Andrew D. Gordon
#53,009
Most Influential Person Now
British computer scientist
Andrew D. Gordon's AcademicInfluence.com Rankings
Andrew D. Gordoncomputer-science Degrees
Computer Science
#2295
World Rank
#2392
Historical Rank
Computational Linguistics
#1966
World Rank
#1987
Historical Rank
Artificial Intelligence
#3246
World Rank
#3294
Historical Rank
Machine Learning
#3555
World Rank
#3599
Historical Rank
Download Badge
Computer Science
Andrew D. Gordon's Degrees
- Bachelors Computer Science University of Oxford
Similar Degrees You Can Earn
Why Is Andrew D. Gordon Influential?
(Suggest an Edit or Addition)According to Wikipedia, Andrew D. Gordon is a British computer scientist employed by Microsoft Research. His research interests include programming language design, formal methods, concurrency, cryptography, and access control.
Andrew D. Gordon's Published Works
Published Works
- Mobile Ambients (1998) (1957)
- A calculus for cryptographic protocols: the spi calculus (1997) (1519)
- Probabilistic programming (2014) (667)
- Concurrent Haskell (1996) (449)
- Anytime, anywhere: modal logics for mobile ambients (2000) (395)
- Design and Semantics of a Decentralized Authorization Language (2007) (368)
- Verified Reference Implementations of WS-Security Protocols (2006) (317)
- Authenticity by typing for security protocols (2001) (244)
- Refinement Types for Secure Implementations (2008) (239)
- Experience with Embedding Hardware Description Languages in HOL (1992) (233)
- Bisimilarity as a theory of functional programming (1999) (211)
- Types for mobile ambients (1999) (209)
- Bimodal Modelling of Source Code and Natural Language (2015) (180)
- Verified interoperable implementations of security protocols (2006) (174)
- Types and effects for asymmetric cryptographic protocols (2002) (173)
- Functional programming and input/output (1995) (157)
- Mobility Types for Mobile Ambients (1999) (156)
- A Bisimulation Method for Cryptographic Protocols (1998) (150)
- Stack inspection: Theory and variants (2003) (149)
- Code-Carrying Authorization (2008) (143)
- Higher order operational techniques in semantics (1999) (124)
- A Concurrent Object Calculus: Reduction and Typing (1998) (114)
- Modular verification of security protocol code by typing (2010) (111)
- Equational properties of mobile ambients (1999) (109)
- Measure Transformer Semantics for Bayesian Machine Learning (2011) (106)
- A type discipline for authorization policies (2005) (105)
- Secrecy and Group Creation (2000) (104)
- TulaFale: A Security Tool for Web Services (2003) (104)
- Ambient Groups and Mobility Types (2000) (103)
- Reasoning about Cryptographic Protocols in the Spi Calculus (1997) (102)
- Five Axioms of Alpha-Conversion (1996) (101)
- A semantics for web services authentication (2004) (98)
- A lambda-calculus foundation for universal probabilistic programming (2015) (97)
- Deciding validity in a spatial logic for trees (2003) (94)
- Typing a multi-language intermediate code (2001) (92)
- A Tutorial on Co-induction and Functional Programming (1994) (90)
- Typing Correspondence Assertions for Communication Protocols (2001) (89)
- Verifying policy-based security for web services (2004) (88)
- Logical Properties of Name Restriction (2001) (83)
- Bisimilarity for a first-order calculus of objects with subtyping (1996) (81)
- A Mechanisation of Name-Carrying Syntax up to Alpha-Conversion (1993) (80)
- Types for the Ambient Calculus (2002) (78)
- Semantic subtyping with an SMT solver (2010) (75)
- Validating a web service security abstraction by typing (2002) (73)
- An advisor for web services security policies (2005) (71)
- Proceedings of the 21st IEEE Computer Security Foundations Symposium, CSF 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008 (2008) (70)
- Tabular: a schema-driven probabilistic programming language (2014) (65)
- Maintaining Database Integrity with Refinement Types (2011) (64)
- Bayesian inference using data flow analysis (2013) (62)
- Extracting and verifying cryptographic models from C protocol code by symbolic execution (2011) (62)
- Compilation and equivalence of imperative objects (1997) (61)
- Secure sessions for Web services (2004) (55)
- Practical probabilistic programming with monads (2015) (55)
- Verifying Cryptographic Code in C: Some Experience and the Csec Challenge (2011) (54)
- Notes on Nominal Calculi for Security and Mobility (2000) (50)
- Finite-Control Mobile Ambients (2002) (48)
- Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols (2011) (48)
- Verified implementations of the information card federated identity-management protocol (2008) (48)
- A Declarative Approach to Automated Configuration (2012) (45)
- Deriving Probability Density Functions from Probabilistic Functional Programs (2013) (43)
- Model checking mobile ambients (2003) (40)
- Secrecy Despite Compromise: Types, Cryptography, and the Pi-Calculus (2005) (39)
- A model-learner pattern for bayesian reasoning (2013) (34)
- Secure compilation of a multi-tier web language (2009) (33)
- Computational verification of C protocol implementations by symbolic execution (2012) (30)
- Operational equivalences for untyped and polymorphic object calculi (1999) (29)
- Typing One-to-One and One-to-Many Correspondences in Security Protocols (2002) (29)
- From stack inspection to access control: a security analysis for libraries (2004) (29)
- Principles and Applications of Refinement Types (2010) (29)
- Region analysis and a pi-calculus with groups (2002) (29)
- Secure sessions for web services (2007) (28)
- Roles, stacks, histories: A triple for Hoare (2010) (26)
- The Complexity of Model Checking Mobile Ambients (2001) (26)
- Stack inspection: theory and variants (2002) (25)
- Differentially Private Bayesian Programming (2016) (25)
- Report on the Non-Strict Functional Language (1997) (21)
- More Semantics More Robust: Improving Android Malware Classifiers (2016) (21)
- CRI/EPCC MPI for CRAY T3D (1995) (19)
- Verifying policy-based web services security (2008) (19)
- An Introduction to Formal Specification and Z by Ben Potter, Jane Sinclair and David Till, Prentice-Hall, 1991. Z: An Introduction to Formal Methods (second edition) by Antoni Diller, John Wiley & Sons, 1994. (1996) (19)
- OptTyper: Probabilistic Type Inference by Optimising Logical and Natural Constraints (2020) (18)
- A Sound Metalogical Semantics for Input/Output Effects (1994) (18)
- Calculation View: multiple-representation editing in spreadsheets (2018) (18)
- Region Analysis and a pi-Calculus wiht Groups (2000) (18)
- A Commitment Relation for the Ambient Calculus (2000) (17)
- An operational semantics for I/O in a lazy functional language (1993) (17)
- LinkingPark: An Integrated Approach for Semantic Table Interpretation (2020) (17)
- Probabilistic programming with densities in SlicStan: efficient, flexible, and deterministic (2018) (14)
- Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages (2017) (14)
- Monadic I/O in Haskell 1.3 (1995) (12)
- Bayesian Inference for Probabilistic Programs via Symbolic Execution (2012) (12)
- Provable Implementations of Security Protocols (2006) (12)
- What is it like to program with artificial intelligence? (2022) (11)
- Relating operational and denotational semantics for input/output effects (1999) (11)
- Algebraic Process Calculi: The First Twenty Five Years and Beyond III (2007) (10)
- The formal definition of a synchronous hardware-description language in higher order logic (1992) (10)
- Compilation and Equivalence of Imperative Objects (Revised Report) (1998) (10)
- Elastic sheet-defined functions: Generalising spreadsheet functions to variable-size input arrays (2020) (10)
- V for Virtual (2006) (10)
- Understanding and Inferring Units in Spreadsheets (2020) (9)
- Type Inference for Correspondence Types (2009) (9)
- How do people learn to use spreadsheets? (Work in progress) (2019) (9)
- Typing a multilanguage intermediate code (2000) (8)
- Guest Editors' Foreword (2008) (8)
- Gridlets: Reusing Spreadsheet Grids (2020) (8)
- A Chart Semantics for the Pi-Calculus (2007) (8)
- Probabilistic Programs as Spreadsheet Queries (2015) (8)
- Fabular: regression formulas as probabilistic programming (2016) (7)
- Nominal calculi for security and mobility (1997) (7)
- Service Combinators for Farming Virtual Machines (2007) (7)
- The Complexity of Model Checking Mobile Ambients – DRAFT VERSION – (2000) (6)
- Automating Type Soundness Proofs via Decision Procedures and Guided Reductions (2002) (6)
- Conditional Independence by Typing (2020) (6)
- A text-mining approach to explain unwanted behaviours (2016) (6)
- Proceedings of the fourth ACM workshop on Formal methods in security (2006) (5)
- Higher-Order Spreadsheets with Spilled Arrays (2020) (5)
- Anytime, Anywhere Modal Logics for Mobile Ambients (Extended Abstract) (2000) (5)
- Cryptographic Verification by Typing for a Sample Protocol Implementation (2011) (5)
- Factoring an Adequacy Proof (Preliminary Report) (1993) (5)
- A compositional theory for STM Haskell (2009) (5)
- Somewhere Around That Number: An Interview Study of How Spreadsheet Users Manage Uncertainty (2019) (5)
- End-User Probabilistic Programming (2019) (4)
- 23rd ACM Conference on Computer and Communications Security CCS 2016 (2016) (4)
- Constraint-Based Autonomic Reconfiguration (2013) (4)
- GridBook: Natural Language Formulas for the Spreadsheet Grid (2022) (4)
- On Robust Malware Classifiers by Verifying Unwanted Behaviours (2016) (4)
- Spreadsheet Use and Programming Experience: An Exploratory Survey (2020) (4)
- Essays on Algebraic Process Calculi (2005) (4)
- Spreadsheet Comprehension: Guesswork, Giving Up and Going Back to the Author (2020) (4)
- Types and Effects for (2003) (3)
- End-user encounters with lambda abstraction in spreadsheets: Apollo’s bow or Achilles’ heel? (2022) (3)
- SlicStan : Improving Probabilistic Programming using Information Flow Analysis Extended Abstract (2017) (3)
- Roles, stacks, histories: A triple for Hoare (2011) (3)
- Where-Provenance for Bidirectional Editing in Spreadsheets (2021) (2)
- The Wreath Process: A totally generative model of geometric shape based on nested symmetries (2015) (2)
- A Type and Effect Analysis of Security Protocols (2001) (2)
- Wiki2row – the In’s and Out’s or row suggestion with a Large Scale Knowledge Base (2020) (2)
- Programming Languages and Systems, 19th European Symposium on Programming, ESOP 2010, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2010, Paphos, Cyprus, March 20-28, 2010. Proceedings (2010) (2)
- Challenges and Trends in Probabilistic Programming (Dagstuhl Seminar 15181) (2015) (1)
- XML Web Services: The Global Computer? (2002) (1)
- Technical annex to [5] (1998) (1)
- Preface for the Special Issue: Foundations of Software Science and Computation Structures (2005) (1)
- “What It Wants Me To Say”: Bridging the Abstraction Gap Between End-User Programmers and Code-Generating Large Language Models (2023) (1)
- Getting Operations Logic Right: Types, Service-Orientation, and Static Analysis (2016) (1)
- Security Protocols (1999) (1)
- Special issue - Algebraic process calculi: The first twenty five years and beyond - Guest editors' foreword (2007) (1)
- Foundations of Software Science and Computation Structures: 6th International Conference, FOSSACS 2003 Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2003 Warsaw, Poland, April 7–11, 2003 Proceedings (2003) (1)
- Verifying Authentication Properties of C Security Protocol Code Using General Verifiers-Extended Abstract François Dupressoir (2010) (1)
- The 4th ACM Workshop onProceedings of the 4th ACM Workshop on Formal Methods in Security Engineering (2006) (0)
- Authenticity Types for Cryptographic Protocols (2002) (0)
- Fourth International Seminar on Program Verification, Automated Debugging and Symbolic Computation (2015) (0)
- Young tableaux and longest monotone subsequences: An inequality and a conjecture (1984) (0)
- 124 15181 – Challenges and Trends in Probabilistic Programming and (2015) (0)
- Verifying Anti-Security Policies Learnt from Android Malware Families (2015) (0)
- Preface (1989) (0)
- Types for cyphers: thwarting mischief and malice with type theory (2001) (0)
- Probabilistic Type Inference by Optimizing Logical and Natural Constraints (2021) (0)
- Edinburgh Research Explorer End-User Probabilistic Programming (2019) (0)
- Factoring an Adequacy Proof ( Preliminary Version ) (1993) (0)
- Tabular: Probabilistic Inference from the Spreadsheet (2020) (0)
- Session details: Session 9 (2007) (0)
- Preface: Volume 26 (1999) (0)
- Learning and Verifying Unwanted Behaviours (2016) (0)
- Secrecy, Group Creation (2001) (0)
- Name Groups and Group Creation: Semantics and Applications (2000) (0)
- Proceedings of the workshop on "The Rise and Rise of the Declarative Datacentre" (2008) (0)
- Explaining Unwanted Behaviours in Context (2016) (0)
- A Typed Calculus of Mobile Computation (1999) (0)
- HOOTS II Second Workshop on Higher-Order Operational Techniques in Semantics. Volume 10 (1997) (0)
- Types for Cryptographic Protocols (2002) (0)
- Probabilistic Inference Using Program Analysis (2013) (0)
- Compact Explanations of Why Malware is Bad (2015) (0)
- Mobile Ambients {annex{ 1 Review of the Ambient Calculus (1997) (0)
- Explorer Practical probabilistic programming with monads (2017) (0)
- Proceedings of the 2012 LISA Conference (2012) (0)
- Proceedings of the 19th European conference on Programming Languages and Systems (2010) (0)
- Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016) (2016) (0)
- Edinburgh Research Explorer Type Inference for Correspondence Types (2018) (0)
- Preface (1999) (0)
- Modal Logics for Mobile Ambients ( Extended Abstract ) (0)
- Contents and abstracts of the Electronic Notes in Theoretical Computer Science vol. 10: preface volume 10 (1999) (0)
- Robin Milner 1934--2010: verification, languages, and concurrency (2011) (0)
- From $\mu$ crl to mcrl2 (2005) (0)
- Explorer Learning and Verifying Unwanted Behaviours (2016) (0)
- 4th Workshop on Hot Issues in Security Principles and Trust (HotSpot 2016) (2016) (0)
- Region Analysis and a (cid:25) -Calculus with Groups (2019) (0)
- Guest Editors' Foreword (2007) (0)
- Proceedings of the 6th International conference on Foundations of Software Science and Computation Structures and joint European conference on Theory and practice of software (2003) (0)
- Types for M obile Ambients Luca Cardelli (2003) (0)
- Proceedings of the 2006 ACM workshop on Formal methods in security engineering, FMSE 2006, Alexandria, VA, USA, November 3, 2006 (2006) (0)
- From Typed Process Calculi to Source-Based Security (2005) (0)
- Mobile Ambients.fm (2003) (0)
- End-User Probabilistic Programming ( DRAFT ) (2019) (0)
- Preface (2005) (0)
This paper list is powered by the following services:
Other Resources About Andrew D. Gordon
What Schools Are Affiliated With Andrew D. Gordon?
Andrew D. Gordon is affiliated with the following schools: