John C. Mitchell
Orcid: 0000-0002-0024-860XAffiliations:
- Stanford University, Department of Computer Science, USA
According to our database1,
John C. Mitchell
authored at least 230 papers
between 1982 and 2024.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2008, "For contributions to the theory of programming languages.".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on id.loc.gov
-
on andrej.com
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
CoRR, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 55th ACM Technical Symposium on Computer Science Education, 2024
Proceedings of the 55th ACM Technical Symposium on Computer Science Education, 2024
Machine Learning Techniques for Context-Aware Human Activity Recognition: A Feasibility Study.
Proceedings of the 30th International Conference on Mechatronics and Machine Vision in Practice, 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
2023
Found. Trends Priv. Secur., 2023
Proceedings of the 54th ACM Technical Symposium on Computer Science Education, Volume 1, 2023
2022
Proceedings of the SIGCSE 2022: The 53rd ACM Technical Symposium on Computer Science Education, 2022
Proceedings of the L@S'22: Ninth ACM Conference on Learning @ Scale, New York City, NY, USA, June 1, 2022
Function Names: Quantifying the Relationship Between Identifiers and Their Functionality to Improve Them.
Proceedings of the L@S'22: Ninth ACM Conference on Learning @ Scale, New York City, NY, USA, June 1, 2022
2021
Assessing Function Names and Quantifying the Relationship Between Identifiers and Their Functionality to Improve Them.
Proceedings of the L@S'21: Eighth ACM Conference on Learning @ Scale, 2021
Proceedings of the ICETM 2021: 4th International Conference on Education Technology Management, Tokyo, Japan, December 17, 2021
2020
Proceedings of the IEEE Learning With MOOCS, 2020
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020
Proceedings of the IEEE International Conference on Blockchain, 2020
2019
J. Cryptol., 2019
2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Fifth Annual ACM Conference on Learning at Scale, 2018
2017
J. Funct. Program., 2017
J. Comput. Secur., 2017
2016
Proc. Natl. Acad. Sci. USA, 2016
Proceedings of the 4th International Conference on Learning Representations, 2016
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
2015
IFC Inside: Retrofitting Languages with Dynamic Information Flow Control (Extended Version).
CoRR, 2015
Fast Algorithms for Learning with Long N-grams via Suffix Tree Based Matrix Multiplication.
Proceedings of the Thirty-First Conference on Uncertainty in Artificial Intelligence, 2015
Proceedings of the Principles of Security and Trust - 4th International Conference, 2015
2014
MOOCs on and off the Farm: MOOCs and technology to advance learning and learning research (Ubiquity symposium).
Ubiquity, 2014
Massively Open Online Courses, Current State and Perspectives (Dagstuhl Perspectives Workshop 14112).
Dagstuhl Reports, 2014
Massive Open Online Courses: Current State and Perspectives (Dagstuhl Perspectives Workshop 14112).
Dagstuhl Manifestos, 2014
Proceedings of the 8th USENIX Workshop on Offensive Technologies, 2014
Proceedings of the 31st International Symposium on Theoretical Aspects of Computer Science (STACS 2014), 2014
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014
Proceedings of the Seventeenth International Conference on Artificial Intelligence and Statistics, 2014
2013
Proceedings of the 2013 USENIX Workshop on Health Information Technologies, 2013
Proceedings of the Advances in Neural Information Processing Systems 26: 27th Annual Conference on Neural Information Processing Systems 2013. Proceedings of a meeting held December 5-8, 2013
Proceedings of the 14th Workshop on Hot Topics in Operating Systems, 2013
Proceedings of the 2013 IEEE 26th Computer Security Foundations Symposium, 2013
2012
IEEE Trans. Dependable Secur. Comput., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the 21st World Wide Web Conference 2012, 2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Proceedings of the ACM International Health Informatics Symposium, 2012
Addressing covert termination and timing channels in concurrent information flow systems.
Proceedings of the ACM SIGPLAN International Conference on Functional Programming, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Logic, Language, Information and Computation, 2011
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Proceedings of the Static Analysis - 18th International Symposium, 2011
Proceedings of the Information Security Technology for Applications, 2011
Proceedings of the Formal Aspects of Security and Trust - 8th International Workshop, 2011
Proceedings of the 4th ACM SIGPLAN Symposium on Haskell, 2011
Proceedings of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, 2011
Proceedings of the Computer Security - ESORICS 2011, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the Formal Models and Techniques for Analyzing Security Protocols, 2011
2010
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010
Proceedings of the 3rd Workshop on Cyber Security Experimentation and Test, 2010
Proceedings of the 2010 Workshop on Collaborative Methods for Security and Privacy, 2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010
2009
Proceedings of the Trust, 2009
Proceedings of the 1st ACM SIGCOMM 2009 Workshop on Research on Enterprise Networking, 2009
Proceedings of the Computer Security, 2009
09073 Abstracts Collection - Model-Based Design of Trustworthy Health Information Systems.
Proceedings of the Model-Based Design of Trustworthy Health Information Systems, 11.02., 2009
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009
Proceedings of the first ACM Cloud Computing Security Workshop, 2009
2008
Proceedings of the Botnet Detection: Countering the Largest Security Threat, 2008
Proceedings of the Third International Workshop on Security and Rewriting Techniques, 2008
Proceedings of the 2nd USENIX Workshop on Offensive Technologies, 2008
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
Proceedings of the Programming Languages and Systems, 6th Asian Symposium, 2008
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008
2007
Proceedings of the Computation, Meaning, and Logic: Articles dedicated to Gordon Plotkin, 2007
Proceedings of the 2nd USENIX Workshop on Hot Topics in Security, 2007
Proceedings of the Trustworthy Global Computing, Third Symposium, 2007
Proceedings of the Computer Security, 2007
Proceedings of the Detection of Intrusions and Malware, 2007
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007
2006
A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols.
Theor. Comput. Sci., 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the 15th international conference on World Wide Web, 2006
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
Proceedings of the 21th IEEE Symposium on Logic in Computer Science (LICS 2006), 2006
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006
Proceedings of the Advances in Computer Science, 2006
2005
J. Comput. Secur., 2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005
Proceedings of the 7th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, 2005
Proceedings of the POPL 2005 Workshop on Issues in the Theory of Security, 2005
Proceedings of the Network and Distributed System Security Symposium, 2005
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
2004
J. Comput. Secur., 2004
Proceedings of the 2004 ACM Workshop on Wireless Security, 2004
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004
Proceedings of the Network and Distributed System Security Symposium, 2004
Proceedings of the Information Security, 7th International Conference, 2004
Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols.
Proceedings of the Foundations of Software Science and Computation Structures, 2004
Proceedings of the 17th IEEE Computer Security Foundations Workshop, 2004
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004
2003
J. Comput. Secur., 2003
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003
Proceedings of the Practical Aspects of Declarative Languages, 5th International Symposium, 2003
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003
Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June, 2003
Composition of Cryptographic Protocols in a Probabilistic Polynomial-Time Process Calculus.
Proceedings of the CONCUR 2003, 2003
Proceedings of the 2003 ACM workshop on Formal methods in security engineering, 2003
Proceedings of the 2003 ACM workshop on Formal methods in security engineering, 2003
Concepts in programming languages.
Cambridge University Press, ISBN: 978-0-521-78098-8, 2003
2002
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002
Proceedings of the Rewriting Techniques and Applications, 13th International Conference, 2002
Proceedings of the Software Security -- Theories and Systems, 2002
A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis.
Proceedings of the Software Security -- Theories and Systems, 2002
2001
A Probabilistic Polynomial-time Calculus For Analysis of Cryptographic Protocols (Preliminary Report).
Proceedings of the Seventeenth Conference on the Mathematical Foundations of Programming Semantics, 2001
Proceedings of the Conference Record of POPL 2001: The 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2001
Proceedings of the 16th Annual IEEE Symposium on Logic in Computer Science, 2001
Proceedings of the Programming Languages and Systems, 2001
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001
Proceedings of the CCS 2001, 2001
2000
Proceedings of the Network and Distributed System Security Symposium, 2000
Proceedings of the Financial Cryptography, 2000
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000
Proceedings of the ASPLOS-IX Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, 2000
1999
ACM Trans. Program. Lang. Syst., 1999
Proceedings of the Fifteenth Conference on Mathematical Foundations of Progamming Semantics, 1999
Proceedings of the 1999 ACM SIGPLAN Conference on Object-Oriented Programming Systems, 1999
Proceedings of the FM'99 - Formal Methods, 1999
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999
1998
On the Relationship Between Classes, Objects, and Data Abstraction.
Theory Pract. Object Syst., 1998
Proceedings of the 7th USENIX Security Symposium, 1998
A Linguistic Characterization of Bounded Oracle Computation and Probabilistic Polynomial Time.
Proceedings of the 39th Annual Symposium on Foundations of Computer Science, 1998
Proceedings of the CCS '98, 1998
Proceedings of the Computer Aided Verification, 10th International Conference, 1998
1997
Proceedings of the Second Workshop on Higher-Order Operational Techniques in Semantics, 1997
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997
Proceedings of the 1997 ACM SIGPLAN Conference on Object-Oriented Programming Systems, 1997
1996
Proceedings of the Linear Logic Tokyo Meeting 1996, Keio University, Mita Campus, Tokyo, Japan, March 29, 1996
ACM Comput. Surv., 1996
Proceedings of the Automata, Languages and Programming, 23rd International Colloquium, 1996
Foundations for programming languages.
Foundation of computing series, MIT Press, ISBN: 978-0-262-13321-0, 1996
1995
The Development of Type Systems for Object-Oriented Languages.
Theory Pract. Object Syst., 1995
Proceedings of the Conference Record of POPL'95: 22nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1995
Proceedings of the Fundamentals of Computation Theory, 10th International Symposium, 1995
1994
A lambda Calculus of Objects and Method Specialization.
Nord. J. Comput., 1994
Proceedings of the Theoretical Aspects of Computer Software, 1994
Proceedings of the Conference Record of POPL'94: 21st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1994
Proceedings of the Workshop on Interface Definition Languages, 1994
1993
Sci. Comput. Program., 1993
Type Inference with Extended Pattern Matching and Subtypes.
Fundam. Informaticae, 1993
Proceedings of the Eighth Annual Symposium on Logic in Computer Science (LICS '93), 1993
1992
Proceedings of the Conference Record of the Nineteenth Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1992
Proceedings of the Conference Record of the Nineteenth Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1992
Proceedings of the Seventh Annual Symposium on Logic in Computer Science (LICS '92), 1992
Proceedings of the Computer Science Logic, 6th Workshop, 1992
1991
Proceedings of the Conference Record of the Eighteenth Annual ACM Symposium on Principles of Programming Languages, 1991
Proceedings of the Constructivity in Computer Science, 1991
Proceedings of the Artificial and Mathematical Theory of Computation, 1991
Unification and ML-Type Reconstruction.
Proceedings of the Computational Logic - Essays in Honor of Alan Robinson, 1991
1990
Proceedings of the Conference Record of the Seventeenth Annual ACM Symposium on Principles of Programming Languages, 1990
Proceedings of the Conference Record of the Seventeenth Annual ACM Symposium on Principles of Programming Languages, 1990
Proceedings of the 1990 ACM Conference on LISP and Functional Programming, 1990
Proceedings of the Handbook of Theoretical Computer Science, 1990
1989
Proceedings of the Conference Record of the Sixteenth Annual ACM Symposium on Principles of Programming Languages, 1989
Proceedings of the fourth international conference on Functional programming languages and computer architecture, 1989
1988
Proceedings of the Conference Record of the Fifteenth Annual ACM Symposium on Principles of Programming Languages, 1988
Proceedings of the 1988 ACM Conference on LISP and Functional Programming, 1988
1987
Proceedings of the Conference Record of the Fourteenth Annual ACM Symposium on Principles of Programming Languages, 1987
1986
Realisability Semantics for Error-Tolerant Logics.
Proceedings of the 1st Conference on Theoretical Aspects of Reasoning about Knowledge, 1986
Proceedings of the Conference Record of the Thirteenth Annual ACM Symposium on Principles of Programming Languages, 1986
A Type-Inference Approach to Reduction Properties and Semantics of Polymorphic Expressions (Summary).
Proceedings of the 1986 ACM Conference on LISP and Functional Programming, 1986
1985
Proceedings of the Logics of Programs, 1985
1984
Proceedings of the Conference Record of the Eleventh Annual ACM Symposium on Principles of Programming Languages, 1984
Proceedings of the 25th Annual Symposium on Foundations of Computer Science, 1984
1983
Inf. Control., March, 1983
Termination Assertions for Recursive Programs: Completeness and Axiomatic Definability
Inf. Control., 1983
Proceedings of the Second ACM SIGACT-SIGMOD Symposium on Principles of Database Systems, 1983
1982
Proceedings of the Conference Record of the Ninth Annual ACM Symposium on Principles of Programming Languages, 1982