Carl A. Gunter
Carl A. Gunter
George and Ann Fisher Distinguished Professor, University of Illinois at Urbana-Champaign
Bestätigte E-Mail-Adresse bei illinois.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Semantics of programming languages: structures and techniques
CA Gunter
MIT press, 1992
9831992
The SwitchWare active network architecture
DS Alexander, WA Arbaugh, MW Hicks, P Kakkar, AD Keromytis, ...
IEEE Network 12 (3), 29-36, 1998
5001998
PLAN: A packet language for active networks
M Hicks, P Kakkar, JT Moore, CA Gunter, S Nettles
ACM International Conference on Functional Programming Languages (ICFP ’98 …, 1998
4411998
Semantic domains
CA Gunter, DS Scott
Handbook of Theoretical Computer Science, 633-674, 1990
422*1990
A reference model for requirements and specifications
CA Gunter, EL Gunter, M Jackson, P Zave
IEEE Software 17 (3), 37-43, 2000
3452000
Inheritance as implicit coercion
V Breazu-Tannen, T Coquand, CA Gunter, A Scedrov
Information and computation 93 (1), 172-221, 1991
3331991
Dynamic Searchable Encryption via Blind Storage.
M Naveed, M Prabhakaran, CA Gunter
EEE Symposium on Security and Privacy, San Jose, CA 2014, 2014
2762014
Active network encapsulation protocol (ANEP)
DS Alexander, CA Gunter, AD Keromytis, G Minden, D Wetherall, ...
Active Networks Request for Comments, 1997
2731997
Formal verification of standards for distance vector routing protocols
K Bhargavan, D Obradovic, CA Gunter
Journal of the ACM (JACM) 49 (4), 538-576, 2002
2332002
Toward a science of learning systems: a research agenda for the high-functioning Learning Health System
C Friedman, J Rubin, J Brown, M Buntin, M Corn, L Etheredge, C Gunter, ...
Journal of the American Medical Informatics Association 22 (1), 43-50, 2015
2082015
Privacy in the genomic era
M Naveed, E Ayday, EW Clayton, J Fellay, CA Gunter, JP Hubaux, ...
ACM Computing Surveys (CSUR) 48 (1), 1-44, 2015
1822015
Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX
W Wang, G Chen, X Pan, Y Zhang, XF Wang, V Bindschaedler, H Tang, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1812017
Identity, location, disease and more: Inferring your secrets from Android public resources
X Zhou, S Demetriou, D He, M Naveed, X Pan, XF Wang, CA Gunter, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1812013
PLANet: An active internetwork
M Hicks, JT Moore, DS Alexander, CA Gunter, SM Nettles
IEEE Conference on Computer Communications (INFOCOM '99) 3, 1124-1133 vol. 3, 1999
1731999
Theoretical aspects of object-oriented programming: types, semantics, and language design
CA Gunter, JC Mitchell
The MIT Press, 1994
1471994
Privacy APIs: Access control techniques to analyze and verify legal privacy policies
MJ May, CA Gunter, I Lee
IEEE Computer Security Foundations Workshop (CSFW '06), 2006
1382006
Verisim: Formal analysis of network simulations
K Bhargavan, CA Gunter, M Kim, I Lee, D Obradovic, O Sokolsky, ...
IEEE Transactions on Software Engineering (TOSE) 28 (2), 129-145, 2002
1322002
Models and languages for digital rights
CA Gunter, ST Weeks, AK Wright
IEEE Hawaii International Conference on System Sciences (HICSS '01), 2001
1302001
An integrated architecture for demand response communications and control
M LeMay, R Nelli, G Gross, CA Gunter
IEEE Hawaii International Conference on System Sciences (HICSS '08), 174-174, 2008
1262008
What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources.
S Demetriou, X Zhou, M Naveed, Y Lee, K Yuan, XF Wang, CA Gunter
ISOC Network and Distributed System Security (NDSS ’15), 2015
124*2015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20