Year |
Citation |
Score |
2018 |
Tan G, Morrisett G. Bidirectional Grammars for Machine-Code Decoding and Encoding Journal of Automated Reasoning. 60: 257-277. DOI: 10.1007/S10817-017-9429-1 |
0.39 |
|
2015 |
Petcher A, Morrisett G. The foundational cryptography framework Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9036: 53-72. DOI: 10.1007/978-3-662-46666-7_4 |
0.339 |
|
2013 |
Sun M, Tan G, Siefers J, Zeng B, Morrisett G. Bringing Java's wild native world under control Acm Transactions On Information and System Security. 16. DOI: 10.1145/2535505 |
0.435 |
|
2013 |
Chiricescu S, Dehon A, Demange D, Iyer S, Kliger A, Morrisett G, Pierce BC, Reubenstein H, Smith JM, Sullivan GT, Thomas A, Tov J, White CM, Wittenberg D. SAFE: A clean-slate architecture for secure systems 2013 Ieee International Conference On Technologies For Homeland Security, Hst 2013. 570-576. DOI: 10.1109/THS.2013.6699066 |
0.341 |
|
2013 |
Huang D, Morrisett G. Formalizing the SAFECode type system Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8307: 211-226. DOI: 10.1007/978-3-319-03545-1_14 |
0.407 |
|
2010 |
Siefers J, Tan G, Morrisett G. Robusta: Taming the native beast of the JVM Proceedings of the Acm Conference On Computer and Communications Security. 201-211. DOI: 10.1145/1866307.1866331 |
0.383 |
|
2010 |
Mainland G, Morrisett G. Nikola: Embedding compiled GPU functions in Haskell Proceedings of the Acm Sigplan International Conference On Functional Programming, Icfp. 67-77. DOI: 10.1145/1863523.1863533 |
0.416 |
|
2010 |
Malecha G, Morrisett G, Shinnar A, Wisnesky R. Toward a verified relational database management system Conference Record of the Annual Acm Symposium On Principles of Programming Languages. 237-248. DOI: 10.1145/1706299.1706329 |
0.738 |
|
2010 |
Malecha G, Morrisett G, Wisnesky R. Trace-based verification of imperative programs with I/O Journal of Symbolic Computation. DOI: 10.1016/J.Jsc.2010.08.004 |
0.734 |
|
2010 |
Morrisett G. Integrating types and specifications for secure software development Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6258: 32-35. DOI: 10.1007/978-3-642-14706-7_3 |
0.355 |
|
2009 |
Chlipala A, Malecha G, Morrisett G, Shinnar A, Wisnesky R. Effective interactive proofs for higher-order imperative programs Proceedings of the Acm Sigplan International Conference On Functional Programming, Icfp. 79-90. DOI: 10.1145/1596550.1596565 |
0.756 |
|
2009 |
Nanevski A, Govereau P, Morrisett G. Towards Type-theoretic semantics for transactional concurrency Proceedings of the 2009 Acm Sigplan Workshop On Types in Language Design and Implementation, Tldi'09. 79-90. DOI: 10.1145/1481861.1481872 |
0.4 |
|
2009 |
Wisnesky R, Malecha G, Morrisett G. Certified web services in ynot Preliminary Proceedings - Automated Specification and Verification of Web Systems, Wwv 2009: 5th International Workshop. 5-19. |
0.741 |
|
2008 |
Nanevski A, Morrisett G, Shinnar A, Govereau P, Birkedal L. Ynot: Dependent types for imperative programs Proceedings of the Acm Sigplan International Conference On Functional Programming, Icfp. 229-240. DOI: 10.1145/1411204.1411237 |
0.4 |
|
2008 |
Nanevski A, Morrisett G, Birkedal L. Hoare type theory, polymorphism and separation Journal of Functional Programming. 18: 865-911. DOI: 10.1017/S0956796808006953 |
0.451 |
|
2007 |
Tan G, Morrisett G. ILEA: Inter-language analysis across java and c Proceedings of the Conference On Object-Oriented Programming Systems, Languages, and Applications, Oopsla. 39-56. DOI: 10.1145/1297027.1297031 |
0.351 |
|
2007 |
Nanevski A, Ahmed A, Morrisett G, Birkedal L. Abstract predicates and mutable ADTs in hoare type theory Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4421: 189-204. |
0.368 |
|
2007 |
Ahmed A, Fluet M, Morrisett G. L3: A linear language with locations Fundamenta Informaticae. 77: 397-449. |
0.731 |
|
2006 |
Hamlen KW, Morrisett G, Schneider FB. Computability classes for enforcement mechanisms Acm Transactions On Programming Languages and Systems. 28: 175-205. DOI: 10.1145/1111596.1111601 |
0.645 |
|
2006 |
Fluet M, Morrisett G. Monadic regions Journal of Functional Programming. 16: 485-545. DOI: 10.1017/S095679680600596X |
0.69 |
|
2006 |
Swamy N, Hicks M, Morrisett G, Grossman D, Jim T. Safe manual memory management in Cyclone Science of Computer Programming. 62: 122-144. DOI: 10.1016/J.Scico.2006.02.003 |
0.565 |
|
2006 |
Fluet M, Morrisett G, Ahmed A. Linear regions are all you need Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3924: 7-21. DOI: 10.1007/11693024_2 |
0.693 |
|
2006 |
Hamlen KW, Morrisett G, Schneider FB. Certified in-lined reference monitoring on .NET Plas 2006 - Proceedings of the 2006 Programming Languages and Analysis For Security Workshop. 2006: 7-16. |
0.679 |
|
2005 |
Ahmed A, Fluet M, Morrisett G. A step-indexed model of substructural state Proceedings of the Acm Sigplan International Conference On Functional Programming, Icfp. 78-91. DOI: 10.1145/1086365.1086376 |
0.579 |
|
2005 |
Abadi M, Morrisett G, Sabelfeld A. Language-Based Security Journal of Functional Programming. 15: 129. DOI: 10.1017/S0956796804005428 |
0.427 |
|
2005 |
Morrisett G, Ahmed A, Fluet M. L 3: A linear language with locations Lecture Notes in Computer Science. 3461: 293-307. |
0.728 |
|
2005 |
Morrisett G, Fähndrich M. Proceedings of the TLDI'05: 2005 ACM SIGPLAN International Workshop on Types in Languages Design and Implementation: Foreword Proceedings of the Tldi'05: 2005 Acm Sigplan International Workshop On Types in Languages Design and Implementation. iii. |
0.347 |
|
2004 |
Tarditi D, Morrisett G, Cheng P, Stone C, Harper R, Lee P. TIL: A type≠directed, optimizing compiler for ML Acm Sigplan Notices. 39: 554-555. DOI: 10.1145/989393.989449 |
0.702 |
|
2004 |
Tarditi D, Morrisett G, Cheng P, Stone C, Harper R, Lee P. TIL: A type-directed optimizing compiler for ML Acm Sigplan Notices. 39: 556-567. |
0.681 |
|
2004 |
Hicks M, Grossman D, Morrisett G, Jim T. Experience with safe manual memory-management in cyclone International Symposium On Memory Management, Ismm. 73-84. |
0.541 |
|
2003 |
Smith F, Grossman D, Morrisett G, Hornof L, Jim T. Compiling for template-based run-time code generation Journal of Functional Programming. 13: 677-708. DOI: 10.1017/S095679680200463X |
0.59 |
|
2003 |
Morrisett G. Achieving type safety for low-level code Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2896: 1-2. DOI: 10.1007/978-3-540-40965-6_1 |
0.417 |
|
2003 |
Morrisett G. Conference Record of Annual ACM Symposium on Principles of Programming Languages: Foreword Conference Record of the Annual Acm Symposium On Principles of Programming Languages. iii. |
0.335 |
|
2002 |
Crary K, Weirich S, Morrisett G. Intensional polymorphism in type-erasure semantics Journal of Functional Programming. 12: 567-600. DOI: 10.1017/S0956796801004282 |
0.444 |
|
2002 |
Morrisett G, Crary K, Glew N, Walker D. Stack-based typed assembly language Journal of Functional Programming. 12: 957-959. DOI: 10.1017/S0956796801004178 |
0.581 |
|
2002 |
Morrisett G. Type checking systems code Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2305: 1-5. |
0.373 |
|
2002 |
Grossman D, Morrisett G, Jim T, Hicks M, Wang Y, Cheney J. Region-based memory management in Cyclone Proceedings of the Acm Sigplan Conference On Programming Language Design and Implementation (Pldi). 282-293. |
0.564 |
|
2002 |
Morrisett G, Crary K, Glew N, Walker D. Stack-based typed assembly language Journal of Functional Programming. 12: 43-88. |
0.405 |
|
2001 |
Walker D, Morrisett G. Alias types for recursive data structures Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2071: 177-206. DOI: 10.1007/3-540-45332-6_7 |
0.444 |
|
2001 |
Grossman D, Morrisett G. Scalable certification for typed assembly language Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2071: 117-145. DOI: 10.1007/3-540-45332-6_5 |
0.59 |
|
2000 |
Grossman D, Morrisett G, Zdancewic S. Syntactic type abstraction Acm Transactions On Programming Languages and Systems. 22: 1037-1080. DOI: 10.1145/371880.371887 |
0.661 |
|
2000 |
Walker D, Crary K, Morrisett G. Typed memory management via static capabilities Acm Transactions On Programming Languages and Systems. 22: 701-771. DOI: 10.1145/363911.363923 |
0.588 |
|
2000 |
McGraw G, Morrisett G. Attacking malicious code: A report to the Infosec Research Council Ieee Software. 17: 33-41. DOI: 10.1109/52.877857 |
0.386 |
|
2000 |
Walker D, Crary K, Morrisett G. Typed memory management via static capabilities Acm Transactions On Programming Languages and Systems. 22: 701-771. |
0.416 |
|
2000 |
Grossman D, Morrisett G, Zdancewic S. Syntactic type abstraction Acm Transactions On Programming Languages and Systems. 22: 1037-1080. |
0.627 |
|
1999 |
Morrisett G, Walker D, Crary K, Glew N. From system F to typed assembly language Acm Transactions On Programming Languages and Systems. 21: 527-568. DOI: 10.1145/319301.319345 |
0.599 |
|
1999 |
Zdancewic S, Grossman D, Morrisett G. Principals in programming languages: A syntactic proof technique Sigplan Notices (Acm Special Interest Group On Programming Languages). 34: 197-207. |
0.31 |
|
1999 |
Morrisett G, Walker D, Crary K, Glew N. From system F to typed assembly language Acm Transactions On Programming Languages and Systems. 21: 527-568. |
0.435 |
|
1999 |
Smith F, Morrisett G. Comparing mostly-copying and mark-sweep conservative collection Sigplan Notices (Acm Special Interest Group On Programming Languages). 34: 68-76. |
0.308 |
|
1999 |
Crary K, Morrisett G. Type structure for low-level programming languages Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1644: 40-54. |
0.422 |
|
1998 |
Morrisett G, Harper R. Typed closure conversion for recursively-defined functions (extended abstract) Electronic Notes in Theoretical Computer Science. 10: 230-241. DOI: 10.1016/S1571-0661(05)80702-9 |
0.643 |
|
Low-probability matches (unlikely to be authored by this person) |
2010 |
Malecha G, Morrisett G. Mechanized verification with sharing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6255: 245-259. DOI: 10.1007/978-3-642-14808-8_17 |
0.29 |
|
2012 |
Dhawan U, Kwon A, Kadric E, Hriţcu C, Pierce BC, Smith JM, DeHon A, Malecha G, Morrisett G, Knight TF, Sutherland A, Hawkins T, Zyxnfryx A, Wittenberg D, Trei P, et al. Hardware support for safety interlocks and introspection Proceedings - 2012 Ieee 6th International Conference On Self-Adaptive and Self-Organizing Systems Workshops, Sasow 2012. 1-8. DOI: 10.1109/SASOW.2012.11 |
0.287 |
|
2016 |
Huang D, Morrisett G. An application of computable distributions to the semantics of probabilistic programming languages Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9632: 337-363. DOI: 10.1007/978-3-662-49498-1_14 |
0.285 |
|
2011 |
DeHon A, Ben K, Knight TF, Malecha G, Montagu B, Morisset R, Morrisett G, Pierce BC, Pollack R, Ray S, Shivers O, Smith JM, Sullivan G. Preliminary design of the SAFE platform Proceedings of the 6th Workshop On Programming Languages and Operating Systems, Plos 2011 - in Conjunction With the 23rd Acm Symposium On Operating Systems Principles, Sosp 2011. DOI: 10.1145/2039239.2039245 |
0.277 |
|
2011 |
Tristan JB, Govereau P, Morrisett G. Evaluating value-graph translation validation for LLVM Proceedings of the Acm Sigplan Conference On Programming Language Design and Implementation (Pldi). 295-305. DOI: 10.1145/1993498.1993533 |
0.274 |
|
2007 |
Newton R, Morrisett G, Welsh M. The regiment macroprogramming system Ipsn 2007: Proceedings of the Sixth International Symposium On Information Processing in Sensor Networks. 489-498. DOI: 10.1145/1236360.1236422 |
0.268 |
|
2011 |
Zeng B, Tan G, Morrisett G. Combining Control-Flow Integrity and static analysis for efficient and validated data sandboxing Proceedings of the Acm Conference On Computer and Communications Security. 29-39. DOI: 10.1145/2046707.2046713 |
0.261 |
|
2006 |
Nanevski A, Morrisett G, Birkedal L. Polymorphism and separation in Hoare type theory Proceedings of the Acm Sigplan International Conference On Functional Programming, Icfp. 2006: 62-73. DOI: 10.1145/1159803.1159812 |
0.258 |
|
2012 |
Morrisett G. Scalable formal machine models Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7705: 312-314. DOI: 10.1007/978-3-642-35182-2_22 |
0.242 |
|
2009 |
Morrisett G. Technical perspective: A compiler's story Communications of the Acm. 52: 106. DOI: 10.1145/1538788.1538813 |
0.24 |
|
2008 |
Petersen RL, Birkedal L, Nanevski A, Morrisett G. A realizability model for impredicative Hoare Type Theory Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4960: 337-352. DOI: 10.1007/978-3-540-78739-6_26 |
0.238 |
|
2012 |
Morrisett G, Tan G, Tassarotti J, Tristan JB, Gan E. RockSalt: Better, faster, stronger SFI for the x86 Acm Sigplan Notices. 47: 395-404. DOI: 10.1145/2345156.2254111 |
0.223 |
|
2013 |
Hriţcu C, Greenberg M, Karel B, Pierce BC, Morrisett G. All your IFCException are belong to us Proceedings - Ieee Symposium On Security and Privacy. 3-17. DOI: 10.1109/SP.2013.10 |
0.206 |
|
2004 |
Hudak P, Morrisett G. Journal of Functional Programming: Editorial Journal of Functional Programming. 14: i-ii. DOI: 10.1017/S0956796804005088 |
0.194 |
|
2015 |
Petcher A, Morrisett G. A Mechanized Proof of Security for Searchable Symmetric Encryption Proceedings of the Computer Security Foundations Workshop. 2015: 481-494. DOI: 10.1109/CSF.2015.36 |
0.179 |
|
2013 |
Randles AP, Rand DG, Lee C, Morrisett G, Sircar J, Nowak MA, Pfister H. Massively parallel model of extended memory use in evolutionary game dynamics Proceedings - Ieee 27th International Parallel and Distributed Processing Symposium, Ipdps 2013. 1217-1228. DOI: 10.1109/IPDPS.2013.102 |
0.165 |
|
2007 |
Mainland G, Morrisett G, Welsh M, Newton R. Demo abstract: Sensor network programming with flask Sensys'07 - Proceedings of the 5th Acm Conference On Embedded Networked Sensor Systems. 385-386. DOI: 10.1145/1322263.1322307 |
0.122 |
|
2008 |
Mainland G, Morrisett G, Welsh M. Flask: Staged functional programming for sensor P Acm Sigplan Notices. 43: 335-345. |
0.113 |
|
2008 |
Mainland G, Morrisett G, Welsh M. Flask: Staged functional programming for sensor networks Proceedings of the Acm Sigplan International Conference On Functional Programming, Icfp. 335-345. DOI: 10.1145/1411204.1411249 |
0.105 |
|
Hide low-probability matches. |