Trevor Jim

According to our database1, Trevor Jim authored at least 37 papers between 1989 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Sapphire: using network gateways for IoT security.
Proceedings of the 8th International Conference on the Internet of Things, 2018

2013
EyeDecrypt - Private Interactions in Plain Sight.
IACR Cryptol. ePrint Arch., 2013

Why is my smartphone slow? On the fly diagnosis of underperformance on the mobile Internet.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

2011
Delayed semantic actions in Yakker.
Proceedings of the Language Descriptions, Tools and Applications, 2011

A New Method for Dependent Parsing.
Proceedings of the Programming Languages and Systems, 2011

2010
Semantics and algorithms for data-dependent grammars.
Proceedings of the 37th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2010

2009
Efficient Earley Parsing with Regular Right-hand Sides.
Proceedings of the Ninth Workshop on Language Descriptions Tools and Applications, 2009

Using static analysis for Ajax intrusion detection.
Proceedings of the 18th International Conference on World Wide Web, 2009

An Emulation of GENI Access Control.
Proceedings of the 2nd Workshop on Cyber Security Experimentation and Test, 2009

2007
DXQ: a distributed XQuery scripting language.
Proceedings of the 4th International Workshop on XQuery Implementation, 2007

Defeating script injection attacks with browser-enforced embedded policies.
Proceedings of the 16th International Conference on World Wide Web, 2007

Highly distributed XQuery with DXQ.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2007

2006
System Call Monitoring Using Authenticated System Calls.
IEEE Trans. Dependable Secur. Comput., 2006

Safe manual memory management in Cyclone.
Sci. Comput. Program., 2006

2005
Automatic discovery of covariant read-only fields.
ACM Trans. Program. Lang. Syst., 2005

Enhancing DNS Security using the SSL Trust Infrastructure.
Proceedings of the 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2005), 2005

Dependable Distributed Computing Using Free Databases.
Proceedings of the Service Availability, 2005

An Alerting and Notification Service on the AT&T Enterprise Messaging Network.
Proceedings of the Internet and Multimedia Systems and Applications, 2005

Authenticated System Calls.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

2004
Experience with safe manual memory-management in cyclone.
Proceedings of the 4th International Symposium on Memory Management, 2004

2003
iMobile EE - An Enterprise Mobile Service Platform.
Wirel. Networks, 2003

Compiling for template-based run-time code generation.
J. Funct. Program., 2003

2002
Cyclone: A Safe Dialect of C.
Proceedings of the General Track: 2002 USENIX Annual Technical Conference, 2002

Region-Based Memory Management in Cyclone.
Proceedings of the 2002 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), 2002

2001
SD3: A Trust Management System with Certified Evaluation.
Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001

Dynamically Distributed Query Evaluation.
Proceedings of the Twentieth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 2001

2000
Policy-directed certificate retrieval.
Softw. Pract. Exp., 2000

Generalized Certificate Revocation.
Proceedings of the POPL 2000, 2000

Certificate Distribution with Local Autonomy.
Proceedings of the Active Networks, Second International Working Conference, 2000

A Polar Type System.
Proceedings of the ICALP Workshops 2000, 2000

1999
Certifying Compilation and Run-Time Code Generation.
High. Order Symb. Comput., 1999

1997
Type Inference with Simple Selftypes is NP-complete.
Nord. J. Comput., 1997

Shrinking lambda Expressions in Linear Time.
J. Funct. Program., 1997

1996
Principal typings and type inference.
PhD thesis, 1996

Full Abstraction and the Context Lemma.
SIAM J. Comput., 1996

What Are Principal Typings and What Are They Good For?
Proceedings of the Conference Record of POPL'96: The 23rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1996

1989
Continuation-Passing, Closure-Passing Style.
Proceedings of the Conference Record of the Sixteenth Annual ACM Symposium on Principles of Programming Languages, 1989


  Loading...