default search action
William L. Harrison
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2001
- [b1]William L. Harrison:
Modular Compilers and Their Correctness Proofs. University of Illinois Urbana-Champaign, USA, 2001
Journal Articles
- 2019
- [j8]Thomas N. Reynolds, Adam M. Procter, William L. Harrison, Gerard Allwein:
The Mechanized Marriage of Effects and Monads with Applications to High-assurance Hardware. ACM Trans. Embed. Comput. Syst. 18(1): 6:1-6:26 (2019) - 2017
- [j7]Adam M. Procter, William L. Harrison, Ian Graves, Michela Becchi, Gerard Allwein:
A Principled Approach to Secure Multi-core Processor Design with ReWire. ACM Trans. Embed. Comput. Syst. 16(2): 33:1-33:25 (2017) - 2009
- [j6]William L. Harrison, James Hook:
Achieving information flow security through monadic control of effects. J. Comput. Secur. 17(5): 599-653 (2009) - 2008
- [j5]Xuezheng Fu, Hao Wang, Robert W. Harrison, William L. Harrison:
A rule-based approach for RNA pseudoknot prediction. Int. J. Data Min. Bioinform. 2(1): 78-93 (2008) - 2005
- [j4]William L. Harrison, Richard B. Kieburtz:
The logic of demand in Haskell. J. Funct. Program. 15(5): 837-891 (2005) - 1990
- [j3]William L. Harrison, Cheng-Kiang Farn:
A comparison of information management issues in the United States of America and the Republic of China. Inf. Manag. 18(4): 177-188 (1990) - 1987
- [j2]William L. Harrison, Mary Ellen E. Dick:
An investigation of microcomputer policies in large organizations. Inf. Manag. 12(5): 223-233 (1987) - 1984
- [j1]Robert G. Felix, William L. Harrison:
Project Management Considerations for Distributed Processing Applications. MIS Q. 8(3): 161-170 (1984)
Conference and Workshop Papers
- 2023
- [c32]William L. Harrison, Ian Blumenfeld, Eric Bond, Chris Hathhorn, Paul Li, May Torrence, Jared Ziegler:
Formalized High Level Synthesis with Applications to Cryptographic Hardware. NFM 2023: 332-352 - 2021
- [c31]William L. Harrison, Chris Hathhorn, Gerard Allwein:
A Mechanized Semantic Metalanguage for High Level Synthesis. PPDP 2021: 22:1-22:14 - 2020
- [c30]William L. Harrison, Gerard Allwein:
Verifiable Security Templates for Hardware. DATE 2020: 658-661 - [c29]Thomas N. Reynolds, William L. Harrison, Rohit Chadha, Gerard Allwein:
Strongly bounded termination with applications to security and hardware synthesis. TyDe@ICFP 2020: 1-10 - 2018
- [c28]William L. Harrison, Gerard Allwein:
Language Abstractions for Hardware-based Control-Flow Integrity Monitoring. ReConFig 2018: 1-6 - [c27]William L. Harrison, Gerard Allwein:
Semantics-Directed Prototyping of Hardware Runtime Monitors. RSP 2018: 42-48 - 2017
- [c26]Thomas N. Reynolds, Adam M. Procter, William L. Harrison, Gerard Allwein:
A core calculus for secure hardware: its formal semantics and proof system. MEMOCODE 2017: 122-131 - 2016
- [c25]William L. Harrison, Ian Graves, Adam M. Procter, Michela Becchi, Gerard Allwein:
A programming model for reconfigurable computing based in functional concurrency. ReCoSoC 2016: 1-8 - [c24]William L. Harrison, Adam M. Procter, Gerard Allwein:
Model-driven design & synthesis of the SHA-256 cryptographic hash function in rewire. RSP 2016: 114-120 - 2015
- [c23]Ian Graves, Adam M. Procter, William L. Harrison, Michela Becchi, Gerard Allwein:
Hardware Synthesis from Functional Embedded Domain-Specific Languages: A Case Study in Regular Expression Compilation. ARC 2015: 41-52 - [c22]Ian Graves, Adam M. Procter, William L. Harrison, Gerard Allwein:
Provably Correct Development of reconfigurable hardware designs via equational reasoning. FPT 2015: 160-171 - [c21]Adam M. Procter, William L. Harrison, Ian Graves, Michela Becchi, Gerard Allwein:
Semantics Driven Hardware Design, Implementation, and Verification with ReWire. LCTES 2015: 13:1-13:10 - 2013
- [c20]Adam M. Procter, William L. Harrison, Ian Graves, Michela Becchi, Gerard Allwein:
Semantics-directed machine architecture in ReWire. FPT 2013: 446-449 - 2012
- [c19]William L. Harrison, Adam M. Procter, Gerard Allwein:
The Confinement Problem in the Presence of Faults. ICFEM 2012: 182-197 - [c18]Adam M. Procter, William L. Harrison, Aaron Stump:
The Design of a Practical Proof Checker for a Lazy Functional Language. Trends in Functional Programming 2012: 117-132 - [c17]Chris Hathhorn, Michela Becchi, William L. Harrison, Adam M. Procter:
Formal Semantics of Heterogeneous CUDA-C: A Modular Approach with Applications. SSV 2012: 115-124 - 2010
- [c16]Gerard Allwein, William L. Harrison:
Partially-ordered Modalities. Advances in Modal Logic 2010: 1-21 - 2009
- [c15]William L. Harrison, Adam M. Procter, Jason Agron, Garrin Kimmell, Gerard Allwein:
Model-Driven Engineering from Modular Monadic Semantics: Implementation Techniques Targeting Hardware and Software. DSL 2009: 20-44 - 2008
- [c14]Pericles S. Kariotis, Adam M. Procter, William L. Harrison:
Making monads first-class with template haskell. Haskell 2008: 99-110 - [c13]William L. Harrison, Gerard Allwein, Andy Gill, Adam M. Procter:
Asynchronous Exceptions as an Effect. MPC 2008: 153-176 - 2006
- [c12]William L. Harrison:
The Essence of Multitasking. AMAST 2006: 158-172 - [c11]William L. Harrison:
Proof Abstraction for Imperative Languages. APLAS 2006: 97-113 - 2005
- [c10]William L. Harrison:
A Simple Semantics for Polymorphic Recursion. APLAS 2005: 37-51 - [c9]Xuezheng Fu, Hao Wang, William L. Harrison, Robert W. Harrison:
RNA Pseudoknot Prediction Using Term Rewriting. BIBE 2005: 169-176 - [c8]William L. Harrison, James Hook:
Achieving Information Flow Security through Precise Control of Effects. CSFW 2005: 16-30 - 2002
- [c7]William L. Harrison, Tim Sheard, James Hook:
Fine Control of Demand in Haskell. MPC 2002: 68-93 - 2001
- [c6]William L. Harrison, Tim Sheard:
Dynamically Adaptable Software with Metacomputations in a Staged Language. SAIG 2001: 163-182 - 2000
- [c5]William L. Harrison, Samuel N. Kamin:
Metacomputation-Based Compiler Architecture. MPC 2000: 213-229 - 1998
- [c4]William L. Harrison, Samuel N. Kamin:
Modular Compilers Based on Monad Transformers. ICCL 1998: 122-131 - 1995
- [c3]Huey-Wen Chou, James R. Coakley, William L. Harrison:
End User Computing Management Practice s in Taiwan and the U.S. PACIS 1995: 96 - 1992
- [c2]William L. Harrison, Myla Archer, Karl N. Levitt:
A HOL Mechanisation of the Axiomatic Semantics of a Simple Distributed Programming Language. TPHOLs 1992: 347-356 - 1991
- [c1]William L. Harrison, Karl N. Levitt:
Mechanizing Security in HOL. TPHOLs 1991: 63-66
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-17 23:40 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint