Richard DeMillo
#14,776
Most Influential Person Now
American academic
Richard DeMillo's AcademicInfluence.com Rankings
Richard DeMillocomputer-science Degrees
Computer Science
#921
World Rank
#955
Historical Rank
#500
USA Rank
Software Engineering
#91
World Rank
#91
Historical Rank
#43
USA Rank
Artificial Intelligence
#824
World Rank
#837
Historical Rank
#183
USA Rank
Database
#1312
World Rank
#1384
Historical Rank
#358
USA Rank
Download Badge
Computer Science
Richard DeMillo's Degrees
- PhD Computer Science University of California, Berkeley
- Masters Computer Science University of California, Berkeley
- Bachelors Mathematics University of California, Berkeley
Similar Degrees You Can Earn
Why Is Richard DeMillo Influential?
(Suggest an Edit or Addition)According to Wikipedia, Richard Allan DeMillo is an American computer scientist, educator and executive. He is Professor and holds the Charlotte B. and Roger C. Warren Chair in Computing at the Georgia Institute of Technology.
Richard DeMillo's Published Works
Published Works
- Hints on Test Data Selection: Help for the Practicing Programmer (1978) (2106)
- On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) (1997) (1711)
- Constraint-Based Automatic Test Data Generation (1991) (890)
- Social processes and proofs of theorems and programs (1978) (516)
- A Probabilistic Remark on Algebraic Program Testing (1978) (485)
- Debugging with dynamic slicing and backtracking (1993) (338)
- An extended overview of the Mothra software testing environment (1988) (295)
- Cryptographic protocols (1982) (275)
- On the Importance of Eliminating Errors in Cryptographic Computations (2015) (259)
- DESIGN OF MUTANT OPERATORS FOR THE C PROGRAMMING LANGUAGE (2006) (249)
- Software testing and evaluation (1987) (190)
- Theoretical and empirical studies on using program mutation to test the functional correctness of programs (1980) (176)
- Social processes and proofs of theorems and programs (1977) (174)
- Mutation analysis (2019) (164)
- Foundations of Secure Computation (1978) (155)
- Experimental results from an automatic test case generator (1993) (147)
- Critical slicing for software fault localization (1996) (118)
- Dynamic slicing in the presence of unconstrained pointers (1991) (109)
- An execution-backtracking approach to debugging (1991) (108)
- Automatic test data generation (1988) (95)
- Compiler-integrated program mutation (1991) (75)
- Protocols for Data Security (1983) (56)
- Mutation Analysis as a Tool for Software Quality Assurance. (1980) (54)
- The Evolving University: Disruptive Change and Institutional Innovation (2012) (48)
- Preserving average proximity in arrays (1978) (45)
- Even Data Bases That Lie Can Be Compromised (1978) (41)
- On the Importance of Checking Computations (1996) (41)
- Space and Time Hierarchies for Classes of Control Structures and Data Structures (1976) (40)
- Failure and fault analysis for software debugging (1997) (35)
- A Grammar Based Fault Classification Scheme and its Application to the Classification of the Errors (1995) (34)
- Proceedings of the 15th international conference on Software Engineering (1982) (34)
- On a political pamphlet from the middle ages (1978) (33)
- The consistency of "P = NP" and related problems with fragments of number theory (1980) (32)
- The Mothra tool set (software testing) (1989) (30)
- Abelard to Apple: The Fate of American Colleges and Universities (2011) (28)
- An Execution Backtracking Approach to Program Debugging (2007) (28)
- Test Adequacy And Program Mutation (1989) (26)
- Some connections between mathematical logic and complexity theory (1979) (24)
- Completely validated software: test adequacy and program mutation (panel session) (1989) (23)
- Proceedings of the tenth annual ACM symposium on Theory of computing (1978) (22)
- Revolution in Higher Education: How a Small Band of Innovators Will Make College Accessible and Affordable (2015) (22)
- Protecting Shared Cryptographic Keys (1980) (21)
- Efficient Debugging with Slicing and Backtracking (1990) (19)
- Software Project Forecasting (1980) (17)
- Ballot-Marking Devices (BMDs) Cannot Assure the Will of the Voters (2019) (17)
- Applied Cryptology, Cryptographic Protocols, and Computer Security Models (1983) (16)
- The Mothra Tool Set (2004) (16)
- Ballot-Marking Devices Cannot Ensure the Will of the Voters (2020) (15)
- Studies in Computer Science (2012) (14)
- Progress toward automated software testing (1991) (12)
- On the Computational Complexity of a Generalized Scheduling Problem (1976) (11)
- On Small Universal Data Structures and Related Combinatorial Problems. (1978) (10)
- Operational survivability in gracefully degrading distributed processing systems (1986) (10)
- Space-Time Trade-Offs in Structured Programming: An Improved Combinatorial Embedding Theorem (1980) (10)
- What Voters are Asked to Verify Affects Ballot Verification: A Quantitative Analysis of Voters' Memories of Their Ballots (2018) (10)
- A System Architecture to Support a Verifiably Secure Multilevel Security System (1980) (9)
- Can structured programs be efficient? (1976) (8)
- Defining Software by Continuous, Smooth Functions (1991) (8)
- The complexity of control structures and data structures (1975) (7)
- Unbundling Higher Education and the Georgia Tech Online MS in Computer Science : A Chronicle (2015) (6)
- Recent progress in secure computation (1978) (6)
- NSF workshop on a software research program for the 21st century (1999) (5)
- A Comparison of Some Reliable Test Data Generation Procedures. (1981) (5)
- Some Critical Remarks on a Hierarchy of Fault-Detecting Abilities of Test Methods (1995) (5)
- Implicit Computation of Synchronization Primitives (1979) (4)
- CHAPTER 11 ENTERPRISE IT AND TRANSFORMATION (2005) (4)
- Parallel scheduling of programs in a restricted model of computation (1974) (4)
- A Two Dimensional Scheme To Evaluate The Adequacy Of Fault Tolerance Testing (1994) (3)
- Team-Based Software/System Development in the Vertically-Integrated Projects (VIP) Program (2012) (3)
- On the Importance of Checking Computations ( Extended (1996) (3)
- Theory in the Computer Science and Engineering Curriculum: Why, What, When, and Where (1977) (3)
- Non-definability of certain semantic properties of programs (1975) (2)
- A Study of Schedules as Models of Synchronous Parallel Computation (1977) (2)
- Review of "Proofs and refutations: the logic of mathematical discovery" by Imre Lakatos. Cambridge University Press 1976. (1979) (2)
- Proceedings of the 9th ACM SIGPLAN-SIGACT symposium on Principles of programming languages (1982) (2)
- Formal semantics and the logical structure of programming languages (1972) (2)
- Keeping technology promises (2012) (2)
- Software Engineering Environments for Mission Critical Applications -- STARS Alternative Programmatic Approaches. (1984) (1)
- Too Much Debate? Author's reply (2010) (1)
- The Average Length of Paths Embedded in Trees. (1977) (1)
- The Internet as a Telephone Network. (1998) (1)
- Multilevel Secure Distributed System (1981) (1)
- Keynote Why Software Falls Down (2001) (1)
- Software development for next generation communication networks (2000) (1)
- Response from R. A. DeMillo, R. J. Lipton, A. J. Perlis (1978) (1)
- Mission-critical applications, commercial value and software quality (1996) (1)
- An Embedding Result for Labelled Programs. (1977) (1)
- Appendix A : Program Tested (2002) (0)
- Research in graph theoretic models of control & data structures (1977) (0)
- An integrated software environment for reuse (1989) (0)
- Software test and evaluation project, phases III and IV (1983) (0)
- A SYSTEMARCHITECTURETO SUPPORTA VERIFIABLYSECURR (ExtendedAbstract) (1980) (0)
- Models of computation and algorithms (1982) (0)
- Model theory of algorithmic logics (1981) (0)
- Strategy for Achieving Ada-Based High Assurance Systems (1988) (0)
- The Design and Analysis of Cryptographic Protocols (1981) (0)
- Deliberate Innovation, Lifetime Education: Final Report of the Commission on Creating the Next in Education (2020) (0)
- The power of control structures and data structures (1976) (0)
- Metainduction and PtogAam Mutation: RemeiAtic So6twaite Vatidation (2011) (0)
- Software testing (2003) (0)
- Foundations of determinixtic (i.e. deterministic) scheduling of programs for parallel execution (1980) (0)
- Software testing for critical applications: a position paper (1989) (0)
- Combinatorial Graph Embedding. (1980) (0)
- Blighted Virtual Neighborhoods and Other Threats to Online Social Experiences (2009) (0)
- Some applications of model theory to the metatheory of program schemata (1977) (0)
- Observing ADA Software Components (1990) (0)
- Introduction to the Special Section (1994) (0)
- An international Masters in Software Engineering: experience and prospects (1995) (0)
- Report from the Panel on Software Quality: Strategic Directions, 14-15 June 1996 (2007) (0)
- Metainduction and program mutation: realistic software validation (1979) (0)
- Guest Editor's Introduction (1983) (0)
- Studies in computer science: in honor of Samuel D. Conte (1994) (0)
- Conference on Foundations of Secure Computation Held on 3-5 October 1977 at Atlanta, Georgia. (1978) (0)
- Why software falls down (keynote) (2001) (0)
- An Assessment of the STARS (Software Technology for Adaptable Reliable Systems) Program, September-October 1985. Volume 1. Executive Briefing. (1985) (0)
- 14Tutorial: Static Analysis andDynamicTesting ofComputer Software (1978) (0)
- Statistical Measures of Software Reliability (1980) (0)
- Database Security (1978) (0)
- Papers on Program Testing (1979) (0)
- An Exploratory Study of Common Coding Faults in C Programs 16 Appendix (1997) (0)
- NSF Workshop on a Software Research Program For the 21 st Century Greenbelt , Maryland , October 15-16 , 1998 Workshop Participants : Professor (2002) (0)
- Experimental and theoretical research on program mutation (1985) (0)
- Programming Language Studies. I. The Power of Control Structures and Data Structures. (1976) (0)
- Future of mutation testing and its application (panel session) (2001) (0)
- Software test and evaluation study phase I and II : survey and analysis (1985) (0)
- Validating computer software: two views (1980) (0)
- A constructive generalization of the borel-cantelli lemma with application to the complexity of infinite strings (1979) (0)
This paper list is powered by the following services:
Other Resources About Richard DeMillo
What Schools Are Affiliated With Richard DeMillo?
Richard DeMillo is affiliated with the following schools: