Patrick Denis Lincoln
#160,847
Most Influential Person Now
Patrick Denis Lincoln's AcademicInfluence.com Rankings
Patrick Denis Lincolncomputer-science Degrees
Computer Science
#9230
World Rank
#9696
Historical Rank
Theoretical Computer Science
#108
World Rank
#108
Historical Rank

Patrick Denis Lincolnmathematics Degrees
Mathematics
#7349
World Rank
#10004
Historical Rank
Measure Theory
#2081
World Rank
#2520
Historical Rank

Download Badge
Computer Science Mathematics
Why Is Patrick Denis Lincoln Influential?
(Suggest an Edit or Addition)Patrick Denis Lincoln's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Linear logic (1992) (3237)
- All About Maude - A High-Performance Logical Framework, How to Specify, Program and Verify Systems in Rewriting Logic (2007) (1002)
- Maude: specification and programming in rewriting logic (2002) (894)
- Architectural support for copy and tamper resistant software (2000) (631)
- The Maude 2.0 System (2003) (323)
- Decision problems for propositional linear logic (1990) (317)
- Principles of Maude (1996) (299)
- A meta-notation for protocol analysis (1999) (280)
- Efficient implementation of lattice operations (1989) (252)
- A probabilistic poly-time framework for protocol analysis (1998) (223)
- Multiset rewriting and the complexity of bounded security protocols (2004) (196)
- Stochastic assembly of sublithographic nanoscale interfaces (2003) (180)
- Pathway Logic: Symbolic Analysis of Biological Signaling (2001) (176)
- The Maude System (1999) (131)
- Privacy-Preserving Sharing and Correlation of Security Alerts (2004) (115)
- Pathway Logic: Executable Models of Biological Networks (2004) (106)
- Symbolic Systems Biology: Hybrid Modeling and Analysis of Biological Networks (2004) (106)
- Nonphotolithographic nanoscale memory density prospects (2005) (104)
- Epidemic profiles and defense of scale-free networks (2003) (103)
- Relating strands and multiset rewriting for security protocol analysis (2000) (94)
- Le Fun: Logic, Equations and Functions (1987) (90)
- A Formally Verified Algorithm for Interactive Consistency Under a Hybrid Fault Model (1993) (87)
- On Shostak's Decision Procedure for Combinations of Theories (1996) (84)
- Operational aspects of linear lambda calculus (1992) (77)
- Probabilistic Polynomial-Time Equivalence and Security Analysis (1999) (76)
- Deciding provability of linear logic formulas (1995) (73)
- Pathway logic modeling of protein functional domains in signal transduction (2003) (72)
- Byzantine Agreement with Authentication : Observations andApplications in Tolerating Hybrid and Link Faults (1995) (72)
- Formally Verified On-Line Diagnosis (1997) (68)
- ARSENAL: Automatic Requirements Specification Extraction from Natural Language (2014) (68)
- Dynamic Low-Density Parity Check Codes for Fault-tolerant Nanoscale Memory (2007) (61)
- A formally verified algorithm for interactive consistency under a hybrid fault model (1993) (61)
- The Formal Verification of an Algorithm for Interactive Consistency under a Hybrid Fault Model (1993) (60)
- Constant-Only Multiplicative Linear Logic is NP-Complete (1992) (60)
- Proof search in first-order linear logic and other cut-free sequent calculi (1994) (59)
- Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks (2012) (57)
- Adventures in Associative-Commutative Unification (1989) (57)
- Principles of Mobile Maude (2000) (52)
- BioSPICE: access to the most current computational tools for biologists. (2003) (51)
- Algorithmic aspects of type inference with subtypes (1992) (51)
- Undecidability of bounded security protocols (1999) (50)
- Low-Density Parity Check Codes for Error Correction in Nanoscale Memory (2007) (49)
- Safety envelope for security (2014) (49)
- Analyzing Pathways Using SAT-Based Approaches (2007) (47)
- Formal verification of an interactive consistency algorithm for the Draper FTP architecture under a hybrid fault model (1994) (43)
- Specification, Transformation, and Programming of Concurrent Systems in Rewriting Logic (1994) (43)
- Metalevel computation in Maude (1998) (42)
- Efficient fault-tolerant certificate revocation (2000) (40)
- Towards Maude 2.0 (2000) (40)
- Low-Overhead Time-Triggered Group Membership (1997) (40)
- Linearizing intuitionistic implication (1991) (37)
- Maximizing Sharing of Protected Information (2002) (33)
- Unification and Narrowing in Maude 2.4 (2009) (33)
- First-Order Linear Logic without Modalities is NEXPTIME-Hard (1994) (32)
- A comparison between strand spaces and multiset rewriting for security protocol analysis (2005) (32)
- Maude as a metalanguage (1998) (31)
- Minimal data upgrading to prevent inference and association attacks (1999) (31)
- Automatically Extracting Requirements Specifications from Natural Language (2014) (29)
- TCP SYN Flooding Defense (1999) (27)
- NEVRLATE: Scalable Resource Discovery (2002) (24)
- Bootstrapping Communications into an Anti-Censorship System (2012) (22)
- The Pathalyzer: A Tool for Analysis of Signal Transduction Pathways (2005) (22)
- Fractionated Software for Networked Cyber-Physical Systems: Research Directions and Long-Term Vision (2011) (21)
- Computational aspects of linear logic (1992) (21)
- Compiling Rewriting onto SIMD and MIMD/SIMD Maschines (1994) (20)
- Adventures in Associative-Commutative Unification (A Summary) (1988) (19)
- Stochastic interaction and linear logic (1995) (19)
- The Rewrite Rule Machine Node Architecture and Its Performance (1994) (17)
- Decision problems for second-order linear logic (1995) (15)
- Neuroscience meets cryptography: crypto primitives secure against rubber hose attacks (2014) (14)
- Trusted Machine Learning for Probabilistic Models (2016) (12)
- Automatic Requirements Specification Extraction from Natural Language (ARSENAL) (2014) (10)
- Negotiated privacy (2002) (10)
- Early indicators of exposure to biological threat agents using host gene profiles in peripheral blood mononuclear cells (2008) (10)
- Secure access wrapper: mediating security between heterogeneous databases (2000) (10)
- An adaptable network control and reporting system (ANCORS) (2002) (10)
- Simulation and performance estimation for the Rewrite Rule Machine (1992) (10)
- LIFE, a Natural Language for Natural Language (2007) (9)
- Challenges in scalable fault tolerance (2009) (9)
- Using Maude (2000) (9)
- Invited Talk: Symbolic Systems Biology (2003) (9)
- Trusted Machine Learning: Model Repair and Data Repair for Probabilistic Models (2017) (9)
- TRIST: Circumventing Censorship with Transcoding-Resistant Image Steganography (2014) (8)
- Linear Logic Proof Games and Optimization (1996) (8)
- A Nonlinear Real Arithmetic Fragment (2014) (7)
- Formally Veri ed On Line Diagnosis (1997) (7)
- Depender Graphs: A Method of Fault-Tolerant Certificate Distribution (2002) (6)
- Symbolic Systems Biology and Pathway Logic (2008) (6)
- Distributed simulation of parallel executions (1996) (6)
- LTL Model Checking (2007) (6)
- Model, Data and Reward Repair: Trusted Machine Learning for Markov Decision Processes (2018) (5)
- Certifying and Synthesizing Membership Equational Proofs (2003) (5)
- The Complexity of Local Proof Search in Linear Logic (1996) (5)
- Hardware Support for Tamper-Resistant and Copy-Resistant Software (2000) (5)
- Pathway logic helping biologists understand and organize pathway information (2005) (5)
- Eecient Implementation of Lattice Operations Y Implementation of Lattice Operations (1989) (5)
- Dynamic LDPC codes for nanoscale memory with varying fault arrival rates (2011) (4)
- Optimization Complexity of Linear Logic Proof Games (1999) (4)
- Execution-Driven Distributed Simulation of Parallel Architectures (2005) (4)
- Reflection, Metalevel Computation, and Strategies (2007) (4)
- Trusted Neural Networks for Safety-Constrained Autonomous Control (2018) (3)
- Markov Logic Networks in Health Informatics (2011) (3)
- Functional Modules (2007) (3)
- Negotiated Privacy: (Extended Abstract) (2002) (3)
- Two Decades of Maude (2015) (3)
- Probabilistic Modeling of Failure Dependencies Using Markov Logic Networks (2013) (3)
- Representing and Simulating Protein Functional Domains in Signal Transduction Using Maude (2003) (3)
- A Hierarchy of Data Types: From Trees to Sets (2007) (3)
- bRIGHT - Workstations of the Future and Leveraging Contextual Models (2018) (3)
- PGRIP: PNNI Global Routing Infrastructure Protection (1999) (2)
- A search-based procedure for nonlinear real arithmetic (2016) (2)
- A revisited comparison between strand spaces and multiset rewriting for security protocol analysis. (2004) (2)
- Full Maude: Extending Core Maude (2007) (2)
- Automated Techniques for Stability Analysis of Delta-Notch Lateral Inhibition Mechanism (2002) (2)
- Query Routing in Wireless Sensor Networks : A Novel Application of Social Query Models SRI CSL Technical Report Number : SRI-CSL-1201 (2012) (2)
- Virus Detection in Multiplexed Nanowire Arrays using Hidden Semi-Markov models (2014) (2)
- Language Prototyping in the Maude Metalanguage (2001) (2)
- Evolution as Design Engineer (2003) (2)
- Debugging and Troubleshooting (2007) (1)
- Strategic Reeection ? (1998) (1)
- Predefined Data Modules (2007) (1)
- Global Infrastructure Protection System (2002) (1)
- BLASS. A., A game semantics for linear logic CENZER, D. and REMMEL, J., Polynomial-time Abehan groups CLOTE, P. and TAKEUTI, G., Bounded arithmetic for NC, ALogTIME, L and NL (1992) (1)
- System Modules (2007) (1)
- Homogeneity as an Advantage: It Takes a Community to Protect an Application (2010) (1)
- A Logical Interpretation of Concurrent Constraint Programming (2003) (1)
- Some Tools (2019) (1)
- Mobile Maude (2007) (1)
- Dependability Evaluation with Dynamic Reliability Block Diagrams (2014) (1)
- Complete List of Maude Commands (2007) (1)
- Introduction (2007) (1)
- Stochastic Assembly of Sublithographic (2003) (1)
- Linearizing Intuitionist ic Implication (1991) (0)
- Architecture de memoire nanometrique sublithographique (2003) (0)
- A Sampler of Application Areas (2007) (0)
- Appeared in TOPLAS 11-1-1989 E cient Implementation of Lattice OperationsyHassan (2009) (0)
- WRLA 2000 Preliminary Version Towards Maude 2 . 0 ? (2000) (0)
- Sub-lithographic nano-range storage architecture (2003) (0)
- Operational Aspects of Linear Lambda Calculus Matching Funds from Digital Equipment Corporation, the Powell Foundation, and Xerox Corporation; a Gift from Mitsubishi Corporation And (1992) (0)
- Module Operations (2007) (0)
- Syntax and Basic Parsing (2007) (0)
- Appeared in SIGACT 1992 Linear Logic (2005) (0)
- What ’ s New in Maude 2 . 4 (2007) (0)
- Data Efficient Learning of Robust Control Policies (2018) (0)
- Metaprogramming Applications (2007) (0)
- Software Quality and Infrastructure Protection for Diffuse Computing (2003) (0)
- Missing 4 Pages of Text Appeared in Ieee Symposium on Logic Programming 1987 Logic, Equations, and Functions (1986) (0)
- BERGER, U., Total sets and objects in domain theory DOWNEY, R., Every recursive boolean algebra is isomorphic to one with incomplete atoms GONCHAREV, S., YAKHNIS, A. and YAKHNIS, V., Some effectively infinite classes of enumerations (1993) (0)
- A Problem-Solving Environment for Biological Network Informatics: Bio-Spice (2007) (0)
- pects of type inference with subtypes (1992) (0)
- Classifying Information for External Release (2000) (0)
- Cries of the world and joys of the heart: A primer for new counselors in community mental health clinics (2013) (0)
- Model Checking Invariants Through Search (2007) (0)
- User Interfaces and Metalanguage Applications (2007) (0)
- Object-Oriented Modules (2007) (0)
- A search-based procedure for nonlinear real arithmetic (2016) (0)
- Formal Methods at Scale (2022) (0)
- Principles and Foundations for Fractionated Networked Cyber-Physical Systems (2010) (0)
- Specifying Parameterized Data Structures in Maude (2007) (0)
- Three-dimensional storage array (2003) (0)
- Object-Based Programming (2007) (0)
- Figure 3: Microprocessor Speciication Bolic Model Checking for Sequential Circuit Veriication. Ieee Transactions on 5 Conclusions and Future Work 4.2 Abstracting the Microprocessor Design 4.1 Proving the Lemmas Using Model-checking (0)
- Core Maude Grammar (2007) (0)
- Some New Features in Maude 2 . 0 (0)
This paper list is powered by the following services: