default search action
Michael Hicks 0001
Michael W. Hicks
Person information
- affiliation: Amazon Web Services, USA
- affiliation: University of Maryland, College Park, MD, USA
Other persons with the same name
- Michael Hicks 0002 — University of Hertfordshire, Hatfield, UK
- Michael Hicks 0003 — Curtin University of Techology, Perth, Australia
- Michael Hicks 0004 — Radboud University, Nijmegen, The Netherlands
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j39]Joseph W. Cutler, Craig Disselkoen, Aaron Eline, Shaobo He, Kyle Headley, Michael Hicks, Kesha Hietala, Eleftherios Ioannidis, John H. Kastner, Anwar Mamat, Darin McAdams, Matt McCutchen, Neha Rungta, Emina Torlak, Andrew Wells:
Cedar: A New Language for Expressive, Fast, Safe, and Analyzable Authorization. Proc. ACM Program. Lang. 8(OOPSLA1): 670-697 (2024) - [c105]Craig Disselkoen, Aaron Eline, Shaobo He, Kyle Headley, Michael Hicks, Kesha Hietala, John H. Kastner, Anwar Mamat, Matt McCutchen, Neha Rungta, Bhakti Shah, Emina Torlak, Andrew Wells:
How We Built Cedar: A Verification-Guided Approach. SIGSOFT FSE Companion 2024: 351-357 - [i30]Joseph W. Cutler, Craig Disselkoen, Aaron Eline, Shaobo He, Kyle Headley, Michael Hicks, Kesha Hietala, Eleftherios Ioannidis, John H. Kastner, Anwar Mamat, Darin McAdams, Matt McCutchen, Neha Rungta, Emina Torlak, Andrew Wells:
Cedar: A New Language for Expressive, Fast, Safe, and Analyzable Authorization (Extended Version). CoRR abs/2403.04651 (2024) - [i29]Craig Disselkoen, Aaron Eline, Shaobo He, Kyle Headley, Michael Hicks, Kesha Hietala, John H. Kastner, Anwar Mamat, Matt McCutchen, Neha Rungta, Bhakti Shah, Emina Torlak, Andrew Wells:
How We Built Cedar: A Verification-Guided Approach. CoRR abs/2407.01688 (2024) - 2023
- [j38]Liyi Li, Yiyun Liu, Deena L. Postol, Leonidas Lampropoulos, David Van Horn, Michael Hicks:
A formal model of Checked C. J. Comput. Secur. 31(5): 581-614 (2023) - [j37]Jie Zhou, John Criswell, Michael Hicks:
Fat Pointers for Temporal Memory Safety of C. Proc. ACM Program. Lang. 7(OOPSLA1): 316-347 (2023) - [j36]Finn Voichick, Liyi Li, Robert Rand, Michael Hicks:
Qunity: A Unified Language for Quantum and Classical Computing. Proc. ACM Program. Lang. 7(POPL): 921-951 (2023) - [j35]Ian Sweet, David Darais, David Heath, William Harris, Ryan Estes, Michael Hicks:
Symphony: Expressive Secure Multiparty Computation with Coordination. Art Sci. Eng. Program. 7(3) (2023) - [j34]Kesha Hietala, Robert Rand, Liyi Li, Shih-Han Hung, Xiaodi Wu, Michael Hicks:
A Verified Optimizer for Quantum Circuits. ACM Trans. Program. Lang. Syst. 45(3): 18:1-18:35 (2023) - [j33]Zenong Zhang, George Klees, Eric Wang, Michael Hicks, Shiyi Wei:
Fuzzing Configurations of Program Options. ACM Trans. Softw. Eng. Methodol. 32(2): 53:1-53:21 (2023) - [j32]Zenong Zhang, George Klees, Eric Wang, Michael Hicks, Shiyi Wei:
Fuzzing Configurations of Program Options - RCR Report. ACM Trans. Softw. Eng. Methodol. 32(2): 55:1-55:3 (2023) - [i28]Ian Sweet, David Darais, David Heath, William Harris, Ryan Estes, Michael Hicks:
Symphony: Expressive Secure Multiparty Computation with Coordination. CoRR abs/2302.10076 (2023) - 2022
- [j31]Aravind Machiry, John H. Kastner, Matt McCutchen, Aaron Eline, Kyle Headley, Michael Hicks:
C to checked C by 3c. Proc. ACM Program. Lang. 6(OOPSLA1): 1-29 (2022) - [j30]Liyi Li, Finn Voichick, Kesha Hietala, Yuxiang Peng, Xiaodi Wu, Michael Hicks:
Verified compilation of Quantum oracles. Proc. ACM Program. Lang. 6(OOPSLA2): 589-615 (2022) - [c104]Kelsey R. Fulton, Daniel Votipka, Desiree Abrokwa, Michelle L. Mazurek, Michael Hicks, James Parker:
Understanding the How and the Why: Exploring Secure Development Practices through a Course Competition. CCS 2022: 1141-1155 - [c103]Liyi Li, Yiyun Liu, Deena L. Postol, Leonidas Lampropoulos, David Van Horn, Michael Hicks:
A Formal Model of Checked C. CSF 2022: 49-63 - [c102]Michael Coblenz, Michelle L. Mazurek, Michael Hicks:
Garbage Collection Makes Rust Easier to Use: A Randomized Controlled Trial of the Bronze Garbage Collector. ICSE 2022: 1021-1032 - [c101]Zenong Zhang, Zach Patterson, Michael Hicks, Shiyi Wei:
FIXREVERTER: A Realistic Bug Injection Methodology for Benchmarking Fuzz Testing. USENIX Security Symposium 2022: 3699-3715 - [i27]Liyi Li, Yiyun Liu, Deena L. Postol, Leonidas Lampropoulos, David Van Horn, Michael Hicks:
A Formal Model of Checked C. CoRR abs/2201.13394 (2022) - [i26]Aravind Machiry, John H. Kastner, Matt McCutchen, Aaron Eline, Kyle Headley, Michael Hicks:
C to Checked C by 3C. CoRR abs/2203.13445 (2022) - [i25]Yuxiang Peng, Kesha Hietala, Runzhou Tao, Liyi Li, Robert Rand, Michael Hicks, Xiaodi Wu:
A Formally Certified End-to-End Implementation of Shor's Factorization Algorithm. CoRR abs/2204.07112 (2022) - [i24]Finn Voichick, Robert Rand, Michael W. Hicks:
Qunity: A Unified Language for Quantum and Classical Computing. CoRR abs/2204.12384 (2022) - [i23]Jie Zhou, John Criswell, Michael Hicks:
Fat Pointers for Temporal Memory Safety of C. CoRR abs/2208.12900 (2022) - 2021
- [j29]Kesha Hietala, Robert Rand, Shih-Han Hung, Xiaodi Wu, Michael Hicks:
A verified optimizer for Quantum circuits. Proc. ACM Program. Lang. 5(POPL): 1-29 (2021) - [c100]Kesha Hietala, Robert Rand, Shih-Han Hung, Liyi Li, Michael Hicks:
Proving Quantum Programs Correct. ITP 2021: 21:1-21:19 - [c99]Jie Zhou, Michael Hicks, Yudi Yang, John Criswell:
Tutorial: Making C Programs Safer with Checked C. SecDev 2021: 13-14 - [c98]Souvik Bhattacherjee, Gang Liao, Michael Hicks, Daniel J. Abadi:
BullFrog: Online Schema Evolution via Lazy Evaluation. SIGMOD Conference 2021: 194-206 - [c97]Kelsey R. Fulton, Anna Chan, Daniel Votipka, Michael Hicks, Michelle L. Mazurek:
Benefits and Drawbacks of Adopting a Secure Programming Language: Rust as a Case Study. SOUPS @ USENIX Security Symposium 2021: 597-616 - [i22]Michael Coblenz, Michelle L. Mazurek, Michael Hicks:
Does the Bronze Garbage Collector Make Rust Easier to Use? A Controlled Experiment. CoRR abs/2110.01098 (2021) - [i21]Liyi Li, Finn Voichick, Kesha Hietala, Yuxiang Peng, Xiaodi Wu, Michael Hicks:
Verified Compilation of Quantum Oracles. CoRR abs/2112.06700 (2021) - 2020
- [j28]Benjamin C. Pierce, Michael Hicks, Cristina V. Lopes, Jens Palsberg:
Conferences in an era of expensive carbon. Commun. ACM 63(3): 35-37 (2020) - [j27]Yiyun Liu, James Parker, Patrick Redmond, Lindsey Kuper, Michael Hicks, Niki Vazou:
Verifying replicated data types with typeclass refinements in Liquid Haskell. Proc. ACM Program. Lang. 4(OOPSLA): 216:1-216:30 (2020) - [j26]David Darais, Ian Sweet, Chang Liu, Michael Hicks:
A language for probabilistically oblivious computation. Proc. ACM Program. Lang. 4(POPL): 50:1-50:31 (2020) - [j25]James Parker, Michael Hicks, Andrew Ruef, Michelle L. Mazurek, Dave Levin, Daniel Votipka, Piotr Mardziel, Kelsey R. Fulton:
Build It, Break It, Fix It: Contesting Secure Development. ACM Trans. Priv. Secur. 23(2): 10:1-10:36 (2020) - [j24]Daniel Votipka, Kelsey R. Fulton, James Parker, Matthew Hou, Michelle L. Mazurek, Michael Hicks:
Build It, Break It, Fix It Contests: Motivated Developers Still Make Security Mistakes. login Usenix Mag. 45(4) (2020) - [c96]Ian Sweet, David Darais, Michael Hicks:
Short Paper: Probabilistically Almost-Oblivious Computation. PLAS@CCS 2020: 9-12 - [c95]Daniel Votipka, Kelsey R. Fulton, James Parker, Matthew Hou, Michelle L. Mazurek, Michael Hicks:
Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It. USENIX Security Symposium 2020: 109-126 - [i20]Kesha Hietala, Robert Rand, Shih-Han Hung, Liyi Li, Michael Hicks:
Proving Quantum Programs Correct. CoRR abs/2010.01240 (2020)
2010 – 2019
- 2019
- [j23]Leonidas Lampropoulos, Michael Hicks, Benjamin C. Pierce:
Coverage guided, property based testing. Proc. ACM Program. Lang. 3(OOPSLA): 181:1-181:29 (2019) - [j22]Shih-Han Hung, Kesha Hietala, Shaopeng Zhu, Mingsheng Ying, Michael Hicks, Xiaodi Wu:
Quantitative robustness analysis of quantum programs. Proc. ACM Program. Lang. 3(POPL): 31:1-31:29 (2019) - [j21]James Parker, Niki Vazou, Michael Hicks:
LWeb: information flow security for multi-tier web applications. Proc. ACM Program. Lang. 3(POPL): 75:1-75:30 (2019) - [c94]Luís Pina, Anastasios Andronidis, Michael Hicks, Cristian Cadar:
MVEDSUA: Higher Availability Dynamic Software Updates via Multi-Version Execution. ASPLOS 2019: 573-585 - [c93]Andrew Ruef, Leonidas Lampropoulos, Ian Sweet, David Tarditi, Michael Hicks:
Achieving Safety Incrementally with Checked C. POST 2019: 76-98 - [c92]Aseem Rastogi, Nikhil Swamy, Michael Hicks:
Wys*: A DSL for Verified Secure Multi-party Computations. POST 2019: 99-122 - [c91]Robert Rand, Kesha Hietala, Michael Hicks:
Formal Verification vs. Quantum Uncertainty. SNAPL 2019: 12:1-12:11 - [i19]James Parker, Niki Vazou, Michael Hicks:
LWeb: Information Flow Security for Multi-tier Web Applications. CoRR abs/1901.07665 (2019) - [i18]ThanhVu Nguyen, Timos Antonopoulos, Andrew Ruef, Michael Hicks:
A Counterexample-guided Approach to Finding Numerical Invariants. CoRR abs/1903.12113 (2019) - [i17]Kesha Hietala, Robert Rand, Shih-Han Hung, Xiaodi Wu, Michael Hicks:
Verified Optimization in a Quantum Intermediate Representation. CoRR abs/1904.06319 (2019) - [i16]James Parker, Michael Hicks, Andrew Ruef, Michelle L. Mazurek, Dave Levin, Daniel Votipka, Piotr Mardziel, Kelsey R. Fulton:
Build It, Break It, Fix It: Contesting Secure Development. CoRR abs/1907.01679 (2019) - [i15]Kesha Hietala, Robert Rand, Shih-Han Hung, Xiaodi Wu, Michael Hicks:
A Verified Optimizer for Quantum Circuits. CoRR abs/1912.02250 (2019) - 2018
- [c90]George Klees, Andrew Ruef, Benji Cooper, Shiyi Wei, Michael Hicks:
Evaluating Fuzz Testing. CCS 2018: 2123-2138 - [c89]Shiyi Wei, Piotr Mardziel, Andrew Ruef, Jeffrey S. Foster, Michael Hicks:
Evaluating Design Tradeoffs in Numeric Static Analysis for Java. ESOP 2018: 653-682 - [c88]Ian Sweet, José Manuel Calderón Trilla, Chad Scherrer, Michael Hicks, Stephen Magill:
What's the Over/Under? Probabilistic Bounds on Information Leakage. POST 2018: 3-27 - [c87]Archibald Samuel Elliott, Andrew Ruef, Michael Hicks, David Tarditi:
Checked C: Making C Safe by Extension. SecDev 2018: 53-60 - [i14]Ian Sweet, José Manuel Calderón Trilla, Chad Scherrer, Michael Hicks, Stephen Magill:
What's the Over/Under? Probabilistic Bounds on Information Leakage. CoRR abs/1802.08234 (2018) - [i13]Shiyi Wei, Piotr Mardziel, Andrew Ruef, Jeffrey S. Foster, Michael Hicks:
Evaluating Design Tradeoffs in Numeric Static Analysis for Java. CoRR abs/1802.08927 (2018) - [i12]George Klees, Andrew Ruef, Benji Cooper, Shiyi Wei, Michael Hicks:
Evaluating Fuzz Testing. CoRR abs/1808.09700 (2018) - [i11]Shih-Han Hung, Kesha Hietala, Shaopeng Zhu, Mingsheng Ying, Michael Hicks, Xiaodi Wu:
Quantitative Robustness Analysis of Quantum Programs (Extended Version). CoRR abs/1811.03585 (2018) - 2017
- [c86]Michael Hicks:
Languages for Oblivious Computation. PLAS@CCS 2017: 1 - [c85]Timos Antonopoulos, Paul Gazzillo, Michael Hicks, Eric Koskinen, Tachio Terauchi, Shiyi Wei:
Decomposition instead of self-composition for proving the absence of timing channels. PLDI 2017: 362-375 - [c84]Mário S. Alvim, Piotr Mardziel, Michael W. Hicks:
Quantifying Vulnerability of Secret Generation Using Hyper-Distributions. POST 2017: 26-48 - [c83]ThanhVu Nguyen, Timos Antonopoulos, Andrew Ruef, Michael Hicks:
Counterexample-guided approach to finding numerical invariants. ESEC/SIGSOFT FSE 2017: 605-615 - [i10]Mário S. Alvim, Piotr Mardziel, Michael W. Hicks:
Quantifying vulnerability of secret generation using hyper-distributions (extended version). CoRR abs/1701.04174 (2017) - [i9]Rock Stevens, Octavian Suciu, Andrew Ruef, Sanghyun Hong, Michael W. Hicks, Tudor Dumitras:
Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning. CoRR abs/1701.04739 (2017) - [i8]Aseem Rastogi, Nikhil Swamy, Michael Hicks:
WYS*: A Verified Language Extension for Secure Multi-party Computations. CoRR abs/1711.06467 (2017) - [i7]David Darais, Chang Liu, Ian Sweet, Michael Hicks:
A Language for Probabilistically Oblivious Computation. CoRR abs/1711.09305 (2017) - 2016
- [j20]Robert K. Cunningham, Pamela Gupta, Ulf Lindqvist, Stelios Sidiroglou-Douskos, Michael Hicks:
IEEE SecDev 2016: Prioritizing Secure Development. IEEE Secur. Priv. 14(4): 82-84 (2016) - [j19]Karla Saur, Michael W. Hicks, Jeffrey S. Foster:
C-strider: type-aware heap traversal for C. Softw. Pract. Exp. 46(6): 767-788 (2016) - [c82]Andrew Ruef, Michael W. Hicks, James Parker, Dave Levin, Michelle L. Mazurek, Piotr Mardziel:
Build It, Break It, Fix It: Contesting Secure Development. CCS 2016: 690-703 - [c81]Karla Saur, Tudor Dumitras, Michael W. Hicks:
Evolving NoSQL Databases without Downtime. ICSME 2016: 166-176 - [c80]Luís Pina, Michael Hicks:
Tedsuto: A General Framework for Testing Dynamic Software Updates. ICST 2016: 278-287 - [c79]Karla Saur, Joseph M. Collard, Nate Foster, Arjun Guha, Laurent Vanbever, Michael W. Hicks:
Safe and Flexible Controller Upgrades for SDNs. SOSR 2016: 8 - [i6]Andrew Ruef, Michael W. Hicks, James Parker, Dave Levin, Michelle L. Mazurek, Piotr Mardziel:
Build It, Break It, Fix It: Contesting Secure Development. CoRR abs/1606.01881 (2016) - 2015
- [c78]Chang Liu, Austin Harris, Martin Maas, Michael W. Hicks, Mohit Tiwari, Elaine Shi:
GhostRider: A Hardware-Software System for Memory Trace Oblivious Computation. ASPLOS 2015: 87-101 - [c77]Matthew A. Hammer, Jana Dunfield, Kyle Headley, Nicholas Labich, Jeffrey S. Foster, Michael W. Hicks, David Van Horn:
Incremental computation with names. OOPSLA 2015: 748-766 - [e3]Cédric Fournet, Michael W. Hicks, Luca Viganò:
IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-7538-2 [contents] - [i5]Matthew A. Hammer, Jana Dunfield, Kyle Headley, Nicholas Labich, Jeffrey S. Foster, Michael Hicks, David Van Horn:
Incremental Computation with Names. CoRR abs/1503.07792 (2015) - [i4]Karla Saur, Tudor Dumitras, Michael W. Hicks:
Evolving NoSQL Databases Without Downtime. CoRR abs/1506.08800 (2015) - [i3]Karla Saur, Joseph M. Collard, Nate Foster, Arjun Guha, Laurent Vanbever, Michael W. Hicks:
Morpheus: Safe and Flexible Dynamic Updates for SDNs. CoRR abs/1509.03614 (2015) - [i2]Andrew Miller, Michael W. Hicks, Jonathan Katz, Elaine Shi:
How to Authenticate any Data Structure. Tiny Trans. Comput. Sci. 3 (2015) - 2014
- [j18]Christopher M. Hayden, Karla Saur, Edward K. Smith, Michael W. Hicks, Jeffrey S. Foster:
Kitsune: Efficient, General-Purpose Dynamic Software Updating for C. ACM Trans. Program. Lang. Syst. 36(4): 13:1-13:38 (2014) - [c76]Luís Pina, Luís Veiga, Michael W. Hicks:
Rubah: DSU for Java on a stock JVM. OOPSLA 2014: 103-119 - [c75]Matthew A. Hammer, Yit Phang Khoo, Michael Hicks, Jeffrey S. Foster:
Adapton: composable, demand-driven incremental computation. PLDI 2014: 156-166 - [c74]Andrew Miller, Michael Hicks, Jonathan Katz, Elaine Shi:
Authenticated data structures, generically. POPL 2014: 411-424 - [c73]Piotr Mardziel, Mário S. Alvim, Michael W. Hicks, Michael R. Clarkson:
Quantifying Information Flow for Dynamic Secrets. IEEE Symposium on Security and Privacy 2014: 540-555 - [c72]Chang Liu, Yan Huang, Elaine Shi, Jonathan Katz, Michael W. Hicks:
Automating Efficient RAM-Model Secure Computation. IEEE Symposium on Security and Privacy 2014: 623-638 - [c71]Aseem Rastogi, Matthew A. Hammer, Michael Hicks:
Wysteria: A Programming Language for Generic, Mixed-Mode Multiparty Computations. IEEE Symposium on Security and Privacy 2014: 655-670 - [c70]Michael Hicks, Gavin M. Bierman, Nataliya Guts, Daan Leijen, Nikhil Swamy:
Polymonadic Programming. MSFP 2014: 79-99 - [i1]Gilles Barthe, Michael Hicks, Florian Kerschbaum, Dominique Unruh:
The Synergy Between Programming Languages and Cryptography (Dagstuhl Seminar 14492). Dagstuhl Reports 4(12): 29-47 (2014) - 2013
- [j17]Piotr Mardziel, Stephen Magill, Michael Hicks, Mudhakar Srivatsa:
Dynamic enforcement of knowledge-based security policies using probabilistic abstract interpretation. J. Comput. Secur. 21(4): 463-532 (2013) - [j16]Derek Dreyer, John Field, Roberto Giacobazzi, Michael Hicks, Suresh Jagannathan, Mooly Sagiv, Peter Sewell, Philip Wadler:
Principles of POPL. ACM SIGPLAN Notices 48(4S): 12-16 (2013) - [c69]Chang Liu, Michael Hicks, Elaine Shi:
Memory Trace Oblivious Program Execution. CSF 2013: 51-65 - [c68]Luís Pina, Michael Hicks:
Rubah: Efficient, General-purpose Dynamic Software Updating for Java. HotSWUp 2013 - [c67]Yit Phang Khoo, Jeffrey S. Foster, Michael Hicks:
Expositor: scriptable time-travel debugging with first-class traces. ICSE 2013: 352-361 - [c66]Aseem Rastogi, Piotr Mardziel, Michael Hicks, Matthew A. Hammer:
Knowledge inference for optimizing secure multi-party computation. PLAS 2013: 3-14 - 2012
- [j15]Michael Hicks:
POPL'12 program chair's report: (or, how to run a medium-sized conference). ACM SIGPLAN Notices 47(4a): 19-27 (2012) - [j14]Christopher M. Hayden, Edward K. Smith, Eric A. Hardisty, Michael Hicks, Jeffrey S. Foster:
Evaluating Dynamic Software Update Safety Using Systematic Testing. IEEE Trans. Software Eng. 38(6): 1340-1354 (2012) - [c65]Mudhakar Srivatsa, Michael Hicks:
Deanonymizing mobility traces: using social network as a side-channel. CCS 2012: 628-637 - [c64]Christopher M. Hayden, Karla Saur, Michael Hicks, Jeffrey S. Foster:
A study of dynamic software update quiescence for multithreaded programs. HotSWUp 2012: 6-10 - [c63]Edward K. Smith, Michael Hicks, Jeffrey S. Foster:
Towards standardized benchmarks for Dynamic Software Updating systems. HotSWUp 2012: 11-15 - [c62]Christopher M. Hayden, Edward K. Smith, Michail Denchev, Michael Hicks, Jeffrey S. Foster:
Kitsune: efficient, general-purpose dynamic software updating for C. OOPSLA 2012: 249-264 - [c61]Stephen Magill, Michael Hicks, Suriya Subramanian, Kathryn S. McKinley:
Automating object transformations for dynamic software updating. OOPSLA 2012: 265-280 - [c60]Piotr Mardziel, Michael Hicks, Jonathan Katz, Mudhakar Srivatsa:
Knowledge-oriented secure multiparty computation. PLAS 2012: 2 - [c59]Christopher M. Hayden, Stephen Magill, Michael Hicks, Nate Foster, Jeffrey S. Foster:
Specifying and Verifying the Correctness of Dynamic Software Updates. VSTTE 2012: 278-293 - [e2]John Field, Michael Hicks:
Proceedings of the 39th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2012, Philadelphia, Pennsylvania, USA, January 22-28, 2012. ACM 2012, ISBN 978-1-4503-1083-3 [contents] - 2011
- [j13]Polyvios Pratikakis, Jeffrey S. Foster, Michael Hicks:
LOCKSMITH: Practical static race detection for C. ACM Trans. Program. Lang. Syst. 33(1): 3:1-3:55 (2011) - [c58]Piotr Mardziel, Stephen Magill, Michael Hicks, Mudhakar Srivatsa:
Dynamic Enforcement of Knowledge-Based Security Policies. CSF 2011: 114-128 - [c57]Michael Hicks, Rida A. Bazzi, Carlo Zaniolo:
Foreword. ICDE Workshops 2011: 132-133 - [c56]Christopher M. Hayden, Edward K. Smith, Michael Hicks, Jeffrey S. Foster:
State transfer for clear and efficient runtime updates. ICDE Workshops 2011: 179-184 - [c55]Nikhil Swamy, Nataliya Guts, Daan Leijen, Michael Hicks:
Lightweight monadic programming in ML. ICFP 2011: 15-27 - [c54]Jong-hoon (David) An, Avik Chaudhuri, Jeffrey S. Foster, Michael Hicks:
Dynamic inference of static types for ruby. POPL 2011: 459-472 - [c53]Kin-Keung Ma, Yit Phang Khoo, Jeffrey S. Foster, Michael Hicks:
Directed Symbolic Execution. SAS 2011: 95-111 - 2010
- [j12]Michael W. Hicks, Jeffrey S. Foster:
SCORE: agile research group management. Commun. ACM 53(10): 30-31 (2010) - [j11]Jeffrey A. Meister, Jeffrey S. Foster, Michael Hicks:
Serializing C intermediate representations for efficient and portable parsing. Softw. Pract. Exp. 40(3): 225-238 (2010) - [c52]Jean-Phillipe Martin, Michael Hicks, Manuel Costa, Periklis Akritidis, Miguel Castro:
Dynamically checking ownership policies in concurrent c/c++ programs. POPL 2010: 457-470
2000 – 2009
- 2009
- [c51]Yit Phang Khoo, Michael Hicks, Jeffrey S. Foster, Vibha Sazawal:
Directing JavaScript with arrows. DLS 2009: 49-58 - [c50]Michael Furr, Jong-hoon (David) An, Jeffrey S. Foster, Michael Hicks:
The ruby intermediate language. DLS 2009: 89-98 - [c49]Michael Furr, Jong-hoon (David) An, Jeffrey S. Foster, Michael Hicks:
Tests to the left of me, types to the right: how not to get stuck in the middle of a ruby execution. STOP@ECOOP 2009: 14-16 - [c48]Christopher M. Hayden, Eric A. Hardisty, Michael W. Hicks, Jeffrey S. Foster:
Efficient Systematic Testing for Dynamically Updatable Software. HotSWUp 2009 - [c47]