default search action
Richard A. DeMillo
Person information
- affiliation: Georgia Institute of Technology, Atlanta, GA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j32]Ali Vatankhah Barenji, Benoît Montreuil, Sevda Babalou, Dima Nazzal, Frédérick Bénaben, Richard A. DeMillo:
An Agent-Based Simulation Platform for a Safe Election: From Design to Simulation. Inf. 14(10): 529 (2023)
2010 – 2019
- 2012
- [j31]Richard A. DeMillo:
Keeping technology promises. Commun. ACM 55(11): 37-39 (2012) - [c27]Paul Manuel Aviles Baker, Keith R. Bujak, Rich DeMillo:
The Evolving University: Disruptive Change and Institutional Innovation. DSAI 2012: 330-335
2000 – 2009
- 2009
- [c26]Richard A. DeMillo:
Blighted Virtual Neighborhoods and Other Threats to Online Social Experiences. WISE 2009: 1-2 - 2001
- [j30]Dan Boneh, Richard A. DeMillo, Richard J. Lipton:
On the Importance of Eliminating Errors in Cryptographic Computations. J. Cryptol. 14(2): 101-119 (2001) - 2000
- [c25]Richard A. DeMillo:
Software development for next generation communication networks. SIGSOFT FSE 2000: 1
1990 – 1999
- 1999
- [j29]Victor R. Basili, Laszlo A. Belady, Barry W. Boehm, Frederick P. Brooks Jr., James Browne, Richard A. DeMillo, Stuart I. Feldman, Cordell Green, Butler W. Lampson, Duncan H. Lawrie, Nancy G. Leveson, Nancy A. Lynch, Mark D. Weiser, Jeannette M. Wing:
NSF workshop on a software research program for the 21st century. ACM SIGSOFT Softw. Eng. Notes 24(3): 37-44 (1999) - 1997
- [c24]Richard A. DeMillo, Hsin Pan, Eugene H. Spafford:
Failure and Fault Analysis for Software Debugging. COMPSAC 1997: 515-521 - [c23]Dan Boneh, Richard A. DeMillo, Richard J. Lipton:
On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract). EUROCRYPT 1997: 37-51 - 1996
- [j28]Richard A. DeMillo:
Mission-Critical Applications, Commercial Value and Software Quality. ACM Comput. Surv. 28(4es): 204 (1996) - [c22]Richard A. DeMillo, Hsin Pan, Eugene H. Spafford:
Critical Slicing for Software Fault Localization. ISSTA 1996: 121-134 - 1995
- [j27]Richard A. DeMillo, Aditya P. Mathur, W. Eric Wong:
Some Critical Remarks on a Hierarchy of Fault-Detecting Abilities of Test Methods. IEEE Trans. Software Eng. 21(10): 858-861 (1995) - [c21]Alberto Apostolico, Gianfranco Bilardi, Franco Bombi, Richard A. DeMillo:
An International Masters in Software Engineering: Experience and Prospects. ICDE 1995: 556-557 - 1994
- [j26]Richard A. DeMillo:
Introduction to the Special Section. IEEE Trans. Software Eng. 20(10): 749 (1994) - 1993
- [j25]Hiralal Agrawal, Richard A. DeMillo, Eugene H. Spafford:
Debugging with Dynamic Slicing and Backtracking. Softw. Pract. Exp. 23(6): 589-616 (1993) - [j24]Richard A. DeMillo, A. Jefferson Offutt:
Experimental Results from an Automatic Test Case Generator. ACM Trans. Softw. Eng. Methodol. 2(2): 109-127 (1993) - [e4]Victor R. Basili, Richard A. DeMillo, Takuya Katayama:
Proceedings of the 15th International Conference on Software Engineering, Baltimore, Maryland, USA, May 17-21, 1993. IEEE Computer Society / ACM Press 1993, ISBN 0-89791-588-7 [contents] - 1991
- [j23]Hiralal Agrawal, Richard A. DeMillo, Eugene H. Spafford:
An Execution-Backtracking Approach to Debugging. IEEE Softw. 8(3): 21-26 (1991) - [j22]Richard A. DeMillo, Richard J. Lipton:
Defining Software by Continuous, Smooth Functions. IEEE Trans. Software Eng. 17(4): 383-384 (1991) - [j21]Richard A. DeMillo, A. Jefferson Offutt:
Constraint-Based Automatic Test Data Generation. IEEE Trans. Software Eng. 17(9): 900-910 (1991) - [c20]Richard A. DeMillo, Edward W. Krauser, Aditya P. Mathur:
Compiler-integrated program mutation. COMPSAC 1991: 351-356 - [c19]Richard A. DeMillo:
Progress Toward Automated Software Testing. ICSE 1991: 180-183 - [c18]Hiralal Agrawal, Richard A. DeMillo, Eugene H. Spafford:
Dynamic Slicing in the Presence of Unconstrained Pointers. Symposium on Testing, Analysis, and Verification 1991: 60-73
1980 – 1989
- 1989
- [c17]Richard A. DeMillo:
Software testing for critical applications: a position paper. COMPSAC 1989 - [c16]Richard A. DeMillo:
Test Adequacy and Program Mutation. ICSE 1989: 355-356 - 1988
- [c15]Rich DeMillo, Weimin Du, Ryan Stansifer:
An integrated software environment for reuse. TRI-Ada 1988: 186-197 - 1987
- [b1]Richard A. DeMillo, W. Michael McCracken, Rhonda J. Martin, John F. Passafiume:
Software testing and evaluation. Benjamin/Cummings 1987, ISBN 978-0-8053-2535-5, pp. I-XIII, 1-537 - 1986
- [j20]Edith W. Martin, Richard A. DeMillo:
Operational Survivability in Gracefully Degrading Distributed Processing Systems. IEEE Trans. Software Eng. 12(6): 693-704 (1986) - 1984
- [e3]Richard A. DeMillo:
Proceedings of the 16th Annual ACM Symposium on Theory of Computing, April 30 - May 2, 1984, Washington, DC, USA. ACM 1984 [contents] - 1983
- [j19]Richard A. DeMillo, Michael Merritt:
Protocols for Data Security. Computer 16(2): 39-51 (1983) - 1982
- [c14]Richard A. DeMillo, Nancy A. Lynch, Michael Merritt:
Cryptographic Protocols. STOC 1982: 383-400 - [e2]Richard A. DeMillo:
Conference Record of the Ninth Annual ACM Symposium on Principles of Programming Languages, Albuquerque, New Mexico, USA, January 1982. ACM Press 1982, ISBN 0-89791-065-6 [contents] - 1981
- [c13]Richard A. DeMillo, Nancy A. Lynch, Michael Merritt:
The Design and Analysis of Cryptographic Protocols. CRYPTO 1981: 71-72 - [c12]George I. Davida, Richard A. DeMillo, Richard J. Lipton:
Multilevel Secure Distributed System. ICDCS 1981: 308-312 - 1980
- [j18]Richard A. DeMillo, Stanley C. Eisenstat, Richard J. Lipton:
Space-Time Trade-Offs in Structured Programming: An Improved Combinatorial Embedding Theorem. J. ACM 27(1): 123-127 (1980) - [c11]Timothy A. Budd, Richard A. DeMillo, Richard J. Lipton, Frederick G. Sayward:
Theoretical and Emperical Studies on Using Program Mutation to Test the Functional Correctness of Programs. POPL 1980: 220-233 - [c10]George I. Davida, Richard A. DeMillo, Richard J. Lipton:
Protecting Shared Cryptographic Keys. S&P 1980: 100-102 - [c9]George I. Davida, Richard A. DeMillo, Richard J. Lipton:
A System Architecture to Support a Verifiably Secure Multilevel Security System. S&P 1980: 137-144 - [c8]Richard A. DeMillo, Richard J. Lipton:
The Consistency of "P = NP" and Related Problems with Fragments of Number Theory. STOC 1980: 45-57
1970 – 1979
- 1979
- [j17]Richard A. DeMillo, Richard J. Lipton, Alan J. Perlis:
Social Processes and Proofs of Theorems and Programs. Commun. ACM 22(5): 271-280 (1979) - [j16]Richard A. DeMillo, Raymond E. Miller:
Implicit Computation of Synchronization Primitives. Inf. Process. Lett. 9(1): 35-38 (1979) - [j15]Richard A. DeMillo, Richard J. Lipton:
A Constructive Generalization of the Borel-Cantelli Lemma with Application to the Complexity of Infinite Strings. Math. Syst. Theory 13: 95-104 (1979) - [j14]Richard A. DeMillo, Richard J. Lipton:
Review of "Proofs and refutations: the logic of mathematical discovery" by Imre Lakatos. Cambridge University Press 1976. SIGACT News 11(2): 7-9 (1979) - [c7]Richard A. DeMillo, Richard J. Lipton:
Some Connections between Mathematical Logic and Complexity Theory. STOC 1979: 153-159 - [e1]Michael J. Fischer, Richard A. DeMillo, Nancy A. Lynch, Walter A. Burkhard, Alfred V. Aho:
Proceedings of the 11h Annual ACM Symposium on Theory of Computing, April 30 - May 2, 1979, Atlanta, Georgia, USA. ACM 1979 [contents] - 1978
- [j13]Richard A. DeMillo, Stanley C. Eisenstat, Richard J. Lipton:
Preserving Average Proximity in Arrays. Commun. ACM 21(3): 218-231 (1978) - [j12]Richard A. DeMillo, Richard J. Lipton, Frederick G. Sayward:
Hints on Test Data Selection: Help for the Practicing Programmer. Computer 11(4): 34-41 (1978) - [j11]Richard A. DeMillo, Richard J. Lipton:
A Probabilistic Remark on Algebraic Program Testing. Inf. Process. Lett. 7(4): 193-195 (1978) - [j10]Edsger W. Dijkstra, Richard A. DeMillo, Richard J. Lipton, Alan J. Perlis:
On a political pamphlet from the middle ages. ACM SIGSOFT Softw. Eng. Notes 3(2): 14-16 (1978) - [j9]Richard A. DeMillo, Richard J. Lipton, Alan J. Perlis:
Response from R. A. DeMillo, R. J. Lipton, A. J. Perlis. ACM SIGSOFT Softw. Eng. Notes 3(2): 16-17 (1978) - [j8]Richard A. DeMillo, David P. Dobkin, Richard J. Lipton:
Even Data Bases That Lie Can Be Compromised. IEEE Trans. Software Eng. 4(1): 73-75 (1978) - [c6]Timothy A. Budd, Richard J. Lipton, Richard A. DeMillo, Frederick G. Sayward:
The design of a prototype mutation system for program testing. AFIPS National Computer Conference 1978: 623-629 - [c5]Richard A. DeMillo, David P. Dobkin:
Recent progress in secure computation. COMPSAC 1978: 209-214 - [c4]Richard A. DeMillo:
Database Security. VLDB Surveys 1978: 253-256 - 1977
- [j7]Bruce H. Barnes, George I. Davida, Richard A. DeMillo, Larry Landweber, Harold S. Stone:
Theory in the Computer Science and Engineering Curriculum: Why, What, When, and Where. Computer 10(12): 106-108 (1977) - [j6]Richard A. DeMillo, K. Vairavan, Ekaterini Sycara-Cyranski:
A Study of Schedules as Models of Synchronous Parallel Computation. J. ACM 24(4): 544-565 (1977) - [j5]Richard A. DeMillo:
Some applications of model theory to the metatheory of program schemata. Notre Dame J. Formal Log. 18(3): 489-495 (1977) - [c3]Richard A. DeMillo, Richard J. Lipton, Alan J. Perlis:
Social Processes and Proofs of Theorems and Programs. POPL 1977: 206-214 - 1976
- [j4]Richard J. Lipton, Stanley C. Eisenstat, Richard A. DeMillo:
Space and Time Hierarchies for Classes of Control Structures and Data Structures. J. ACM 23(4): 720-732 (1976) - [j3]Richard A. DeMillo, Stanley C. Eisenstat, Richard J. Lipton:
Can structured programs be efficient? ACM SIGPLAN Notices 11(10): 10-18 (1976) - [j2]K. Vairavan, Richard A. DeMillo:
On the Computational Complexity of a Generalized Scheduling Problem. IEEE Trans. Computers 25(11): 1967-1073 (1976) - 1975
- [j1]Richard A. DeMillo:
Non-definability of certain semantic properties of programs. Notre Dame J. Formal Log. 16(4): 583-590 (1975) - [c2]Richard J. Lipton, Stanley C. Eisenstat, Richard A. DeMillo:
The Complexity of Control Structures and Data Structures. STOC 1975: 186-193 - 1974
- [c1]K. Vairavan, Richard A. DeMillo:
Parallel Scheduling of Programs in a Restricted Model of Computation. STOC 1974: 248-255
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint