhao, Trevor Jim: Automatic discovery of covariant read-only fields. ACM Trans. Program. Lang. Syst. 27(1): 126-162 (2005)
2004
19EEMichael W. Hicks, J. Gregory Morrisett, Dan Grossman, Trevor Jim: Experience with safe manual memory-management in cyclone. ISMM 2004: 73-84
2003
18EEFrederick Smith, Dan Grossman, J. Gregory Morrisett, Luke Hornof, Trevor Jim: Compiling for template-based run-time code generation. J. Funct. Program. 13(3): 677-708 (2003)
17 Yih-Farn Chen, Huale Huang, Rittwik Jana, Trevor Jim, Matti A. Hiltunen, Sam John, Serban Jora, Radhakrishnan Muthumanickam, Bin Wei: iMobile EE - An Enterprise Mobile Service Platform. Wireless Networks 9(4): 283-297 (2003)
2002
16EEDan Grossman, J. Gregory Morrisett, Trevor Jim, Michael W. Hicks, Yanling Wang, James Cheney: Region-Based Memory Management in Cyclone. PLDI 2002: 282-293
15EETrevor Jim, J. Gregory Morrisett, Dan Grossman, Michael W. Hicks, James Cheney, Yanling Wang: Cyclone: A Safe Dialect of C. USENIX Annual Technical Conference, General Track 2002: 275-288
2001
14EETrevor Jim: SD3: A Trust Management System with Certified Evaluation. IEEE Symposium on Security and Privacy 2001: 106-115
13EETrevor Jim, Dan Suciu: Dynamically Distributed Query Evaluation. PODS 2001
2000
12 Trevor Jim: A Polar Type System. ICALP Satellite Workshops 2000: 323-338
11EEPankaj Kakkar, Michael McDougall, Carl A. Gunter, Trevor Jim: Certificate Distribution with Local Autonomy. IWAN 2000: 277-295
10EECarl A. Gunter, Trevor Jim: Generalized Certificate Revocation. POPL 2000: 316-329
9 Carl A. Gunter, Trevor Jim: Policy-directed certificate retrieval. Softw., Pract. Exper. 30(15): 1609-1640 (2000)
1999
8 Luke Hornof, Trevor Jim: Certifying Compilation and Run-Time Code Generation. PEPM 1999: 60-74
7 Luke Hornof, Trevor Jim: Certifying Compilation and Run-Time Code Generation. Higher-Order and Symbolic Computation 12(4): 337-375 (1999)
1997
6 Andrew W. Appel, Trevor Jim: Shrinking lambda Expressions in Linear Time. J. Funct. Program. 7(5): 515-540 (1997)
5 Jens Palsberg, Trevor Jim: Type Inference with Simple Selftypes is NP-complete. Nord. J. Comput. 4(2): 259-286 (1997)
1996
4EETrevor Jim: What Are Principal Typings and What Are They Good For? POPL 1996: 42-53
3 Trevor Jim, Albert R. Meyer: Full Abstraction and the Context Lemma. SIAM J. Comput. 25(3): 663-696 (1996)
1991
2 Trevor Jim, Albert R. Meyer: Full Abstraction and the Context Lemma. TACS 1991: 131-151
1989
1 Andrew W. Appel, Trevor Jim: Continuation-Passing, Closure-Passing Style. POPL 1989: 293-302

Coauthor Index

1Andrew W. Appel [1] [6]
2Yih-Farn Robin Chen (Yih-Farn Chen) [17] [23]
3James Cheney [15] [16]
4Mary F. Fernández (Mary F. Fernandez) [27] [29]
5Christof Fetzer [21] [22]
6Dan Grossman [15] [16] [18] [19] [25]
7Arjun Guha [30]
8Carl A. Gunter [9] [10] [11]
9Michael W. Hicks (Michael Hicks) [15] [16] [19] [25] [28]
10Matti A. Hiltunen [17] [23] [24] [26]
11Luke Hornof [7] [8] [18]
12Huale Huang [17] [23]
13Rittwik Jana [17] [23]
14Sam John [17]
15Serban Jora [17] [23]
16Pankaj Kakkar [11]
17Shriram Krishnamurthi [30]
18Michael McDougall [11]
19Albert R. Meyer [2] [3]
20J. Gregory Morrisett (Greg Morrisett) [15] [16] [18] [19] [25]
21Kristi Morton [27] [29]
22Radhakrishnan Muthumanickam [17] [23]
23Nicola Onose [27] [29]
24King Ow [23]
25Jens Palsberg [5] [20]
26Gert Pfeifer [21]
27Mohan Rajagopalan [24] [26]
28Richard D. Schlichting [24] [26]
29Jérôme Siméon [27] [29]
30Ashish K. Singh [23]
31Frederick Smith [18]
32Dan Suciu [13]
33Nikhil Swamy [25] [28]
34Yanling Wang [15] [16]
35Bin Wei [17]
36Tian Zhao [20]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)