# Richard A. DeMillo

According to our database

Collaborative distances:

^{1}, Richard A. DeMillo authored at least 51 papers between 1974 and 2012.Collaborative distances:

## Awards

## ACM Fellow

ACM Fellow 2003, "For contributions to the engineering of reliable and secure software.".

## Timeline

#### Legend:

Book In proceedings Article PhD thesis Other## Links

#### On csauthors.net:

## Bibliography

2012

Keeping technology promises.

Commun. ACM, 2012

2009

Blighted Virtual Neighborhoods and Other Threats to Online Social Experiences.

Proceedings of the Web Information Systems Engineering, 2009

2001

On the Importance of Eliminating Errors in Cryptographic Computations.

J. Cryptology, 2001

2000

Software development for next generation communication networks.

Proceedings of the ACM SIGSOFT Symposium on Foundations of Software Engineering, 2000

1999

NSF workshop on a software research program for the 21st century.

ACM SIGSOFT Software Engineering Notes, 1999

1997

On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract).

Proceedings of the Advances in Cryptology, 1997

Failure and Fault Analysis for Software Debugging.

Proceedings of the 21st International Computer Software and Applications Conference (COMPSAC '97), 1997

1996

Mission-Critical Applications, Commercial Value and Software Quality.

ACM Comput. Surv., 1996

Critical Slicing for Software Fault Localization.

Proceedings of the 1996 International Symposium on Software Testing and Analysis, 1996

1995

Some Critical Remarks on a Hierarchy of Fault-Detecting Abilities of Test Methods.

IEEE Trans. Software Eng., 1995

An International Masters in Software Engineering: Experience and Prospects.

Proceedings of the Eleventh International Conference on Data Engineering, 1995

1994

Introduction to the Special Section.

IEEE Trans. Software Eng., 1994

1993

Experimental Results from an Automatic Test Case Generator.

ACM Trans. Softw. Eng. Methodol., 1993

Debugging with Dynamic Slicing and Backtracking.

Softw., Pract. Exper., 1993

1991

Constraint-Based Automatic Test Data Generation.

IEEE Trans. Software Eng., 1991

Defining Software by Continuous, Smooth Functions.

IEEE Trans. Software Eng., 1991

An Execution-Backtracking Approach to Debugging.

IEEE Software, 1991

Dynamic Slicing in the Presence of Unconstrained Pointers.

Proceedings of the Symposium on Testing, Analysis, and Verification, 1991

Progress Toward Automated Software Testing.

Proceedings of the 13th International Conference on Software Engineering, 1991

Compiler-integrated program mutation.

Proceedings of the Fifteenth Annual International Computer Software and Applications Conference, 1991

1989

Test Adequacy and Program Mutation.

Proceedings of the 11th International Conference on Software Engineering, 1989

Software testing for critical applications: a position paper.

Proceedings of the 13th Annual International Computer Software and Applications Conference, 1989

1987

Software testing and evaluation.

Benjamin/Cummings, ISBN: 978-0-8053-2535-5, 1987

1986

Operational Survivability in Gracefully Degrading Distributed Processing Systems.

IEEE Trans. Software Eng., 1986

1983

Protocols for Data Security.

IEEE Computer, 1983

1982

Cryptographic Protocols

Proceedings of the 14th Annual ACM Symposium on Theory of Computing, 1982

1981

Multilevel Secure Distributed System.

Proceedings of the 2nd International Conference on Distributed Computing Systems, 1981

The Design and Analysis of Cryptographic Protocols.

Proceedings of the Advances in Cryptology: A Report on CRYPTO 81, 1981

1980

Space-Time Trade-Offs in Structured Programming: An Improved Combinatorial Embedding Theorem.

J. ACM, 1980

The Consistency of "P = NP" and Related Problems with Fragments of Number Theory.

Proceedings of the 12th Annual ACM Symposium on Theory of Computing, 1980

A System Architecture to Support a Verifiably Secure Multilevel Security System.

Proceedings of the 1980 IEEE Symposium on Security and Privacy, 1980

Protecting Shared Cryptographic Keys.

Proceedings of the 1980 IEEE Symposium on Security and Privacy, 1980

Theoretical and Emperical Studies on Using Program Mutation to Test the Functional Correctness of Programs.

Proceedings of the Conference Record of the Seventh Annual ACM Symposium on Principles of Programming Languages, 1980

1979

A Constructive Generalization of the Borel-Cantelli Lemma with Application to the Complexity of Infinite Strings.

Mathematical Systems Theory, 1979

Implicit Computation of Synchronization Primitives.

Inf. Process. Lett., 1979

Some Connections between Mathematical Logic and Complexity Theory

Proceedings of the 11h Annual ACM Symposium on Theory of Computing, April 30, 1979

1978

Even Data Bases That Lie Can Be Compromised.

IEEE Trans. Software Eng., 1978

A Probabilistic Remark on Algebraic Program Testing.

Inf. Process. Lett., 1978

Hints on Test Data Selection: Help for the Practicing Programmer.

IEEE Computer, 1978

Preserving Average Proximity in Arrays.

Commun. ACM, 1978

Database Security.

Proceedings of the Issues in Data Base Management, 1978

Recent progress in secure computation.

Proceedings of the IEEE Computer Society's Second International Computer Software and Applications Conference, 1978

1977

Some applications of model theory to the metatheory of program schemata.

Notre Dame Journal of Formal Logic, 1977

A Study of Schedules as Models of Synchronous Parallel Computation.

J. ACM, 1977

Theory in the Computer Science and Engineering Curriculum: Why, What, When, and Where.

IEEE Computer, 1977

Social Processes and Proofs of Theorems and Programs.

Proceedings of the Conference Record of the Fourth ACM Symposium on Principles of Programming Languages, 1977

1976

On the Computational Complexity of a Generalized Scheduling Problem.

IEEE Trans. Computers, 1976

Space and Time Hierarchies for Classes of Control Structures and Data Structures.

J. ACM, 1976

1975

Non-definability of certain semantic properties of programs.

Notre Dame Journal of Formal Logic, 1975

The Complexity of Control Structures and Data Structures

Proceedings of the 7th Annual ACM Symposium on Theory of Computing, 1975

1974

Parallel Scheduling of Programs in a Restricted Model of Computation

Proceedings of the 6th Annual ACM Symposium on Theory of Computing, April 30, 1974