Benjamin C. Pierce
#9,030
Most Influential Person Now
American professor of computer science
Benjamin C. Pierce's AcademicInfluence.com Rankings
Benjamin C. Piercecomputer-science Degrees
Computer Science
#446
World Rank
#464
Historical Rank
#252
USA Rank
Database
#1749
World Rank
#1834
Historical Rank
#443
USA Rank
Download Badge
Computer Science
Benjamin C. Pierce's Degrees
- PhD Computer Science Carnegie Mellon University
- Bachelors Mathematics Rice University
Similar Degrees You Can Earn
Why Is Benjamin C. Pierce Influential?
(Suggest an Edit or Addition)According to Wikipedia, Benjamin Crawford Pierce is the Henry Salvatori Professor of computer science at the University of Pennsylvania. Pierce joined Penn in 1998 from Indiana University and held research positions at the University of Cambridge and the University of Edinburgh. He received his Ph.D. from Carnegie Mellon University in 1991. His research includes work on programming languagess, static type systems, distributed programming, mobile agents, process calculi, and differential privacy.
Benjamin C. Pierce's Published Works
Published Works
- Types and programming languages (2002) (2554)
- Featherweight Java: a minimal core calculus for Java and GJ (2001) (1105)
- Algorithmic Learning in a Random World (2006) (906)
- Typing and subtyping for mobile processes (1993) (543)
- Combinators for bidirectional tree transformations: A linguistic approach to the view-update problem (2007) (508)
- Basic category theory for computer scientists (1991) (448)
- Pict: a programming language based on the Pi-Calculus (2000) (427)
- Local type inference (1998) (375)
- XDuce: A statically typed XML processing language (2003) (364)
- Mechanized Metatheory for the Masses: The PoplMark Challenge (2005) (347)
- Dynamic typing in a statically-typed language (1989) (343)
- Linearity and the pi-calculus (1999) (330)
- Advanced Topics In Types And Programming Languages (2004) (326)
- Featherweight Java: a minimal core calculus for Java and GJ (1999) (308)
- Comparing Object Encodings (1997) (274)
- Theoretical Aspects of Computer Software (2001) (272)
- XDuce: A Typed XML Processing Language (Preliminary Report) (2000) (265)
- Regular expression types for XML (2000) (254)
- On Binary Methods (1995) (250)
- Engineering formal metatheory (2008) (244)
- Simple type-theoretic foundations for object-oriented programming (1994) (244)
- Differential Privacy: An Economic Method for Choosing Epsilon (2014) (243)
- Relational lenses: a language for updatable views (2006) (242)
- Distance makes the types grow stronger: a calculus for differential privacy (2010) (242)
- Regular expression pattern matching for XML (2003) (212)
- Boomerang: resourceful lenses for string data (2008) (205)
- Decoding Choice Encodings (1996) (197)
- Differential Privacy Under Fire (2011) (184)
- Bounded quantification is undecidable (1992) (179)
- Linear dependent types for differential privacy (2013) (178)
- Combinators for bi-directional tree transformations: a linguistic approach to the view update problem (2005) (178)
- Programming with intersection types and bounded polymorphism (1992) (150)
- Dynamic typing in polymorphic languages (1995) (150)
- Concurrent Objects in a Process Calculus (1994) (149)
- Symmetric lenses (2011) (145)
- What is a file synchronizer? (1998) (135)
- A bisimulation for dynamic sealing (2004) (121)
- Behavioral equivalence in the polymorphic pi-calculus (2000) (120)
- A record calculus based on symmetric concatenation (1991) (119)
- Software Security — Theories and Systems (2003) (107)
- Programming with intersection types, union types, and polymorphism (1991) (107)
- Dynamic typing in a statically typed language (1991) (104)
- Local type inference (2000) (104)
- Location-Independent Communication for Mobile Agents: A Two-Level Architecture (1998) (101)
- Reactive noninterference (2009) (98)
- Recursive subtyping revealed (2002) (96)
- Contracts made manifest (2010) (95)
- Architectural Support for Software-Defined Metadata Processing (2015) (94)
- Quotient lenses (2008) (92)
- Regular Object Types (2003) (88)
- XQuery 1.0 and XPath 2.0 Full-Text (2009) (87)
- Higher-Order Subtyping (1994) (85)
- A verified information-flow architecture (2014) (84)
- Matching lenses: alignment and view update (2010) (84)
- Regular expression types for XML (2000) (81)
- Foundations for Virtual Types (1999) (78)
- What's in Unison? A Formal Specification and Reference Implementation of a File Synchronizer (2004) (78)
- A bisimulation for type abstraction and recursion (2005) (77)
- Object-oriented programming without recursive types (1993) (77)
- On Inner Classes (2000) (77)
- Edit lenses (2012) (72)
- Interaction trees: representing recursive and impure programs in Coq (2019) (72)
- Logical relations for encryption (2001) (71)
- A unifying type-theoretic framework for objects (1994) (71)
- All Your IFCException Are Belong to Us (2013) (68)
- On Decidability of Nominal Subtyping with Variance (2006) (68)
- Linearity and the pi-calculus (1996) (67)
- Foundational Property-Based Testing (2015) (66)
- Exploiting schemas in data synchronization (2005) (64)
- Featherweight Firefox: Formalizing the Core of a Web Browser (2010) (64)
- Intersection types and bounded polymorphism (1993) (62)
- Micro-Policies: Formally Verified, Tag-Based Security Monitors (2015) (61)
- Programming in higher-order typed lambda-calculi (1989) (54)
- Testing noninterference, quickly (2013) (54)
- Higher-order intersection types and multiple inheritance (1996) (53)
- Positive subtyping (1995) (53)
- Bidirectional programming languages (2009) (49)
- Foundational Calculi for Programming Languages (1997) (46)
- QuickChick: Property-based testing for Coq (2014) (43)
- From C to interaction trees: specifying, verifying, and testing a networked server (2018) (43)
- TinkerType: a language for playing with formal systems (2003) (42)
- PUMP: a programmable unit for metadata processing (2014) (42)
- Beyond Good and Evil: Formalizing the Security Guarantees of Compartmentalizing Compilation (2016) (41)
- Explicit Secrecy: A Policy for Taint Tracking (2016) (41)
- Updatable Security Views (2009) (41)
- Beginner's luck: a language for property-based generators (2016) (40)
- Decidable bounded quantification (1994) (39)
- Programming language techniques for differential privacy (2016) (38)
- Position paper: the science of deep specification (2017) (38)
- Differential privacy for collaborative security (2010) (37)
- Bounded Existentials and Minimal Typing (1998) (36)
- Relating Cryptography and Polymorphism (2000) (36)
- A framework for adaptive differential privacy (2017) (36)
- Union Types for Semistructured Data (1999) (36)
- Generating good generators for inductive relations (2017) (36)
- Location independence for mobile agents (1998) (35)
- Statically typed friendly functions via partially abstract types (1993) (34)
- A bisimulation for type abstraction and recursion (2007) (33)
- Polymorphic Contracts (2011) (32)
- A Theory of Information-Flow Labels (2013) (32)
- A Formal Investigation of (2007) (32)
- The XTATIC Experience (2004) (31)
- A Language for Bi-Directional Tree Transformations (2004) (31)
- XML Goes Native: Run-Time Representations for Xtatic (2005) (29)
- When Good Components Go Bad: Formally Secure Compilation Despite Dynamic Compromise (2018) (29)
- Coverage guided, property based testing (2019) (28)
- Report on the NSF Workshop on Formal Methods for Security (2016) (28)
- A taste of category theory for computer scientists (1988) (27)
- Preliminary design of the SAFE platform (2011) (26)
- Mysteries of DropBox: Property-Based Testing of a Distributed Synchronization Service (2016) (26)
- A Typed Higher-Order Programming Language Based on the Pi-Calculus (1993) (26)
- Synthesizing bijective lenses (2017) (25)
- Extensible records without subsumption (1990) (25)
- Faithful ideal models for recursive polymorphic types (1989) (24)
- How Good Is Local Type Inference (1999) (24)
- Type-Based Optimization for Regular Patterns (2005) (23)
- Lambda, the ultimate TA: using a proof assistant to teach programming language foundations (2009) (22)
- Fuzzi: a three-level logic for differential privacy (2019) (21)
- Design considerations for ML-style module systems (2005) (21)
- Hardware Support for Safety Interlocks and Introspection (2012) (20)
- Recursive subtyping revealed: (functional pearl) (2000) (20)
- Orchard: Differentially Private Analytics at Scale (2020) (19)
- A Logic Your Typechecker Can Count On: Unordered Tree Types in Practice (2007) (19)
- A decision procedure for the subtype relation on intersection types with bounded variables (1989) (18)
- SAFE: A clean-slate architecture for secure systems (2013) (18)
- Sensitivity analysis using type-based constraints (2013) (18)
- The Meaning of Memory Safety (2017) (18)
- Behavioral equivalence in the polymorphic pi-calculus (1997) (18)
- A Recipe for Raw Types (2001) (17)
- Towards a Fully Abstract Compiler Using Micro-Policies: Secure Compilation for Mutually Distrustful Components (2015) (17)
- Statically Typed Document Transformation: An Xtatic Experience (2006) (16)
- Xduce: an xml processing language (1999) (16)
- Distributed Query Optimization : Can Mobile Agents Help ? (2000) (13)
- Bringing Harmony to Optimism: An Experiment in Synchronizing Heterogeneous Tree-Structured Data (2004) (13)
- Corrigendum: decidable bounded quantification (1995) (13)
- Synthesizing symmetric lenses (2018) (12)
- Manifest contracts (2013) (12)
- Types and programming languages: the next generation (2003) (12)
- Testing differential privacy with dual interpreters (2020) (12)
- Paths Into Patterns (2004) (12)
- Schema-Directed Data Synchronization (2005) (11)
- Agreeing to Agree: Conflict Resolution for Optimistically Replicated Data (2006) (11)
- The Weird World of Bi-directional Programming (2006) (10)
- AF ormal Investigation ofDiff3 (2007) (10)
- Local Type Argument Synthesis with Bounded Quantification (1997) (10)
- Programming in the Pi-Calculus: A Tutorial Introduction to Pict (1997) (9)
- Proceedings of the 36th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2009, Savannah, GA, USA, January 21-23, 2009 (2009) (9)
- Interaction Trees (2019) (9)
- Verifying an HTTP Key-Value Server with Interaction Trees and VST (2021) (9)
- Unison: A File Synchronizer and Its Specification (2001) (9)
- C4: verified transactional objects (2022) (8)
- A Formal Investigation of Diff 3 (2007) (8)
- Types and programming languages / Benjamin C. Pierce (2002) (7)
- Synthesizing quotient lenses (2018) (7)
- It Is Time to Mechanize Programming Language Metatheory (2005) (7)
- The science of deep specification (keynote) (2016) (7)
- Proceedings of the 36th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages (2009) (7)
- Higher-Order Systems (2022) (6)
- Foundations of Object-Oriented Languages - Introduction (1999) (6)
- Advanced module systems: a guide for the perplexed (abstract of invited talk) (2000) (6)
- Foundations of web script security (2012) (6)
- Conferences in an era of expensive carbon (2020) (6)
- Type Destructors (2002) (5)
- Preliminary Investigation of a Calculus with Intersection and Union Types (1990) (5)
- Proceedings of the 4th International Symposium on Theoretical Aspects of Computer Software (2001) (5)
- Do Judge a Test by its Cover: Combining Combinatorial and Property-Based Testing (2020) (4)
- A Model of Delegation Based on Existential Types (1993) (4)
- Foundations for Bidirectional Programming (2009) (4)
- Model-based testing of networked applications (2021) (3)
- Chaining , Referral , Subscription , Leasing : New Mechanisms in Distributed Query Optimization (2000) (3)
- Type Operators and Kinding (2002) (3)
- Micro-Policies : A Framework for Verified , Tag-Based Security Monitors (2014) (3)
- A Coq Framework For Verified Property-Based Testing ( Extended Abstract ) (2014) (3)
- Formally Secure Compilation of Unsafe Low-Level Components (Extended Abstract) (2017) (3)
- Bounded Quanti cation with Bottom (1997) (3)
- The Spider Calculus Computing in Active Graphs (2010) (3)
- Manifest Security for Distributed Information (2006) (3)
- Type-based Sensitivity Analysis (2013) (3)
- Advanced module systems (invited talk): a guide for the perplexed (2000) (3)
- Micro-Policies A Framework for Verified, Hardware-Assisted Security Monitors (2014) (2)
- Bounded Quantiication with Bottom (1997) (2)
- Proof Assistants as Teaching Assistants: A View from the Trenches (2010) (2)
- Specifying a File Synchronizer (2002) (2)
- A Framework for Adaptive Di erential Privacy (2017) (2)
- Higher-Order Polymorphism (2002) (2)
- Run, xtatic, run: efficient implementation of an object-oriented language with regular pattern matching (2005) (2)
- Foundations of object‐oriented languages (1999) (2)
- Resourceful Lenses for Ordered Data (2007) (2)
- Beyond Full Abstraction: Formalizing the Security Guarantees of Low-Level Compartmentalization (2016) (2)
- A Language for Bi-Directional Tree Transformations ( Working Draft of Full Version ) (2003) (2)
- Making Our Own Luck A Language for Random Generators ( Extended Abstract ) (2015) (2)
- Linguistic foundations for bidirectional transformations: invited tutorial (2012) (2)
- Harmony: The Art of Reconciliation (2005) (2)
- Type Systems for Concurrent Calculi (Abstract) (1998) (2)
- Theoretical aspects of computer software : 4th International Symposium, TACS 2001, Sendai, Japan, October 29-31, 2001 : proceedings (2001) (1)
- Using a Proof Assistant to Teach Programming Language Foundations, or, Lambda, the Ultimate TA (2008) (1)
- The essence of objects (2000) (1)
- Untyped Arithmetic Expressions (2002) (1)
- Editorial - Third Workshop on Foundations of Object-Oriented Languages (1998) (1)
- Preface (2012) (1)
- Parsing Randomness: Unifying and Differentiating Parsers and Random Generators (2022) (1)
- Edit languages for information trees (2013) (1)
- On Binary Methods on Binary Methods (1995) (1)
- Do Judge a Test by its Cover (2021) (1)
- Exceptionally Available Dynamic IFC (2012) (1)
- Security Properties for Stack Safety (2021) (1)
- Corrigendum to “Higher-order subtyping” [Theoret. Comput. Sci. 176(1–2) (1997) 235–282]☆ (1997) (1)
- Logical Relations for Encryption (Extended Abstract) (2001) (1)
- Adaptive Host and Network Security AHANS (2013) (1)
- Recursive subtyping revealed: functional pearl (2000) (1)
- Dynamic Typing in Polymorphic Languages Dynamic Typing in Polymorphic Languages Digital Equipment Corporation 1994 (1994) (1)
- POPL 2005: Combinators for Bi-Directional Tree Transformations: Linguistic Approach to the View Update Problem (2015) (1)
- Type Dynamic (2010) (1)
- Luck: A Probabilistic Language for Testing (2020) (1)
- Testing Noninterference , Quickly ∗ ( short talk ) (2013) (1)
- Woggles from Oz: Writing Interactive Fiction (1994) (1)
- Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems (2002) (1)
- New Results - Mechanization of type systems and axiomatic and operational semantics (2007) (0)
- Recursive subtyping revealed (cid:227) (2002) (0)
- Formalizing Stack Safety as a Security Property (2021) (0)
- The Untyped Lambda-Calculus (2002) (0)
- Type systems (2003) (0)
- Case Study: Featherweight Java (2002) (0)
- Differential Privacy Under Fire Andreas Haeberlen (2015) (0)
- Statically typed xml processing in an object-oriented language (2006) (0)
- 2 Linear Dependent Types and Sensitivity Analysis : DFuzz (2013) (0)
- An ML Implementation of Simple Types (2002) (0)
- Beyond Good and Evil: Formalizing the Security Guarantees of Low-Level Compartmentalization (2016) (0)
- Journal of Functional Programming: Preface (2007) (0)
- Non-Structural Subtype Entailment in Automata Theory (2018) (0)
- Confluence in Lens Synthesis (2020) (0)
- Proceedings of the sixth ACM SIGPLAN international conference on Functional programming (2001) (0)
- Electronic Communications of the EASST Second International Workshop on Bidirectional Transformations ( BX 2013 ) Edit languages for information trees (2013) (0)
- An ML Implementation of System F (2002) (0)
- Information and Computation special issue from TACS 2001 (2003) (0)
- From Symbolic Server Models to Interactive Tests (2020) (0)
- An ML Implementation of Subtyping (2002) (0)
- Verification challenges of pervasive information flow (2012) (0)
- Library presented in the paper (2019) (0)
- Engaging with Climate Change : Possible Steps for SIGPLAN (0)
- Big Data – Privacy and Management (2020) (0)
- Manifest Security (2007) (0)
- Solutions to Selected Exercises (2002) (0)
- Formally Verified, Tag-Based Security Monitors (2015) (0)
- Case Study: Purely Functional Objects (2002) (0)
- Proceedings of the 10th ACM SIGPLAN International Conference on Functional Programming, ICFP 2005, Tallinn, Estonia, September 26-28, 2005 (2005) (0)
- 10 A Framework for Adaptive Di erential Privacy ( Extended Version ) (2017) (0)
- Replication Package for Artifact (2019) (0)
- Edinburgh Research Explorer Union Types for Semistructured Data (2006) (0)
- Metatheory of Subtyping (2002) (0)
- Preface (2007) (0)
- Simply Typed Lambda-Calculus (2002) (0)
- View update for textual data : A bi-directional solution (2006) (0)
- Parsing randomness (2022) (0)
- Case Study: Imperative Objects (2002) (0)
- Preface (1998) (0)
- Special Issue Dedicated to ICFP 2011 Editorial (2013) (0)
- An ML Implementation of the Lambda-Calculus (2002) (0)
- An ML Implementation of Arithmetic Expressions (2002) (0)
- ICFP 2020 Post-Conference Report (2021) (0)
- Session details: Types (2013) (0)
- Prototype Implementation of Fuzzi (2019) (0)
- High-Level Concurrent Languages (Dagstuhl Seminar 97041) (2021) (0)
- Summary of Notation (1991) (0)
- Art, science, and fear (2010) (0)
- Session details: Session 7 (2007) (0)
- Programming in the Pi-Calculus (2009) (0)
- Case Study: Imperative Objects, Redux (2002) (0)
- Processes, Types, and Observations (1997) (0)
- Symmetric Lenses (Full version) (2010) (0)
- On being a PhD student of Robert Harper (2022) (0)
- New Results - Software specification and verification (2013) (0)
- Electronic Communications of the EASST Volume 57 ( 2013 ) Proceedings of the Second International Workshop on Bidirectional Transformations ( BX 2013 ) Edit languages for information trees (2013) (0)
- CIS 400 : Senior Project Report Introducing Grammars to Boomerang (2009) (0)
- XSL Formatting Objects (2009) (0)
- Union Types for Semistructured Data MS-CIS-99-09 (2014) (0)
- Datatypes and SubtypingHaruo (2007) (0)
- Metatheory of Recursive Types (2002) (0)
- Session details: Invited talk (2009) (0)
- Proceedings of the 8th ACM SIGPLAN workshop on Types in language design and implementation (2012) (0)
- Functors, Natural Transformations, and Adjoints (1991) (0)
- Nameless Representation of Terms (2002) (0)
- Draft Exceptionally Available Dynamic IFC (2012) (0)
- Session details: Type inference (2010) (0)
- Security Criteria for a Transparent Encryption Layer (Work in Progress) (2019) (0)
- Adventures in Bidirectional Programming (2007) (0)
- Muri Progress Report Adaptive Systems Interoperability Contessa Project (2002) (0)
- Metatheory of Bounded Quantification (2002) (0)
- Woggles from Oz: Writing Interactive Fiction (review) (2017) (0)
This paper list is powered by the following services:
Other Resources About Benjamin C. Pierce
What Schools Are Affiliated With Benjamin C. Pierce?
Benjamin C. Pierce is affiliated with the following schools: