Carl A. Gunter
Carl A. Gunter
George and Ann Fisher Distinguished Professor, University of Illinois at Urbana-Champaign
Verified email at illinois.edu - Homepage
Title
Cited by
Cited by
Year
Semantics of programming languages: structures and techniques
CA Gunter
MIT press, 1992
10181992
The SwitchWare active network architecture
DS Alexander, WA Arbaugh, MW Hicks, P Kakkar, AD Keromytis, ...
IEEE Network 12 (3), 29-36, 1998
5171998
PLAN: A packet language for active networks
M Hicks, P Kakkar, JT Moore, CA Gunter, S Nettles
ACM International Conference on Functional Programming Languages (ICFP ’98 …, 1998
4581998
Semantic domains
CA Gunter, DS Scott
Handbook of Theoretical Computer Science, 633-674, 1990
4251990
A reference model for requirements and specifications
CA Gunter, EL Gunter, M Jackson, P Zave
IEEE Software 17 (3), 37-43, 2000
3792000
Inheritance as implicit coercion
V Breazu-Tannen, T Coquand, CA Gunter, A Scedrov
Information and computation 93 (1), 172-221, 1991
3351991
Dynamic Searchable Encryption via Blind Storage.
M Naveed, M Prabhakaran, CA Gunter
EEE Symposium on Security and Privacy, San Jose, CA 2014, 2014
3262014
Active network encapsulation protocol (ANEP)
DS Alexander, CA Gunter, AD Keromytis, G Minden, D Wetherall, ...
Active Networks Request for Comments, 1997
2821997
Toward a science of learning systems: a research agenda for the high-functioning Learning Health System
C Friedman, J Rubin, J Brown, M Buntin, M Corn, L Etheredge, C Gunter, ...
Journal of the American Medical Informatics Association 22 (1), 43-50, 2015
2562015
Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX
W Wang, G Chen, X Pan, Y Zhang, XF Wang, V Bindschaedler, H Tang, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
2432017
Formal verification of standards for distance vector routing protocols
K Bhargavan, D Obradovic, CA Gunter
Journal of the ACM (JACM) 49 (4), 538-576, 2002
2382002
Privacy in the genomic era
M Naveed, E Ayday, EW Clayton, J Fellay, CA Gunter, JP Hubaux, ...
ACM Computing Surveys (CSUR) 48 (1), 1-44, 2015
2222015
What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources.
S Demetriou, X Zhou, M Naveed, Y Lee, K Yuan, XF Wang, CA Gunter
ISOC Network and Distributed System Security (NDSS ’15), 2015
2112015
Identity, location, disease and more: Inferring your secrets from Android public resources
X Zhou, S Demetriou, D He, M Naveed, X Pan, XF Wang, CA Gunter, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2092013
PLANet: An active internetwork
M Hicks, JT Moore, DS Alexander, CA Gunter, SM Nettles
IEEE Conference on Computer Communications (INFOCOM '99) 3, 1124-1133 vol. 3, 1999
1811999
Privacy APIs: Access control techniques to analyze and verify legal privacy policies
MJ May, CA Gunter, I Lee
IEEE Computer Security Foundations Workshop (CSFW '06), 2006
1422006
Privacy and security in mobile health: a research agenda
D Kotz, CA Gunter, S Kumar, JP Weiner
Computer 49 (6), 22-30, 2016
1412016
Verisim: Formal analysis of network simulations
K Bhargavan, CA Gunter, M Kim, I Lee, D Obradovic, O Sokolsky, ...
IEEE Transactions on Software Engineering (TOSE) 28 (2), 129-145, 2002
1392002
Models and languages for digital rights
CA Gunter, ST Weeks, AK Wright
IEEE Hawaii International Conference on System Sciences (HICSS '01), 2001
1372001
Theoretical aspects of object-oriented programming: types, semantics, and language design
CA Gunter, JC Mitchell
The MIT Press, 1994
1371994
The system can't perform the operation now. Try again later.
Articles 1–20