default search action
James Parker
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c16]Daniel Luick, John C. Kolesar, Timos Antonopoulos, William R. Harris, James Parker, Ruzica Piskac, Eran Tromer, Xiao Wang, Ning Luo:
ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge. USENIX Security Symposium 2024 - 2023
- [c15]Santiago Cuéllar, Bill Harris, James Parker, Stuart Pernsteiner, Eran Tromer:
Cheesecloth: Zero-Knowledge Proofs of Real World Vulnerabilities. USENIX Security Symposium 2023: 6525-6540 - [i7]Santiago Cuéllar, Bill Harris, James Parker, Stuart Pernsteiner, Eran Tromer:
Cheesecloth: Zero-Knowledge Proofs of Real-World Vulnerabilities. CoRR abs/2301.01321 (2023) - [i6]Daniel Luick, John C. Kolesar, Timos Antonopoulos, William R. Harris, James Parker, Ruzica Piskac, Eran Tromer, Xiao Wang, Ning Luo:
ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge. IACR Cryptol. ePrint Arch. 2023: 1762 (2023) - 2022
- [c14]Kelsey R. Fulton, Daniel Votipka, Desiree Abrokwa, Michelle L. Mazurek, Michael Hicks, James Parker:
Understanding the How and the Why: Exploring Secure Development Practices through a Course Competition. CCS 2022: 1141-1155 - [c13]Sankha Narayan Guria, Niki Vazou, Marco Guarnieri, James Parker:
ANOSY: approximated knowledge synthesis with refinement types for declassification. PLDI 2022: 15-30 - [i5]Sankha Narayan Guria, Niki Vazou, Marco Guarnieri, James Parker:
ANOSY: Approximated Knowledge Synthesis with Refinement Types for Declassification. CoRR abs/2203.12069 (2022) - 2021
- [c12]Marc B. Rosen, James Parker, Alex J. Malozemoff:
Balboa: Bobbing and Weaving around Network Censorship. USENIX Security Symposium 2021: 3399-3413 - [i4]Marc B. Rosen, James Parker, Alex J. Malozemoff:
Balboa: Bobbing and Weaving around Network Censorship. CoRR abs/2104.05871 (2021) - 2020
- [b1]James Parker:
Advanced Language-based Techniques for Correct, Secure Networked Systems. University of Maryland, College Park, MD, USA, 2020 - [j15]Yiyun Liu, James Parker, Patrick Redmond, Lindsey Kuper, Michael Hicks, Niki Vazou:
Verifying replicated data types with typeclass refinements in Liquid Haskell. Proc. ACM Program. Lang. 4(OOPSLA): 216:1-216:30 (2020) - [j14]James Parker, Michael Hicks, Andrew Ruef, Michelle L. Mazurek, Dave Levin, Daniel Votipka, Piotr Mardziel, Kelsey R. Fulton:
Build It, Break It, Fix It: Contesting Secure Development. ACM Trans. Priv. Secur. 23(2): 10:1-10:36 (2020) - [j13]Daniel Votipka, Kelsey R. Fulton, James Parker, Matthew Hou, Michelle L. Mazurek, Michael Hicks:
Build It, Break It, Fix It Contests: Motivated Developers Still Make Security Mistakes. login Usenix Mag. 45(4) (2020) - [c11]Daniel Votipka, Kelsey R. Fulton, James Parker, Matthew Hou, Michelle L. Mazurek, Michael Hicks:
Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It. USENIX Security Symposium 2020: 109-126
2010 – 2019
- 2019
- [j12]James Parker, Niki Vazou, Michael Hicks:
LWeb: information flow security for multi-tier web applications. Proc. ACM Program. Lang. 3(POPL): 75:1-75:30 (2019) - [i3]James Parker, Niki Vazou, Michael Hicks:
LWeb: Information Flow Security for Multi-tier Web Applications. CoRR abs/1901.07665 (2019) - [i2]James Parker, Michael Hicks, Andrew Ruef, Michelle L. Mazurek, Dave Levin, Daniel Votipka, Piotr Mardziel, Kelsey R. Fulton:
Build It, Break It, Fix It: Contesting Secure Development. CoRR abs/1907.01679 (2019) - 2018
- [j11]James Parker, Alessandro Farinelli, Maria L. Gini:
Lazy max-sum for allocation of tasks with growing costs. Robotics Auton. Syst. 110: 44-56 (2018) - 2017
- [j10]Antanas Verikas, James Parker, Marija Bacauskiene, Charlotte Olsson:
Exploring relations between EMG and biomechanical data recorded during a golf swing. Expert Syst. Appl. 88: 109-117 (2017) - 2016
- [j9]James Parker, Ernesto Nunes, Julio Godoy, Maria L. Gini:
Exploiting Spatial Locality and Heterogeneity of Agents for Search and Rescue Teamwork. J. Field Robotics 33(7): 877-900 (2016) - [j8]Antanas Verikas, Evaldas Vaiciukynas, Adas Gelzinis, James Parker, Charlotte Olsson:
Electromyographic Patterns during Golf Swing: Activation Sequence Profiling and Prediction of Shot Effectiveness. Sensors 16(4): 592 (2016) - [c10]Andrew Ruef, Michael W. Hicks, James Parker, Dave Levin, Michelle L. Mazurek, Piotr Mardziel:
Build It, Break It, Fix It: Contesting Secure Development. CCS 2016: 690-703 - [c9]James Parker, Alessandro Farinelli, Maria L. Gini:
Max-Sum for Allocation of Changing Cost Tasks. IAS 2016: 629-642 - [c8]James Parker, Maria L. Gini:
Controlling Growing Tasks with Heterogeneous Agents. IJCAI 2016: 461-467 - [i1]Andrew Ruef, Michael W. Hicks, James Parker, Dave Levin, Michelle L. Mazurek, Piotr Mardziel:
Build It, Break It, Fix It: Contesting Secure Development. CoRR abs/1606.01881 (2016) - 2015
- [j7]Sylvester James Gates Jr., James Parker, Vincent G. J. Rodgers, Leo Rodriguez, Kory Stiffler:
An Extended Detailed Investigation of First and Second Order Supersymmetries for Off-Shell N = 2 and N = 4 Supermultiplets. Symmetry 7(2): 1080-1121 (2015) - 2014
- [c7]James Parker, Maria L. Gini:
Tasks with cost growing over time and agent reallocation delays. AAMAS 2014: 381-388 - [c6]James Parker:
Coordination in large scale multi-agent systems for complex environments. AAMAS 2014: 1751-1752 - 2012
- [j6]Wenjia Li, James Parker, Anupam Joshi:
Security Through Collaboration and Trust in MANETs. Mob. Networks Appl. 17(3): 342-352 (2012) - 2011
- [c5]Sohrab Emami, Robert F. Wiser, Ershad Ali, Mark G. Forbes, Michael Q. Gordon, Xiang Guan, Steve Lo, Patrick T. McElwee, James Parker, Jon R. Tani, Jeffrey M. Gilbert, Chinh H. Doan:
A 60GHz CMOS phased-array transceiver pair for multi-Gb/s wireless communications. ISSCC 2011: 164-166 - 2010
- [j5]Chris Marriott, James Parker, Jörg Denzinger:
Imitation as a Mechanism of Cultural Transmission. Artif. Life 16(1): 21-37 (2010)
2000 – 2009
- 2008
- [c4]Wenjia Li, James Parker, Anupam Joshi:
Security through Collaboration in MANETs. CollaborateCom 2008: 696-714 - 2006
- [c3]David A. Yokoyama-Martin, Kannan Krishna, John T. Stonick, Aaron Caffee, E. K. Gamble, Chris Jones, J. Mcneal, James Parker, Ross Segelken, Jeff L. Sonntag, K. Umino, J. Upton, Daniel Weinlader, Skye Wolfer:
A Multi-Standard Low Power 1.5-3.125 Gb/s Serial Transceiver in 90nm CMOS. CICC 2006: 401-404 - 2005
- [j4]Kannan Krishna, David A. Yokoyama-Martin, Aaron Caffee, Chris Jones, Mat Loikkanen, James Parker, Ross Segelken, Jeff L. Sonntag, John T. Stonick, Steve Titus, Daniel Weinlader, Skye Wolfer:
A multigigabit backplane transceiver core in 0.13-μm CMOS with a power-efficient equalization architecture. IEEE J. Solid State Circuits 40(12): 2658-2666 (2005) - 2004
- [c2]James Parker, Jeffrey Undercoffer, John Pinkston, Anupam Joshi:
On intrusion detection and response for mobile ad hoc networks. IPCCC 2004: 747-752
1990 – 1999
- 1998
- [j3]Rajeev Rastogi, Philip Bohannon, James Parker, Abraham Silberschatz, S. Seshadri, S. Sudarshan:
Distributed Multi-Level Recovery in Main-Memory Databases. Distributed Parallel Databases 6(1): 41-71 (1998) - 1996
- [j2]Colin C. McAndrew, Jerold A. Seitchik, Derek F. Bowers, Mark Dunn, Mark Foisy, Ian Getreu, Marc McSwain, Shahriar Moinian, James Parker, David J. Roulston, Michael Schröter, Paul van Wijnen, Lawrence F. Wagner:
VBIC95, the vertical bipolar inter-company model. IEEE J. Solid State Circuits 31(10): 1476-1483 (1996) - [c1]Philip Bohannon, James Parker, Rajeev Rastogi, S. Seshadri, Abraham Silberschatz, S. Sudarshan:
Distributed Multi-Level Recovery in Main-Memory Databases. PDIS 1996: 44-55 - 1995
- [j1]Ernst Munter, James Parker, Paul Kirkby:
A high-capacity ATM switch based on advanced electronic and optical technologies. IEEE Commun. Mag. 33(11): 64-71 (1995)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-24 20:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint