James Parker

According to our database1, James Parker authored at least 27 papers between 1995 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2022
ANOSY: approximated knowledge synthesis with refinement types for declassification.
Proceedings of the PLDI '22: 43rd ACM SIGPLAN International Conference on Programming Language Design and Implementation, San Diego, CA, USA, June 13, 2022

2021
Balboa: Bobbing and Weaving around Network Censorship.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
Advanced Language-based Techniques for Correct, Secure Networked Systems.
PhD thesis, 2020

Build It, Break It, Fix It Contests: Motivated Developers Still Make Security Mistakes.
login Usenix Mag., 2020

Build It, Break It, Fix It: Contesting Secure Development.
ACM Trans. Priv. Secur., 2020

Verifying replicated data types with typeclass refinements in Liquid Haskell.
Proc. ACM Program. Lang., 2020

Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It.
Proceedings of the 29th USENIX Security Symposium, 2020

2019
LWeb: information flow security for multi-tier web applications.
Proc. ACM Program. Lang., 2019

2018
Lazy max-sum for allocation of tasks with growing costs.
Robotics Auton. Syst., 2018

2017
Exploring relations between EMG and biomechanical data recorded during a golf swing.
Expert Syst. Appl., 2017

2016
Electromyographic Patterns during Golf Swing: Activation Sequence Profiling and Prediction of Shot Effectiveness.
Sensors, 2016

Exploiting Spatial Locality and Heterogeneity of Agents for Search and Rescue Teamwork.
J. Field Robotics, 2016

Controlling Growing Tasks with Heterogeneous Agents.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

Max-Sum for Allocation of Changing Cost Tasks.
Proceedings of the Intelligent Autonomous Systems 14, 2016

Build It, Break It, Fix It: Contesting Secure Development.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
An Extended Detailed Investigation of First and Second Order Supersymmetries for Off-Shell <i>N</i> = 2 and <i>N</i> = 4 Supermultiplets.
Symmetry, 2015

2014
Tasks with cost growing over time and agent reallocation delays.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014

Coordination in large scale multi-agent systems for complex environments.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014

2012
Security Through Collaboration and Trust in MANETs.
Mob. Networks Appl., 2012

2011
A 60GHz CMOS phased-array transceiver pair for multi-Gb/s wireless communications.
Proceedings of the IEEE International Solid-State Circuits Conference, 2011

2010
Imitation as a Mechanism of Cultural Transmission.
Artif. Life, 2010

2008
Security through Collaboration in MANETs.
Proceedings of the Collaborative Computing: Networking, 2008

2006
A Multi-Standard Low Power 1.5-3.125 Gb/s Serial Transceiver in 90nm CMOS.
Proceedings of the IEEE 2006 Custom Integrated Circuits Conference, 2006

2005
A multigigabit backplane transceiver core in 0.13-μm CMOS with a power-efficient equalization architecture.
IEEE J. Solid State Circuits, 2005

2004
On intrusion detection and response for mobile ad hoc networks.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004

1998
Distributed Multi-Level Recovery in Main-Memory Databases.
Distributed Parallel Databases, 1998

1995
A high-capacity ATM switch based on advanced electronic and optical technologies.
IEEE Commun. Mag., 1995


  Loading...