default search action
Gregory Malecha
Person information
- affiliation: BedRock Systems, Menlo Park, USA
- affiliation (former): Harvard University, Cambridge, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j6]Gregory Malecha, Gordon Stewart, Frantisek Farka, Jasper Haag, Yoichi Hirai:
Developing With Formal Methods at BedRock Systems, Inc. IEEE Secur. Priv. 20(3): 33-42 (2022) - 2021
- [i3]Gopal Sarma, James Koppel, Gregory Malecha, Patrick Schultz, Eric Drexler, Ramana Kumar, Cody Roux, Philip Zucker:
Formal Methods for the Informal Engineer: Workshop Recommendations. CoRR abs/2104.00739 (2021) - 2020
- [j5]Matthieu Sozeau, Abhishek Anand, Simon Boulier, Cyril Cohen, Yannick Forster, Fabian Kunze, Gregory Malecha, Nicolas Tabareau, Théo Winterhalter:
The MetaCoq Project. J. Autom. Reason. 64(5): 947-999 (2020) - [j4]Li-yao Xia, Yannick Zakowski, Paul He, Chung-Kil Hur, Gregory Malecha, Benjamin C. Pierce, Steve Zdancewic:
Interaction trees: representing recursive and impure programs in Coq. Proc. ACM Program. Lang. 4(POPL): 51:1-51:32 (2020)
2010 – 2019
- 2019
- [i2]Li-yao Xia, Yannick Zakowski, Paul He, Chung-Kil Hur, Gregory Malecha, Benjamin C. Pierce, Steve Zdancewic:
Interaction Trees: Representing Recursive and Impure Programs in Coq (Work In Progress). CoRR abs/1906.00046 (2019) - 2016
- [c15]Gregory Malecha, Daniel Ricketts, Mario M. Alvarez, Sorin Lerner:
Towards foundational verification of cyber-physical systems. SOSCYPS@CPSWeek 2016: 1-5 - [c14]Daniel Ricketts, Gregory Malecha, Sorin Lerner:
Modular deductive verification of sampled-data systems. EMSOFT 2016: 17:1-17:10 - [c13]Gregory Malecha, Jesper Bengtson:
Extensible and Efficient Automation Through Reflective Tactics. ESOP 2016: 532-559 - 2015
- [c12]Gregory Malecha, Ryan Wisnesky:
Using dependent types and tactics to enable semantic optimization of language-integrated queries. DBPL 2015: 49-58 - [c11]Daniel Ricketts, Gregory Malecha, Mario M. Alvarez, Vignesh Gowda, Sorin Lerner:
Towards verification of hybrid systems in a foundational proof assistant. MEMOCODE 2015: 248-257 - [c10]Gregory Malecha, Ashish Gehani, Natarajan Shankar:
Automated software winnowing. SAC 2015: 1504-1511 - 2014
- [c9]Gregory Malecha, Adam Chlipala, Thomas Braibant:
Compositional Computational Reflection. ITP 2014: 374-389 - 2013
- [i1]Gregory Malecha, Adam Chlipala, Thomas Braibant, Patrick Hulin, Edward Z. Yang:
MirrorShard: Proof by Computational Reflection with Verified Hints. CoRR abs/1305.6543 (2013) - 2012
- [c8]Udit Dhawan, Albert Kwon, Edin Kadric, Catalin Hritcu, Benjamin C. Pierce, Jonathan M. Smith, André DeHon, Gregory Malecha, Greg Morrisett, Thomas F. Knight Jr., Andrew Sutherland, Tom Hawkins, Amanda Zyxnfryx, David K. Wittenberg, Peter Trei, Sumit Ray, Greg Sullivan:
Hardware Support for Safety Interlocks and Introspection. SASO Workshops 2012: 1-8 - 2011
- [j3]Gregory Malecha, Greg Morrisett, Ryan Wisnesky:
Trace-based verification of imperative programs with I/O. J. Symb. Comput. 46(2): 95-118 (2011) - [j2]Cherif R. Salama, Gregory Malecha, Walid Taha, Jim Grundy, John O'Leary:
Static consistency checking for Verilog wire interconnects - Using dependent types to check the sanity of Verilog descriptions. High. Order Symb. Comput. 24(1-2): 81-114 (2011) - [c7]André DeHon, Ben Karel, Thomas F. Knight Jr., Gregory Malecha, Benoît Montagu, Robin Morisset, Greg Morrisett, Benjamin C. Pierce, Randy Pollack, Sumit Ray, Olin Shivers, Jonathan M. Smith, Gregory Sullivan:
Preliminary design of the SAFE platform. PLOS@SOSP 2011: 4:1-4:5 - 2010
- [j1]Jennifer Gillenwater, Gregory Malecha, Cherif R. Salama, Angela Yun Zhu, Walid Taha, Jim Grundy, John O'Leary:
Synthesizable High Level Hardware Descriptions. New Gener. Comput. 28(4): 339-369 (2010) - [c6]J. Gregory Malecha, Greg Morrisett:
Mechanized Verification with Sharing. ICTAC 2010: 245-259 - [c5]Gregory Malecha, Stephen Chong:
A more precise security type system for dynamic security tests. PLAS 2010: 4 - [c4]J. Gregory Malecha, Greg Morrisett, Avraham Shinnar, Ryan Wisnesky:
Toward a verified relational database management system. POPL 2010: 237-248
2000 – 2009
- 2009
- [c3]Adam Chlipala, J. Gregory Malecha, Greg Morrisett, Avraham Shinnar, Ryan Wisnesky:
Effective interactive proofs for higher-order imperative programs. ICFP 2009: 79-90 - [c2]Cherif R. Salama, Gregory Malecha, Walid Taha, Jim Grundy, John O'Leary:
Static consistency checking for verilog wire interconnects: using dependent types to check the sanity of verilog descriptions. PEPM 2009: 121-130 - 2008
- [c1]Jennifer Gillenwater, Gregory Malecha, Cherif R. Salama, Angela Yun Zhu, Walid Taha, Jim Grundy, John O'Leary:
Synthesizable high level hardware descriptions: using statically typed two-level languages to guarantee verilog synthesizability. PEPM 2008: 41-50
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint