Scott Moore

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2023
Bring Your Own Data Structures to Datalog.
Proc. ACM Program. Lang., October, 2023

The 2010 Census Confidentiality Protections Failed, Here's How and Why.
CoRR, 2023

AI and Democracy's Digital Identity Crisis.
CoRR, 2023

2022
Shared-Control Robotic Manipulation in Virtual Reality.
CoRR, 2022

2020
Fine-Grained, Language-Based Access Control for Database-Backed Applications.
Art Sci. Eng. Program., 2020

2019
Weird Machines as Insecure Compilation.
CoRR, 2019

2018
Towards Rapid Waveform Design and Deployment via Modular Signal Processing Frameworks.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Topology Algorithm Enhancements for Aerial High Capacity Directional Networks.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

2016
Constructing New Families of Nested Recursions with Slow Solutions.
SIAM J. Discret. Math., 2016

Extensible access control with authorization contracts.
Proceedings of the 2016 ACM SIGPLAN International Conference on Object-Oriented Programming, 2016

Performance evaluation of a disruption tolerant network proxy for tactical edge networks.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

2015
Exploring and enforcing security guarantees via program dependence graphs.
Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2015

Cryptographic Enforcement of Language-Based Information Erasure.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

2014
SHILL: A Secure Shell Scripting Language.
Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation, 2014

A comparison of OLSR and OSPF-MDR for large-scale airborne mobile ad-hoc networks.
Proceedings of the third ACM workshop on Airborne networks and communications, 2014

Declarative Policies for Capability Control.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

2013
Managing online sales with posted price and open-bid auctions.
Decis. Support Syst., 2013

Declaratively Processing Provenance Metadata.
Proceedings of the 5th Workshop on the Theory and Practice of Provenance, 2013

MANET IP Header Compression.
Proceedings of the 32th IEEE Military Communications Conference, 2013

Securing Robust Header Compression (ROHC).
Proceedings of the 32th IEEE Military Communications Conference, 2013

A comparison of IP header compression schemes in MANETs.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013

2012
A comparison of MANET routing protocols on airborne tactical networks.
Proceedings of the 31st IEEE Military Communications Conference, 2012

Precise enforcement of progress-sensitive security.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Static Analysis for Efficient Hybrid Information-Flow Control.
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011

2009
ActionScript bytecode verification with co-logic programming.
Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, 2009

2008
Simulation of Online Selling with Posted-Price and Auctions: Comparison of Dual Channel's Performance under Different Auction Mechanisms.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

2007
Comparing models of IT and economic growth: An empirical investigation.
Proceedings of the 2007 International Conference on Information and Communication Technologies and Development, 2007

Using Classifiers to Solve Warehouse Location Problems.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

2006
Using IT to Open Previously Unprofitable Markets.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

1990
A Study of the Prather Software Metric (Abstract).
Proceedings of the ACM 18th Annual Computer Science Conference on Cooperation, 1990


  Loading...