2010 | ||
---|---|---|
31 | Trevor Jim, Yitzhak Mandelbaum, David Walker: Semantics and algorithms for data-dependent grammars. POPL 2010: 417-430 | |
2009 | ||
30 | Arjun Guha, Shriram Krishnamurthi, Trevor Jim: Using static analysis for Ajax intrusion detection. WWW 2009: 561-570 | |
2007 | ||
29 | Mary F. Fernández, Trevor Jim, Kristi Morton, Nicola Onose, Jérôme Siméon: Highly distributed XQuery with DXQ. SIGMOD Conference 2007: 1159-1161 | |
28 | Trevor Jim, Nikhil Swamy, Michael Hicks: Defeating script injection attacks with browser-enforced embedded policies. WWW 2007: 601-610 | |
27 | Mary F. Fernández, Trevor Jim, Kristi Morton, Nicola Onose, Jérôme Siméon: DXQ: a distributed XQuery scripting language. XIME-P 2007 | |
2006 | ||
26 | Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, Richard D. Schlichting: System Call Monitoring Using Authenticated System Calls. IEEE Trans. Dependable Sec. Comput. 3(3): 216-229 (2006) | |
25 | Nikhil Swamy, Michael W. Hicks, Greg Morrisett, Dan Grossman, Trevor Jim: Safe manual memory management in Cyclone. Sci. Comput. Program. 62(2): 122-144 (2006) | |
2005 | ||
24 | Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, Richard D. Schlichting: Authenticated System Calls. DSN 2005: 358-367 | |
23 | Serban Jora, Rittwik Jana, Yih-Farn Chen, Matti A. Hiltunen, Trevor Jim, Huale Huang, King Ow, Ashish K. Singh, Radhakrishnan Muthumanickam: An Alerting and Notification Service on the AT&T Enterprise Messaging Network. EuroIMSA 2005: 215-220 | |
22 | Christof Fetzer, Trevor Jim: Dependable Distributed Computing Using Free Databases. ISAS 2005: 123-136 | |
21 | Christof Fetzer, Gert Pfeifer, Trevor Jim: Enhancing DNS Security using the SSL Trust Infrastructure. WORDS 2005: 21-27 | |
20 | Jens Palsberg, Tian Zhao, Trevor Jim: Automatic discovery of covariant read-only fields. ACM Trans. Program. Lang. Syst. 27(1): 126-162 (2005) | |
2004 | ||
19 | Michael W. Hicks, J. Gregory Morrisett, Dan Grossman, Trevor Jim: Experience with safe manual memory-management in cyclone. ISMM 2004: 73-84 | |
2003 | ||
18 | Frederick Smith, Dan Grossman, J. Gregory Morrisett, Luke Hornof, Trevor Jim: Compiling for template-based run-time code generation. J. Funct. Program. 13(3): 677-708 (2003) | |
17 | Yih-Farn Chen, Huale Huang, Rittwik Jana, Trevor Jim, Matti A. Hiltunen, Sam John, Serban Jora, Radhakrishnan Muthumanickam, Bin Wei: iMobile EE - An Enterprise Mobile Service Platform. Wireless Networks 9(4): 283-297 (2003) | |
2002 | ||
16 | Dan Grossman, J. Gregory Morrisett, Trevor Jim, Michael W. Hicks, Yanling Wang, James Cheney: Region-Based Memory Management in Cyclone. PLDI 2002: 282-293 | |
15 | Trevor Jim, J. Gregory Morrisett, Dan Grossman, Michael W. Hicks, James Cheney, Yanling Wang: Cyclone: A Safe Dialect of C. USENIX Annual Technical Conference, General Track 2002: 275-288 | |
2001 | ||
14 | Trevor Jim: SD3: A Trust Management System with Certified Evaluation. IEEE Symposium on Security and Privacy 2001: 106-115 | |
13 | Trevor Jim, Dan Suciu: Dynamically Distributed Query Evaluation. PODS 2001 | |
2000 | ||
12 | Trevor Jim: A Polar Type System. ICALP Satellite Workshops 2000: 323-338 | |
11 | Pankaj Kakkar, Michael McDougall, Carl A. Gunter, Trevor Jim: Certificate Distribution with Local Autonomy. IWAN 2000: 277-295 | |
10 | Carl A. Gunter, Trevor Jim: Generalized Certificate Revocation. POPL 2000: 316-329 | |
9 | Carl A. Gunter, Trevor Jim: Policy-directed certificate retrieval. Softw., Pract. Exper. 30(15): 1609-1640 (2000) | |
1999 | ||
8 | Luke Hornof, Trevor Jim: Certifying Compilation and Run-Time Code Generation. PEPM 1999: 60-74 | |
7 | Luke Hornof, Trevor Jim: Certifying Compilation and Run-Time Code Generation. Higher-Order and Symbolic Computation 12(4): 337-375 (1999) | |
1997 | ||
6 | Andrew W. Appel, Trevor Jim: Shrinking lambda Expressions in Linear Time. J. Funct. Program. 7(5): 515-540 (1997) | |
5 | Jens Palsberg, Trevor Jim: Type Inference with Simple Selftypes is NP-complete. Nord. J. Comput. 4(2): 259-286 (1997) | |
1996 | ||
4 | Trevor Jim: What Are Principal Typings and What Are They Good For? POPL 1996: 42-53 | |
3 | Trevor Jim, Albert R. Meyer: Full Abstraction and the Context Lemma. SIAM J. Comput. 25(3): 663-696 (1996) | |
1991 | ||
2 | Trevor Jim, Albert R. Meyer: Full Abstraction and the Context Lemma. TACS 1991: 131-151 | |
1989 | ||
1 | Andrew W. Appel, Trevor Jim: Continuation-Passing, Closure-Passing Style. POPL 1989: 293-302 |