John C. Mitchell
American computer scientist
John C. Mitchell's AcademicInfluence.com Rankings
Download Badge
Criminal Justice Computer Science
John C. Mitchell's Degrees
- PhD Computer Science Stanford University
- Masters Computer Science Stanford University
- Bachelors Mathematics California Institute of Technology
Similar Degrees You Can Earn
Why Is John C. Mitchell Influential?
(Suggest an Edit or Addition)According to Wikipedia, John Clifford Mitchell is professor of computer science and electrical engineering at Stanford University. He has published in the area of programming language theory and computer security. John C. Mitchell was the Vice Provost for Teaching and Learning at Stanford University, the Mary and Gordon Crary Family Professor in Computer Science and Electrical Engineering at Stanford University, co-director of the Stanford Computer Security Lab, and Professor of Education. He is a member of the steering committee for Stanford University's Cyber Initiative. Mitchell has been Vice Provost at Stanford University since 2012, first as the inaugural Vice Provost for Online Learning and now in a broader role for Teaching and Learning. Under Mitchell's direction, the Office of the Vice Provost for Teaching and Learning is advancing teaching and learning through faculty-driven initiatives and research, transforming education in Stanford's classrooms and beyond.
John C. Mitchell's Published Works
Published Works
- Design of a role-based trust-management framework (2002) (879)
- Foundations for programming languages (1996) (686)
- Architectural support for copy and tamper resistant software (2000) (631)
- Third-Party Web Tracking: Policy and Technology (2012) (519)
- Client-Side Defense Against Web-Based Identity Theft (2004) (507)
- Automated analysis of cryptographic protocols using Mur/spl phi/ (1997) (491)
- Robust defenses for cross-site request forgery (2008) (468)
- Privacy and contextual integrity: framework and applications (2006) (459)
- Stronger Password Authentication Using Browser Extensions (2005) (445)
- Abstract types have existential type (1988) (436)
- F-bounded polymorphism for object-oriented programming (1989) (374)
- Distributed Credential Chain Discovery in Trust Management (2003) (368)
- Concepts in programming languages (2002) (346)
- State of the Art: Automated Black-Box Web Application Vulnerability Testing (2010) (344)
- Text-based CAPTCHA strengths and weaknesses (2011) (329)
- Decision problems for propositional linear logic (1990) (317)
- RT: a Role-based Trust-management framework (2003) (313)
- Type Systems for Programming Languages (1991) (301)
- DATALOG with Constraints: A Foundation for Trust Management Languages (2003) (294)
- A meta-notation for protocol analysis (1999) (280)
- Abstract types have existential types (1985) (280)
- Operations on records (1989) (274)
- How Good Are Humans at Solving CAPTCHAs? A Large Scale Evaluation (2010) (262)
- Security Analysis and Improvements for IEEE 802.11i (2005) (257)
- An Extension of System F with Subtyping (1991) (250)
- A lambda calculus of objects and method specialization (1993) (244)
- Protecting browser state from web privacy attacks (2006) (235)
- On the Sequential Nature of Unification (1984) (228)
- Protocol Composition Logic (PCL) (2007) (223)
- A probabilistic poly-time framework for protocol analysis (1998) (223)
- Towards a Formal Foundation of Web Security (2010) (221)
- Polymorphic Type Inference and Containment (1988) (218)
- Coercion and type inference (1984) (217)
- Finite-State Analysis of SSL 3.0 (1998) (214)
- Practical declarative network management (2009) (198)
- Multiset rewriting and the complexity of bounded security protocols (2004) (196)
- Theoretical aspects of object-oriented programming: types, semantics, and language design (1994) (194)
- Adding type parameterization to the Java language (1997) (193)
- Analysis of the 802.11i 4-way handshake (2004) (186)
- Securing frame communication in browsers (2008) (184)
- Type inference with simple subtypes (1991) (179)
- Higher-order modules and the phase distinction (1989) (178)
- An Operational Semantics for JavaScript (2008) (171)
- Beyond proof-of-compliance: security analysis in trust management (2005) (166)
- A derivation system and compositional logic for security protocols (2005) (164)
- Flexible dynamic information flow control in Haskell (2012) (161)
- A type system for object initialization in the Java bytecode language (1998) (159)
- A modular correctness proof of IEEE 802.11i and TLS (2005) (151)
- Combinatorial Algorithms (2016) (148)
- A Layered Architecture for Detecting Malicious Behaviors (2008) (147)
- Toward a typed foundation for method specialization and inheritance (1989) (145)
- On the type structure of standard ML (1993) (144)
- Hails: Protecting data privacy in untrusted web applications (2012) (143)
- The essence of ML (1988) (143)
- Characterizing Bots' Remote Control Behavior (2007) (141)
- A Compositional Logic for Proving Security Properties of Protocols (2003) (139)
- The End is Nigh: Generic Solving of Text-based CAPTCHAs (2014) (132)
- The Implication Problem for Functional and Inclusion Dependencies (1984) (132)
- Object Capabilities and Isolation of Untrusted Web Applications (2010) (127)
- Privacy and Utility in Business Processes (2007) (122)
- Automated Analysis of Security-Critical JavaScript APIs (2011) (120)
- Kripke-Style Models for Typed lambda Calculus (1991) (114)
- Finite-state analysis of two contract signing protocols (2002) (114)
- A Delegation-based Object Calculus with Subtying (1995) (110)
- Specifying and verifying hardware for tamper-resistant software (2003) (109)
- Distributed credential chain discovery in trust management: extended abstract (2001) (106)
- ML with extended pattern matching and subtypes (1988) (102)
- Probabilistic Polynomial-Time Semantics for a Protocol Security Logic (2005) (101)
- Security Modeling and Analysis (2011) (100)
- Evaluating the privacy properties of telephone metadata (2016) (99)
- F-bounded quantification for object-oriented programming (1989) (97)
- Beyond proof-of-compliance: safety and availability analysis in trust management (2003) (96)
- A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols (2005) (96)
- Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection Methods (2008) (95)
- PER models of subtyping, recursive types and higher-order polymorphism (1992) (94)
- Relating strands and multiset rewriting for security protocol analysis (2000) (94)
- Extreme Programming and Agile Processes in Software Engineering (2004) (94)
- An extension of standard ML modules with subtyping and inheritance (1991) (93)
- Theory and Applications of Models of Computation (2015) (91)
- The Failure of Noise-Based Non-continuous Audio Captchas (2011) (89)
- A Probabilistic Polynomial-time Calculus For Analysis of Cryptographic Protocols (Preliminary Report) (2001) (87)
- Financial Cryptography and Data Security: 21st International Conference, FC 2017, Sliema, Malta, April 3–7, 2017, Revised Selected Papers (2015) (87)
- The Semantics of Second-Order Lambda Calculus (1990) (87)
- A compositional logic for protocol correctness (2001) (87)
- Computationally sound compositional logic for key exchange protocols (2006) (83)
- Isolating JavaScript with Filters, Rewriting, and Wrappers (2009) (80)
- Secure protocol composition (2003) (79)
- A derivation system for security protocols and its logical formalization (2003) (77)
- Operational aspects of linear lambda calculus (1992) (77)
- Probabilistic Polynomial-Time Equivalence and Security Analysis (1999) (76)
- A type-inference approach to reduction properties and semantics of polymorphic expressions (summary) (1986) (76)
- A linguistic characterization of bounded oracle computation and probabilistic polynomial time (1998) (76)
- On Abstraction and the Expressive Power of Programming Languages (1991) (76)
- Understanding SPKI/SDSI using first-order logic (2003) (74)
- Notes on Sconing and Relators (1992) (73)
- Computer Vision – ECCV 2014 (2014) (72)
- Unification and ML-Type Reconstruction (1991) (71)
- Analysis of a Fair Exchange Protocol (2000) (70)
- A state-transition model of trust management and access control (2001) (70)
- Addressing covert termination and timing channels in concurrent information flow systems (2012) (70)
- Lower bounds on type inference with subtypes (1995) (69)
- A Formalization of HIPAA for a Medical Messaging System (2009) (68)
- A formal framework for the Java bytecode language and verifier (1999) (68)
- A Type System for the Java Bytecode Language and Verifier (2003) (68)
- A type system for object initialization in the Java bytecode language (1999) (64)
- A Learning-Based Approach to Reactive Security (2009) (61)
- Polymorphic unification and ML typing (1989) (59)
- Representation independence and data abstraction (1986) (58)
- Notes on Typed Object-Oriented Programming (1994) (58)
- Privacy-Preserving Shortest Path Computation (2016) (58)
- A Security Evaluation of DNSSEC with NSEC3 (2010) (57)
- Easy does it: more usable CAPTCHAs (2014) (56)
- Contract signing, optimism, and advantage (2003) (55)
- Conflict and combination in privacy policy languages (2004) (53)
- Disjunction Category Labels (2011) (53)
- Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols (2004) (53)
- Secrecy Analysis in Protocol Composition Logic (2006) (52)
- Second-Order Logical Relations (Extended Abstract) (1985) (52)
- A type system for prototyping languages (1994) (51)
- Algorithmic aspects of type inference with subtypes (1992) (51)
- Compositional analysis of contract signing protocols (2005) (50)
- Undecidability of bounded security protocols (1999) (50)
- Computer Analysis of Images and Patterns (1989) (50)
- Composition of Cryptographic Protocols in a Probabilistic Polynomial-Time Process Calculus (2003) (49)
- Image Analysis and Recognition (2016) (48)
- Abstraction and refinement in protocol derivation (2004) (48)
- Inference rules for functional and inclusion dependencies (1983) (47)
- On the Relationship Between Classes, Objects, and Data Abstraction (1998) (47)
- On the Equivalence of Data Representations (1991) (45)
- Analysis of Abuse-Free Contract Signing (2000) (44)
- Algorithms and Models for the Web Graph (2016) (44)
- Fast Software Encryption (2014) (42)
- On the Relationships between Notions of Simulation-Based Security (2008) (42)
- The Development of Type Systems for Object-Oriented Languages (1995) (41)
- Automated Analysis of Cryptographic Assumptions in Generic Group Models (2018) (41)
- Type Inference and Type Containment (1984) (40)
- Enterprise privacy promises and enforcement (2005) (38)
- Privacy and Cybersecurity: The Next 100 Years (2012) (38)
- Games and the Impossibility of Realizable Ideal Functionality (2006) (37)
- Flexible dynamic information flow control in the presence of exceptions* (2012) (37)
- Empty types in polymorphic lambda calculus (1987) (36)
- Information-Flow Control for Programming on Encrypted Data (2012) (35)
- Standard ML-NJ weak polymorphism and imperative constructs (1993) (34)
- Massive Open Online Courses: Current State and Perspectives (Dagstuhl Perspectives Workshop 14112) (2014) (32)
- Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols (2007) (32)
- Energy Minimization Methods in Computer Vision and Pattern Recognition (2017) (32)
- A Promising Direction for Web Tracking Countermeasures (2013) (32)
- Reinforcement Learning for the Adaptive Scheduling of Educational Activities (2020) (31)
- On Play by Means of Computing Machines (Preliminary Version).@@@A Theory of Higher Order Probabilities.@@@Knowledge and Efficient Computation.@@@Realizability Semantics for Error-Tolerant Logics (Preliminary Version). (1988) (31)
- A browser plug-in solution to the unique password problem (2005) (31)
- Type Inference with Extended Pattern Matching and Subtypes (1993) (29)
- Static Analysis (2014) (29)
- Adaptive Hypermedia and Adaptive Web-Based Systems (2004) (28)
- Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of programming languages (2002) (27)
- Latent Variable Analysis and Signal Separation (2015) (27)
- Finite-State Analysis of Security Protocols (1998) (26)
- Transaction Generators: Root Kits for Web (2007) (26)
- Augmented Reality, Virtual Reality, and Computer Graphics (2016) (25)
- Data-Oblivious Data Structures (2014) (25)
- Analysis of Security Protocols for Wireless Networks (2005) (24)
- Managing Digital Rights using Linear Logic (2006) (24)
- Data Science (2015) (24)
- Autonomous Nodes and Distributed Mechanisms (2002) (22)
- Exploring New Frontiers of Theoretical Informatics (2004) (22)
- Theoretical Aspects of Computer Software (1994) (22)
- Vulnerability Factors in New Web Applications : Audit Tools , Developer Selection & Languages (2013) (22)
- An Efficient Algorithm for Large Scale Compressive Feature Learning (2014) (22)
- Quantum Interaction (2014) (22)
- 3D Research Challenges in Cultural Heritage (2014) (22)
- Inductive Proofs of Computational Secrecy (2007) (21)
- Medical Simulation (2004) (21)
- Toward Principled Browser Security (2013) (20)
- Parametricity and Variants of Girard's J Operator (1999) (20)
- Computer Vision – ECCV 2016 (2016) (20)
- Compressive Feature Learning (2013) (20)
- Stochastic interaction and linear logic (1995) (19)
- IFC Inside: Retrofitting Languages with Dynamic Information Flow Control (2015) (19)
- Probabilistic polynomial-time process calculus and security protocol analysis (2001) (19)
- Using Strategy Objectives for Network Security Analysis (2009) (19)
- Semantic Models for Second-Order Lambda Calculus (1984) (18)
- On the Relationships Between Notions of Simulation-Based Security (2005) (18)
- Computer Vision – ECCV 2016 Workshops (2016) (18)
- Strategic directions in software engineering and programming languages (1996) (17)
- Research and Advanced Technology for Digital Libraries (2004) (17)
- Computer Information Systems and Industrial Management (2016) (17)
- Unifying Equivalence-Based Definitions of Protocol Security (2004) (17)
- RTML: A Role-based Trust-management Markup Language (2002) (16)
- A Core Calculus of Classes and Objects (1999) (16)
- Securing Java RMI-based distributed applications (2004) (15)
- Information Computing and Applications (2012) (15)
- Analysis of EAP-GPSK Authentication Protocol (2008) (15)
- Key Exchange Protocols: Security Definition, Proof Method and Applications (2006) (15)
- SessionJuggler: secure web login from an untrusted terminal using session hijacking (2012) (15)
- High Performance Computing Systems. Performance Modeling, Benchmarking, and Simulation (2014) (14)
- A Domain-Specific Language for Computing on Encrypted Data (2011) (14)
- Multiset Rewriting and Security Protocol Analysis (2002) (14)
- Protocol Composition Logic (2011) (14)
- Reconstructing Trust Management (2004) (14)
- Computer Vision – ECCV 2016 (2016) (14)
- Understanding the Challenges with Medical Data Segmentation for Privacy (2013) (13)
- TBA : A Hybrid of Logic and Extensional Access Control Systems (2011) (13)
- Inductive trace properties for computational security (2010) (13)
- Data Mining and Big Data (2017) (13)
- Spyware Resistant Web Authentication using Virtual Machines (2006) (13)
- Polymorphism and Subtyping in Interfaces (1994) (13)
- Declarative privacy policy: finite models and attribute-based encryption (2012) (12)
- Central European Functional Programming School (2013) (12)
- Operational and axiomatic semantics of PCF (1990) (11)
- A Domain-Specific Language for Computing on Encrypted Data (Invited Talk) (2011) (11)
- Data Oblivious Genome Variants Search on Intel SGX (2018) (11)
- Reversible Computation (2016) (11)
- Lambda calculus models of typed programming languages (1984) (11)
- Foundations of Security Analysis and Design VIII (2015) (10)
- Termination Assertions for Recursive Programs: Completeness and Axiomatic Definability (1983) (10)
- Resources: A Safe Language Abstraction for Money (2020) (10)
- Programming language methods in computer security (2001) (10)
- Advances in Neural Networks - ISNN 2017 (2017) (10)
- Image and Graphics (2015) (10)
- Massively Open Online Courses, Current State and Perspectives (Dagstuhl Perspectives Workshop 14112) (2014) (10)
- Security by typing (2003) (10)
- Exploring new frontiers of theoretical informatics : IFIP 18th World Computer Congress, TC1 3rd International Conference on Theoretical Computer Science (TCS2004), 22-27 August 2004, Toulouse, France (2004) (9)
- Computational Science - ICCS 2004 (2004) (9)
- Characterizing the Remote Control Behavior of Bots (2007) (9)
- Modelling and Simulation for Autonomous Systems (2015) (9)
- Advances in Software Engineering Techniques (2009) (9)
- Classes = Objects + Data Abstraction (1996) (9)
- Computer Vision – ECCV 2016 Workshops (2016) (9)
- Symbiotic Interaction (2014) (8)
- Concepts in Programming Languages: Modularity, Abstraction, and Object-Oriented Programming (2002) (8)
- Privacy Challenges in Patient-centric Health Information Systems (2010) (8)
- Post-Quantum Cryptography (2017) (8)
- Webseclab Security Education Workbench (2010) (8)
- Linear Logic Proof Games and Optimization (1996) (8)
- Generative Grading: Neural Approximate Parsing for Automated Student Feedback (2019) (7)
- Generative Grading: Near Human-level Accuracy for Automated Feedback on Richly Structured Problems (2021) (7)
- Haptic and Audio Interaction Design (2012) (7)
- Compiler Construction (2014) (7)
- Machine Learning in Medical Imaging (2017) (7)
- MOOCs on and off the Farm: MOOCs and technology to advance learning and learning research (Ubiquity symposium) (2014) (7)
- TrackBack spam: abuse and prevention (2009) (7)
- Formal Methods for Open Object-Based Distributed Systems (2006) (6)
- Operations on Records (Summary) (1989) (6)
- Logic, Language, Information, and Computation (2015) (6)
- Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III (2017) (6)
- Image and Video Technology (2017) (6)
- Axiomatic definability and completeness for recursive programs (1982) (6)
- Security analysis of network protocols: logical and computational methods (2005) (6)
- A Distributed High Assurance Reference Monitor (2004) (6)
- Realisability Semantics for Error-Tolerant Logics (1986) (6)
- Neural Information Processing (2015) (6)
- Computer Vision Systems (2017) (5)
- Advanced Information Systems Engineering (2013) (5)
- Models of Strategic Reasoning (2015) (5)
- Hardware Support for Tamper-Resistant and Copy-Resistant Software (2000) (5)
- The Complexity of Local Proof Search in Linear Logic (1996) (5)
- Coalgebraic Methods in Computer Science (2016) (5)
- Wired/Wireless Internet Communications (2014) (5)
- Inductive Proof Method for Computational Secrecy (2007) (5)
- Component Deployment (2004) (5)
- Effective models of polymorphism, subtyping and recursion (1995) (5)
- Computer Vision – ACCV 2014: 12th Asian Conference on Computer Vision, Singapore, Singapore, November 1-5, 2014, Revised Selected Papers, Part I (2015) (4)
- Computers Helping People with Special Needs (2016) (4)
- Big Data Analytics and Knowledge Discovery (2017) (4)
- User Modeling, Adaptation and Personalization (2015) (4)
- Labeling techniques and typed fixed-point operators (1999) (4)
- Oblivious Program Execution and Path-Sensitive Non-interference (2013) (4)
- Swarm Intelligence Based Optimization (2016) (4)
- Optimization Complexity of Linear Logic Proof Games (1999) (4)
- Computer Science – Theory and Applications (2016) (4)
- The Impossibility of Realizable Ideal Functionality (2005) (4)
- OARS: exploring instructor analytics for online learning (2018) (4)
- Advances in Cryptology – EUROCRYPT 2016 (2016) (4)
- Serious Games Development and Applications (2013) (4)
- Computer Vision -- ACCV 2014 (2014) (4)
- Internet Science (2017) (4)
- Using NLP to Quantify Program Decomposition in CS1 (2022) (4)
- Conflict and Combination in Privacy Policy Languages (Summary) (2004) (4)
- Connecting Formal Semantics to Constructive Intuitions (1992) (4)
- Product-Focused Software Process Improvement (2014) (4)
- Polymorphism and subtyping in interface (1994) (4)
- Concepts in Programming Languages: Concepts in Object-Oriented Languages (2002) (4)
- Information Security and Cryptology (2014) (3)
- Theory and Applications of Models of Computation (2017) (3)
- Effective Models of Polymorphism, Subtyping and Recursion (Extended Abstract) (1996) (3)
- Reclaiming the Blogosphere, TalkBack: A Secure LinkBack Protocol for Weblogs (2011) (3)
- The analysis of programming structure (1997) (3)
- Relating cryptography and formal methods: a panel (2003) (3)
- Algorithm Engineering (2016) (3)
- Assessing Function Names and Quantifying the Relationship Between Identifiers and Their Functionality to Improve Them (2021) (3)
- Confidentiality-Preserving Query Execution of Fragmented Outsourced Data (2018) (3)
- Application-Sensitive Access Control Evaluation : Logical Foundations ( Extended Version ) (2012) (3)
- Advances in Visual Computing (2015) (3)
- Advances in Type Systems for Computing. (1996) (3)
- Teaching Online in 2020: Experiments, Empathy, Discovery (2020) (3)
- Combinatorial Image Analysis (2015) (3)
- Service-Oriented Computing (2014) (3)
- Ad-hoc, Mobile, and Wireless Networks (2015) (3)
- Pattern Recognition (2014) (3)
- Articulated Motion and Deformable Objects (2016) (3)
- Privacy for targeted advertising (2017) (3)
- Augmented Reality, Virtual Reality, and Computer Graphics (2017) (3)
- A revisited comparison between strand spaces and multiset rewriting for security protocol analysis. (2004) (2)
- Reasoning about Conditional Probability and Concrete Security in Protocol Proofs ( Work in Progress ) (2008) (2)
- ML and beyond (1997) (2)
- Data Representation and Compression Using Linear-Programming Approximations (2015) (2)
- Realizability semantics for error-tolerant logics: preliminary version (1986) (2)
- Semantic Security Invariance under Variant Computational Assumptions (2018) (2)
- Perspectives of System Informatics (2017) (2)
- Software Engineering and Formal Methods (2015) (2)
- Computer Vision - ACCV 2014 Workshops (2014) (2)
- A New Access Control Scheme for Protecting Distributed Cloud Services and Resources (2016) (2)
- Formal Methods and Software Engineering (2017) (2)
- Cryptography and Information Security in the Balkans (2015) (2)
- Image and Graphics: 8th International Conference, ICIG 2015, Tianjin, China, August 13–16, 2015, Proceedings, Part III (2015) (2)
- Swarm, Evolutionary, and Memetic Computing (2014) (2)
- Algorithmic Aspects of Cloud Computing (2017) (2)
- Intelligence and Security Informatics (2004) (2)
- Tools and Algorithms for the Construction and Analysis of Systems (2018) (2)
- Function Names: Quantifying the Relationship Between Identifiers and Their Functionality to Improve Them (2022) (2)
- Computational Forensics (2015) (2)
- Java Bytecode Modification and Applet Security (1998) (2)
- Securing Frame Communication (2009) (2)
- Theory and Practice of Natural Computing (2017) (2)
- Image and Signal Processing (2016) (2)
- Computers Helping People with Special Needs (2016) (2)
- Camera-Based Document Analysis and Recognition (2011) (2)
- OARS (2018) (2)
- Trust, Privacy and Security in Digital Business (2016) (2)
- Model Checking Bitcoin and other Proof-of-Work Consensus Protocols (2020) (1)
- Program Analysis for Web Security (2011) (1)
- A Symbolic Logic with Concrete Bounds for Cryptographic Protocols (2015) (1)
- Critical Information Infrastructures Security (2016) (1)
- BLASS. A., A game semantics for linear logic CENZER, D. and REMMEL, J., Polynomial-time Abehan groups CLOTE, P. and TAKEUTI, G., Bounded arithmetic for NC, ALogTIME, L and NL (1992) (1)
- A Symbolic Logic with Exact Bounds for Cryptographic Protocols (2011) (1)
- Authentication for Mobile IPv6 (2002) (1)
- Understanding Undergraduate Course Consideration (2019) (1)
- Security and the Average Programmer (2014) (1)
- Analysis of Security Protocols e (1999) (1)
- An Automated Approach for Proving PCL Invariants (2009) (1)
- Theoretical Aspects of Computing – ICTAC 2018 (2018) (1)
- Towards User Centric Data Governance and Control in the Cloud (2018) (1)
- Combinatorial Optimization and Applications (2017) (1)
- Graphics Recognition. Current Trends and Challenges (2013) (1)
- Formal Grammar (2013) (1)
- Evolving Computability (2015) (1)
- Flexible Dynamic Information Flow Control in Haskell Extended Version (2011) (1)
- Computer Performance Engineering (2016) (1)
- Transactions on Computational Collective Intelligence XX (2015) (1)
- Computationally Sound Compositional Logic for Security Protocols (2006) (1)
- Current Trends in Web Engineering (2017) (1)
- Homogeneity as an Advantage: It Takes a Community to Protect an Application (2010) (1)
- Proceedings of the 2005 ACM workshop on Formal methods in security engineering, FMSE 2005, Fairfax, VA, USA, November 11, 2005 (2005) (1)
- Distributed Computing (2013) (1)
- Concepts in Programming Languages: Concurrent and Distributed Programming (2002) (1)
- Job Scheduling Strategies for Parallel Processing (2015) (1)
- Research in Attacks, Intrusions, and Defenses (2016) (1)
- Web-Age Information Management (2015) (1)
- Connectomics in NeuroImaging (2017) (1)
- Security Standardisation Research (2016) (1)
- Financial Cryptography and Data Security (2007) (1)
- Simplifying Automated Assessment in CS1 (2021) (1)
- Image Analysis and Processing - ICIAP 2017 (2017) (1)
- Foundations of object-oriented programming (abstract) (1992) (1)
- Combinatorial Algorithms (2014) (1)
- Logic, Language, Information, and Computation (2017) (1)
- Intelligent Computing Theories and Application (2016) (1)
- Integration of AI and OR Techniques in Constraint Programming - 14th International Conference, CPAIOR 2017, Padua, Italy, June 5-8, 2017, Proceedings (2017) (1)
- Computational Logistics (2017) (1)
- Job Scheduling Strategies for Parallel Processing (2014) (1)
- Deconstructing Trust Management (2002) (1)
- Neural Information Processing (2015) (1)
- On Play by Means of Computing Machines .A Theory of Higher Order Probabilities.Knowledge and Efficient Computation.Realizability Semantics for Error-Tolerant Logics (1988) (1)
- High Performance Computing (2015) (1)
- ML and beyond (1996) (1)
- Advances in Swarm Intelligence (2016) (1)
- Cooperative Design, Visualization, and Engineering (2014) (1)
- Software Engineering Research and Applications (2003) (1)
- Fundamental Approaches to Software Engineering (2012) (1)
- Algorithms for Sensor Systems (2017) (1)
- Computational Science - ICCS 2004 (2004) (1)
- Engineering Secure Software and Systems (2017) (1)
- Foundations and Practice of Security (2014) (0)
- Theoretical Basis of Object-Oriented Methods (1992) (0)
- security 2011 ( CSS ’ 2011 ) Text-based CAPTCHA Strengths and Weaknesses (2011) (0)
- 2001 annual meeting of the association for symbolic logic (2001) (0)
- IFC Inside : A General Approach to Retrofitting Languages with Dynamic Information Flow Control (2014) (0)
- Concepts in Programming Languages: History of Objects: Simula and Smalltalk (2002) (0)
- Distributed Computing (2012) (0)
- Networked Systems (2015) (0)
- Authenticated Address Notification for Mobile Communication (2001) (0)
- Reversible Computation (2015) (0)
- Concepts in Programming Languages: Preface (2002) (0)
- FMSE '05 : proceedings of the 2005 ACM workshop on formal methods in security engineering : November 11, 2005, Fairfax, Virginia, USA : co-located with CCS 2005 (2005) (0)
- Ambient Intelligence (2004) (0)
- Predicting Size of Forest Fire Using Hybrid Model (2018) (0)
- Computer Performance Engineering (2015) (0)
- Feedback on Program Development Process for CS1 Students (2022) (0)
- Graph Drawing (2014) (0)
- Green, Pervasive, and Cloud Computing (2017) (0)
- Static Analysis (2012) (0)
- Machines, Computations, and Universality (2015) (0)
- Human Centered Computing (2016) (0)
- Theoretical Aspects of Computer Software : International Symposium TACS '94 Sendai, Japan, April 19-22, 1994 Proceedings (1994) (0)
- Algorithmic aspects of type inference with subtypesPatrick Lincoln (2009) (0)
- Proceedings of the Second international conference on Principles of Security and Trust (2013) (0)
- Graph-Theoretic Concepts in Computer Science (2013) (0)
- Computer Security Foundations Workshop - CSFW 2006 (2006) (0)
- A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet (2018) (0)
- Concepts in Programming Languages: The Algol Family and ML (2002) (0)
- Concepts in Programming Languages: Scope, Functions, and Storage Management (2002) (0)
- NASA Formal Methods (2018) (0)
- Concepts in Programming Languages: Introduction (2002) (0)
- LATIN 2018: Theoretical Informatics (2018) (0)
- Frontiers in Algorithmics (2015) (0)
- Proceedings 13 Volume Editors (2013) (0)
- Computer Vision - ACCV 2014 Workshops (2014) (0)
- Concepts in Programming Languages: Additional Program Examples (2002) (0)
- Graph-Theoretic Concepts in Computer Science (2017) (0)
- Computer Vision and Graphics (2016) (0)
- Combining cryptography and game theory in distributed algorithms (2004) (0)
- Principles of Security and Trust (2013) (0)
- Proceedings of the International Conference on Theoretical Aspects of Computer Software (1994) (0)
- Concepts in Programming Languages: Objects and Run-Time Efficiency: C++ (2002) (0)
- Visual Indication while Sharing Items from a Private 3D Portal Room UI to Public Virtual Environments (2018) (0)
- Intersections in Simulation and Gaming (2016) (0)
- Software Technologies: Applications and Foundations (2017) (0)
- Decision Problems for Propositional Linear (2009) (0)
- Detecting the Reasons for Program Decomposition in CS1 and Evaluating Their Impact (2023) (0)
- Concepts in Programming Languages: Data Abstraction and Modularity (2002) (0)
- Concepts in Programming Languages: Fundamentals (2002) (0)
- Bounded Model Checking for the Existential Part of Real-Time CTL and Knowledge (2018) (0)
- Types, theory of (2003) (0)
- 09073 Abstracts Collection - Model-Based Design of Trustworthy Health Information Systems (2009) (0)
- Concepts in Programming Languages: Glossary (2002) (0)
- Semantic Versioning of In-Process Scientific Document (2019) (0)
- Formal Aspects of Component Software (2011) (0)
- An Algorithm to Analyze Non-injective S-Boxes (2019) (0)
- Logic, Language, Information and Computation (2012) (0)
- Public-Key Cryptography - PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II (2017) (0)
- Big Data Computing and Communications (2016) (0)
- Provable Security (2016) (0)
- Collaboration and Technology (2016) (0)
- Trusted Systems (2015) (0)
- Nordström Bengt, Petersson Kent, and Smith Jan M.. Programming in Martin-Löf's type theory. An introduction. The international series of monographs on computer science, no. 7. Clarendon Press, Oxford University Press, Oxford and New York 1990, x + 221 pp. (1992) (0)
- Mobile Web and Intelligent Information Systems (2017) (0)
- Logic, Language, Information, and Computation (2013) (0)
- Hardware and Software: Verification and Testing (2017) (0)
- Concepts in Programming Languages: Computability (2002) (0)
- Notes in Computer Science 5646 (2009) (0)
- Experimental Algorithms (2016) (0)
- Programming Languages (2016) (0)
- Model and Data Engineering (2015) (0)
- SECURE COMPUTATION IN A PROBABILISTIC POLYNOMIAL-TIME PROCESS CALCULUS (2001) (0)
- Wired/Wireless Internet Communications (2017) (0)
- Cooperative Networked Control of Dynamical Peer-to-Peer Vehicle Systems (2007) (0)
- Big Data Analytics and Knowledge Discovery (2016) (0)
- Computing and Combinatorics (2017) (0)
- Pattern Recognition and Image Analysis (2015) (0)
- Intelligent Computing Theories and Application (2017) (0)
- Editorial Board (2009) (0)
- Economics of Grids, Clouds, Systems, and Services (2011) (0)
- Computational Linguistics and Intelligent Text Processing (2016) (0)
- Steganalysis to Data Hiding of VQ Watermarking Upon Grouping Strategy (2018) (0)
- Formal Grammar (2017) (0)
- Concepts in Programming Languages: Lisp: Functions, Recursion, and Lists (2002) (0)
- Concepts in Programming Languages: Portability and Safety: Java (2002) (0)
- Mining Attribute-Based Access Control Policies from Logs (2018) (0)
- Information Security and Cryptology (2017) (0)
- Insights for post-pandemic pedagogy across one CS department (2022) (0)
- Concepts in Programming Languages: Type Systems and Type Inference (2002) (0)
- Social Informatics (2017) (0)
- A distributed high assurance reference monitor: Extended abstract (2004) (0)
- Internet and Distributed Computing Systems (2015) (0)
- Integrated Formal Methods (2018) (0)
- Notes in Computer Science 4867 (2008) (0)
- On (1w Sequential Nature of Unification (0)
- Database Systems for Advanced Applications (2015) (0)
- Editorial Board (2004) (0)
- Fast Algorithms for Learning with Long N-grams via Suffix Tree Based Matrix Multiplication (2015) (0)
- Privacy in Statistical Databases (2016) (0)
- Algorithms and Data Structures (2017) (0)
- Algebraic Informatics (2015) (0)
- Did We Miss Something? Correspondence Analysis of Usability Data (2018) (0)
- Cooperative Design, Visualization, and Engineering (2004) (0)
- Model and Data Engineering (2016) (0)
- Analysing Object-Capability Patterns With Mur' (2011) (0)
- How to Train Your Learners: Reinforcement Learning for the Scheduling of Online Learning Activities (2020) (0)
- Concepts in Programming Languages: Control in Sequential Languages (2002) (0)
This paper list is powered by the following services:
Other Resources About John C. Mitchell
What Schools Are Affiliated With John C. Mitchell?
John C. Mitchell is affiliated with the following schools: