Robert Watson
#29,014
Most Influential Person Now
British computer scientist
Robert Watson 's AcademicInfluence.com Rankings
Robert Watson criminal-justice Degrees
Criminal Justice
#261
World Rank
#290
Historical Rank
Cyber Security
#32
World Rank
#34
Historical Rank
Robert Watson computer-science Degrees
Computer Science
#1298
World Rank
#1341
Historical Rank
Cybersecurity
#36
World Rank
#38
Historical Rank
Database
#6745
World Rank
#6983
Historical Rank
Download Badge
Criminal Justice Computer Science
Why Is Robert Watson Influential?
(Suggest an Edit or Addition)According to Wikipedia, Robert Nicholas Maxwell Watson is a FreeBSD developer, and founder of the TrustedBSD Project. He is currently employed as a Professor of Systems, Security, and Architecture in the Security Research Group at the University of Cambridge Computer Laboratory.
Robert Watson 's Published Works
Published Works
- The CHERI capability model: Revisiting RISC in an age of risk (2014) (262)
- Ignoring the Great Firewall of China (2006) (257)
- Capsicum: Practical Capabilities for UNIX (2010) (194)
- CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization (2015) (191)
- Queues Don't Matter When You Can JUMP Them! (2015) (185)
- Firmament: Fast, Centralized Cluster Scheduling at Scale (2016) (184)
- Network stack specialization for performance (2013) (134)
- Exploiting Concurrency Vulnerabilities in System Call Wrappers (2007) (97)
- Into the depths of C: elaborating the de facto standards (2016) (95)
- Beyond the PDP-11: Architectural Support for a Memory-Safe C Abstract Machine (2015) (85)
- How the FreeBSD Project (2006) (74)
- Metrics for Security and Performance in Low-Latency Anonymity Systems (2008) (73)
- Capability Hardware Enhanced RISC Instructions: CHERI Instruction-set architecture (2014) (64)
- TrustedBSD: Adding Trusted Operating System Features to FreeBSD (2001) (63)
- Clean Application Compartmentalization with SOAAP (2015) (63)
- Network stack specialization for performance (2014) (54)
- Thunderclap: Exploring Vulnerabilities in Operating System IOMMU Protection via DMA from Untrustworthy Peripherals (2019) (52)
- The TrustedBSD MAC Framework: Extensible Kernel Access Control for FreeBSD 5.0 (2003) (52)
- Large Eddy Simulation for Turbines: Methodologies, Cost and Future Outlooks (2014) (42)
- CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege in the POSIX C Run-time Environment (2019) (39)
- A decade of OS access-control extensibility (2013) (38)
- Turbomachinery simulation challenges and the future (2019) (36)
- Efficient Tagged Memory (2017) (36)
- CHERI Concentrate: Practical Compressed Capabilities (2019) (35)
- Exploring C semantics and pointer provenance (2019) (34)
- CHERIvoke: Characterising Pointer Revocation using CHERI Capabilities for Temporal Memory Safety (2019) (32)
- CHERI JNI: Sinking the Java Security Model into the C (2017) (32)
- Fast Protection-Domain Crossing in the CHERI Capability-System Architecture (2016) (32)
- A taste of Capsicum (2012) (29)
- Cornucopia: Temporal Safety for CHERI Heaps (2020) (26)
- CHERI: a research platform deconflating hardware virtualisation and protection (2012) (23)
- Disk|Crypt|Net: rethinking the stack for high-performance video streaming (2017) (22)
- Rigorous engineering for hardware security: Formal modelling and proof in the CHERI design and implementation process (2020) (21)
- Design and Implementation of the TrustedBSD MAC Framework (2003) (19)
- Capability Hardware Enhanced RISC Instructions (CHERI): Notes on the Meltdown and Spectre Attacks (2018) (18)
- Declarative, Temporal, and Practical Programming with Capabilities (2013) (17)
- Towards robust unstructured turbomachinery large eddy simulation (2015) (17)
- LES for Turbines: Methodologies, Cost and Future Outlooks (2013) (16)
- Secure active network prototypes (2002) (15)
- Building Systems to Be Shared, Securely (2004) (15)
- Capabilities Revisited : A Holistic Approach to Bottom-to-Top Assurance of Trustworthy Systems (2010) (13)
- New approaches to operating system security extensibility (2011) (12)
- Effect of Mesh Quality on Flux Reconstruction in Multi-dimensions (2018) (12)
- Improved hierarchical modelling for aerodynamically coupled systems (2017) (12)
- Separating Translation from Protection in Address Spaces with Dynamic Remapping (2017) (12)
- Bluespec Extensible RISC Implementation: BERI Hardware reference (2014) (11)
- Applying Provenance in APT Monitoring and Analysis: Practical Challenges for Scalable, Efficient and Trustworthy Distributed Provenance (2017) (11)
- TESLA: temporally enhanced system logic assertions (2014) (10)
- Toward Future Installations: Mutual Interactions of Short Intakes With Modern High Bypass Fans (2019) (10)
- An Introduction to CHERI (2019) (10)
- Introduction to Multithreading and Multiprocessing in the FreeBSD SMPng Network Stack (2005) (8)
- Design and implementation of the Trusted BSD MAC framework (2003) (8)
- Large Eddy Simulation of Cutback Trailing Edges for Film Cooling Turbine Blades (2010) (7)
- Exploring Compartmentalisation Hypotheses with SOAAP (2012) (7)
- CheriRTOS: A Capability Model for Embedded Devices (2018) (7)
- Capability Hardware Enhanced RISC Instructions: CHERI Programmer’s Guide (2015) (7)
- High-Order Flux Reconstruction on Stretched and Warped Meshes (2017) (7)
- Numerical Analysis of an Instrumented Turbine Blade Cascade (2018) (7)
- Temporal Stabilisation of Flux Reconstruction on Linear Problems (2018) (6)
- Storage in the LLNL Octopus network: an overview and reflections (1984) (6)
- A Simple Flux Reconstruction Approach to Solving a Poisson Equation to Find Wall Distances for Turbulence Modelling (2018) (6)
- Perfectly Parallel Optimization for Cutback Trailing Edges (2016) (6)
- Efficient preprocessing of complex geometries for CFD simulations (2019) (6)
- CHERI C/C++ Programming Guide (2020) (6)
- The TrustedBSD MAC Framework (2003) (6)
- The case for reconfigurable I/O channels (2012) (5)
- Optimal multi-block mesh generation for CFD (2017) (5)
- Clean application compartmentalization with SOAAP (extended version) (2015) (5)
- Unsteady Simulations of the Wellborn Diffusing S-Duct (2016) (5)
- The Design and Implementation of the FreeBSD ® Operating System Second Edition (2014) (5)
- Verified Security for the Morello Capability-enhanced Prototype Arm Architecture (2022) (5)
- Low Order Modeling for Fan and Outlet Guide Vanes in Aero-Engines (2019) (4)
- Prophylactic, treatment and containment techniques for ensuring active network security (2003) (4)
- Rack-Scale Capabilities: Fine-Grained Protection for Large-Scale Memories (2019) (4)
- Capability Hardware Enhanced RISC Instructions: CHERI User’s guide (2014) (3)
- Modifying an unstructured Roe solver for large eddy simulation (2014) (3)
- Memory-Side Protection With a Capability Enforcement Co-Processor (2019) (3)
- Hyperbolic Diffusion in Flux Reconstruction: Optimisation through Kernel Fusion within Tensor-Product Elements (2021) (3)
- Pointer Provenance in a Capability Architecture (2018) (3)
- Application of an Immersed Boundary Method on an Instrumented Turbine Blade With Large Eddy Simulation (2021) (3)
- How to Keep Bad Papers Out of Conferences (with Minimum Reviewer Effort) (2011) (3)
- Advances of turbomachinery design optimization (2015) (3)
- Introducing Capsicum: Practical Capabilities for UNIX (2010) (3)
- Balancing Disruption and Deployability in the CHERI Instruction-Set Architecture (ISA) (2017) (2)
- Position Paper:Defending Direct Memory Access with CHERI Capabilities (2020) (2)
- On the Use of RBF Interpolation for Flux Reconstruction (2022) (2)
- Design optimisation of labyrinth seals using LES (2020) (2)
- Effect of Film Cooling on Entropy Noise Generation in a Stator Blade Row (2021) (2)
- Draft : Have you checked your IPC performance lately ? (2012) (2)
- Statement for SACMAT 2001 panel (2001) (2)
- The BERIpad tablet : open-source construction , CPU , OS and applications (2013) (1)
- Effect of Flux Function Order and Working Precision in Spectral Element Methods (2020) (1)
- CHERI Macaroons: Efficient, host-based access control for cyber-physical systems (2020) (1)
- Optimising flux reconstruction schemes for Large Eddy Simulation. (2015) (1)
- Distributed computing and cutback trailing edges (2014) (1)
- Unsteady Simulation Paradigms for Trailing Edge Ejection (2014) (1)
- A Decade of OS Access-control Extensibility (2013) (1)
- Modular Research-Based Composably Trustworthy Mission-Oriented Resilient Clouds (MRC2) (2016) (1)
- An extended range of stable flux reconstruction schemes on quadrilaterals for various polynomial bases (2022) (1)
- High-Order Methods for Parabolic Equations using a Space-Time Flux Reconstruction Approach (2021) (1)
- CamIO : declaring flexible and performant application (2013) (1)
- RANS Analysis of Merging Supersonic Streamwise Vortices for Enhanced Mixing in Scramjet Combustors (2022) (0)
- Connecting the Dot-Dots : Model Checking Concurrency in a Security API (2010) (0)
- OpenDTrace Specification version 1.0 (2018) (0)
- Structural Analysis of Whole-System Provenance Graphs (2018) (0)
- Teaching Operating Systems with FreeBSD through Tracing, Analysis, and Experimentation (2017) (0)
- The Design and Implementation of the FreeBSD Operating System ( 2 nd Edition ) (2016) (0)
- Memory Segmentation to Support Secure Applications (2013) (0)
- Low Order Modelling for Fan and Outlet Guide Vanes in Aero-Engines (2018) (0)
- DHCP Server Verification by Client Via DNSSEC (1997) (0)
- Large Eddy Simulation of Internal Cooling Passages for Engine-Realistic Turbine Blade Geometries (2015) (0)
- Blending Tracing & Security on FreeBSD CADETS (2021) (0)
- CHERI: A Hardware-Software System to Support the Principle of Least Privilege (2016) (0)
- Application of the Discontinuous Galerkin Method to Wake Vortex Flows (2015) (0)
- Effect of Mesh Quality on Flux Reconstruction in Multi-dimensions (2020) (0)
- LES of film cooling (2010) (0)
- Large Eddy Simulation Studies of the Cooling of HPT-NGVs (2014) (0)
- Evolving Solutions: Distributed computing and cutback trailing edges (2014) (0)
- DNSsec Authentication Referral Record (AR) (1997) (0)
- Large eddy simulation of real geometry internal cooling passages, Internal Report for Rolls-Royce Turbines (36 pages) (2016) (0)
- Application of Immersed Boundary Method on Instrumented Turbine Blade With LES (2020) (0)
- Improved Numerical Methods for Unstructured, High Order Large Eddy Simulation (2015) (0)
- Active Network Fault Response (2003) (0)
- LES of S-Shaped Ducts and Associated Developments (2014) (0)
- Cui J, Watson R and Tucker P.G. User guide for IBMSG, Rolls-Royce Technical Report (7 Pages) (2016) (0)
- Aliveness as an Alternative to Authentication (2012) (0)
- A Space-Time Flux Reconstruction Approach for Unsteady 3D Parabolic Equations with Enhanced Convergence Acceleration (2022) (0)
- DR AF T Data centers are microkernels done accidentally : lessons for building a million-core distributed OS (2013) (0)
- Capsicum Capsicum [ Wat + 10 ] is a framework for principled , coherent compartmentalization of FreeBSD applications (2021) (0)
- First USENIXWorkshop on Offensive Technologies ( WOOT ’ 07 ) (0)
- Distributed File Systems (1994) (0)
- Error Record (ERR) for DNS (1997) (0)
- Stayin' Alive: Aliveness as an Alternative to Authentication (2012) (0)
- Clean Application Compartmentalization with SOAAP ( Extended Version ) Khilan Gudka (2016) (0)
- L 41 : Lab 2-Kernel Implications of IPC Dr (2016) (0)
- Large Eddy Simulation of S-Shaped Diffusing Ducts For Convoluted Intakes (2015) (0)
- All Equalities Are Equal, but Some Are More Equal Than Others: The Effect of Implementation Aliasing on the Numerical Solution to Conservation Equations (2019) (0)
- LES of internal cooling flows (2014) (0)
- L41: Lab 3 - Micro-Architectural Implications of IPC (2015) (0)
- High-Accurate, Physics-Based Wake Simulation Techniques (2015) (0)
This paper list is powered by the following services:
Other Resources About Robert Watson
What Schools Are Affiliated With Robert Watson ?
Robert Watson is affiliated with the following schools: