Остановите войну!
for scientists:
default search action
Scott F. Smith 0001
- > Home > Persons > Scott F. Smith 0001
Publications
- 2013
- [c37]Peter C. Chapin, Christian Skalka, Scott F. Smith, Michael Watson:
Scalaness/nesT: type specialized staged programming for sensor networks. GPCE 2013: 135-144 - 2011
- [j15]Yu David Liu, Christian Skalka, Scott F. Smith:
Type-specialized staged programming with process separation. High. Order Symb. Comput. 24(4): 341-385 (2011) - 2010
- [c35]Aditya Kulkarni, Yu David Liu, Scott F. Smith:
Task types for pervasive atomicity. OOPSLA 2010: 671-690 - 2009
- [c34]Yu David Liu, Christian Skalka, Scott F. Smith:
Type-specialized staged programming with process separation. WGP@ICFP 2009: 49-60 - 2008
- [j14]Paritosh Shroff, Scott F. Smith, Mark Thober:
Securing information flow via dynamic capture of dependencies. J. Comput. Secur. 16(5): 637-688 (2008) - [j13]Christian Skalka, Scott F. Smith, David Van Horn:
Types and trace effects of higher order programs. J. Funct. Program. 18(2): 179-249 (2008) - [c32]Yu David Liu, Xiaoqi Lu, Scott F. Smith:
Coqa: Concurrent Objects with Quantized Atomicity. CC 2008: 260-275 - 2007
- [c31]Paritosh Shroff, Christian Skalka, Scott F. Smith:
The Nuggetizer: Abstracting Away Higher-Orderness for Program Verification. APLAS 2007: 2-18 - [c30]Paritosh Shroff, Scott F. Smith, Mark Thober:
Dynamic Dependency Monitoring to Secure Information Flow. CSF 2007: 203-217 - [c29]Scott F. Smith, Mark Thober:
Improving usability of information flow security in java. PLAS 2007: 11-20 - 2006
- [c28]Yu David Liu, Scott F. Smith:
A formal framework for component deployment. OOPSLA 2006: 325-344 - [c27]Xiaoqi Lu, Scott F. Smith:
A microkernel virtual machine: : building security with clear interfaces. PLAS 2006: 47-56 - [c26]Scott F. Smith, Mark Thober:
Refactoring programs to secure information flows. PLAS 2006: 75-84 - 2005
- [j12]Christian Skalka, Scott F. Smith:
Static use-based object confinement. Int. J. Inf. Sec. 4(1-2): 87-104 (2005) - [j11]François Pottier, Christian Skalka, Scott F. Smith:
A systematic approach to static access control. ACM Trans. Program. Lang. Syst. 27(2): 344-382 (2005) - [c25]Yu David Liu, Scott F. Smith:
Interaction-based programming with classages. OOPSLA 2005: 191-209 - [c24]Christian Skalka, Scott F. Smith, David Van Horn:
A Type and Effect System for Flexible Abstract Interpretation of Java: (Extended Abstract). AIOOL@VMCAI 2005: 111-124 - 2004
- [c23]Christian Skalka, Scott F. Smith:
History Effects and Verification. APLAS 2004: 107-128 - [c22]Yu David Liu, Scott F. Smith:
Modules with Interfaces for Dynamic Linking and Communication. ECOOP 2004: 414-439 - 2002
- [c20]Christian Skalka, Scott F. Smith:
Set Types and Applications. TIP@MPC 2002: 75-94 - 2001
- [c18]François Pottier, Christian Skalka, Scott F. Smith:
A Systematic Approach to Static Access Control. ESOP 2001: 30-45 - 2000
- [c16]Christian Skalka, Scott F. Smith:
Static enforcement of security with types. ICFP 2000: 34-45
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-09-27 22:49 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint