Operational reasoning for functions with local state AM Pitts, IDB Stark Higher order operational techniques in semantics, 227-273, 1998 | 282 | 1998 |
Observable properties of higher order functions that dynamically create local names, or: What's new? AM Pitts, IDB Stark International Symposium on Mathematical Foundations of Computer Science, 122-141, 1993 | 276 | 1993 |
ISA Semantics for ARMv8-a, RISC-v, and CHERI-MIPS A Armstrong, T Bauereiss, B Campbell, A Reid, KE Gray, RM Norton, ... Proceedings of the ACM on Programming Languages 3 (POPL), 1-31, 2019 | 175 | 2019 |
Names and higher-order functions IDB Stark University of Cambridge, 1994 | 160 | 1994 |
A fully abstract domain model for the/spl pi/-calculus I Stark Proceedings 11th Annual IEEE Symposium on Logic in Computer Science, 36-42, 1996 | 154 | 1996 |
Nominal games and full abstraction for the nu-calculus S Abramsky, DR Ghica, AS Murawski, CHL Ong, IDB Stark Proceedings of the 19th Annual IEEE Symposium on Logic in Computer Science …, 2004 | 100 | 2004 |
Categorical models for local names I Stark Lisp and Symbolic Computation 9, 77-107, 1996 | 97 | 1996 |
Automatic verification of design patterns in Java A Blewitt, A Bundy, I Stark Proceedings of the 20th IEEE/ACM international Conference on Automated …, 2005 | 94 | 2005 |
Mobile resource guarantees for smart devices D Aspinall, S Gilmore, M Hofmann, D Sannella, I Stark Construction and Analysis of Safe, Secure, and Interoperable Smart Devices …, 2005 | 86 | 2005 |
Presheaf models for the π-calculus GL Cattani, I Stark, G Winskel International Conference on Category Theory and Computer Science, 106-126, 1997 | 81 | 1997 |
Domains and denotational semantics: History, accomplishments and open problems A Jung, M Fiore, E Moggi, PW O’Hearn, JG Riecke, G Rosolini, I Stark School of Computer Science Research Reports-University of BIRMINGHAM CSR, 1996 | 75 | 1996 |
Reducibility and⊤⊤-lifting for computation types S Lindley, I Stark Typed Lambda Calculi and Applications: 7th International Conference, TLCA …, 2005 | 73 | 2005 |
Rigorous engineering for hardware security: Formal modelling and proof in the CHERI design and implementation process K Nienhuis, A Joannou, T Bauereiss, A Fox, M Roe, B Campbell, M Naylor, ... 2020 IEEE Symposium on Security and Privacy (SP), 1003-1020, 2020 | 59 | 2020 |
The Continuous π-Calculus: A Process Algebra for Biochemical Modelling M Kwiatkowski, I Stark International Conference on Computational Methods in Systems Biology, 103-122, 2008 | 55 | 2008 |
A dependent type theory with names and binding U Schöpp, I Stark Computer Science Logic: 18th International Workshop, CSL 2004, 13th Annual …, 2004 | 53 | 2004 |
Certified complexity (cerco) RM Amadio, N Ayache, F Bobot, JP Boender, B Campbell, I Garnier, ... Foundational and Practical Aspects of Resource Analysis: Third International …, 2014 | 50 | 2014 |
Automatic verification of Java design patterns A Blewitt, A Bundy, I Stark Proceedings 16th annual international conference on automated software …, 2001 | 46 | 2001 |
Grail: a functional form for imperative mobile code L Beringer, K MacKenzie, I Stark Electronic Notes in Theoretical Computer Science 85 (1), 3-23, 2003 | 45 | 2003 |
Mobius: Mobility, ubiquity, security: Objectives and progress report G Barthe, L Beringer, P Crégut, B Grégoire, M Hofmann, P Müller, E Poll, ... Trustworthy Global Computing: Second Symposium, TGC 2006, Lucca, Italy …, 2007 | 44 | 2007 |
Randomised testing of a microprocessor model using SMT-solver state generation B Campbell, I Stark Science of Computer Programming 118, 60-76, 2016 | 43 | 2016 |