default search action
Gerard Allwein
Person information
- affiliation: US Naval Research Laboratory, Washington, DC, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c23]William L. Harrison, Chris Hathhorn, Gerard Allwein:
A Mechanized Semantic Metalanguage for High Level Synthesis. PPDP 2021: 22:1-22:14 - 2020
- [c22]William L. Harrison, Gerard Allwein:
Verifiable Security Templates for Hardware. DATE 2020: 658-661 - [c21]Thomas N. Reynolds, William L. Harrison, Rohit Chadha, Gerard Allwein:
Strongly bounded termination with applications to security and hardware synthesis. TyDe@ICFP 2020: 1-10
2010 – 2019
- 2019
- [j9]Thomas N. Reynolds, Adam M. Procter, William L. Harrison, Gerard Allwein:
The Mechanized Marriage of Effects and Monads with Applications to High-assurance Hardware. ACM Trans. Embed. Comput. Syst. 18(1): 6:1-6:26 (2019) - 2018
- [c20]William L. Harrison, Gerard Allwein:
Language Abstractions for Hardware-based Control-Flow Integrity Monitoring. ReConFig 2018: 1-6 - [c19]William L. Harrison, Gerard Allwein:
Semantics-Directed Prototyping of Hardware Runtime Monitors. RSP 2018: 42-48 - 2017
- [j8]Adam M. Procter, William L. Harrison, Ian Graves, Michela Becchi, Gerard Allwein:
A Principled Approach to Secure Multi-core Processor Design with ReWire. ACM Trans. Embed. Comput. Syst. 16(2): 33:1-33:25 (2017) - [c18]Thomas N. Reynolds, Adam M. Procter, William L. Harrison, Gerard Allwein:
A core calculus for secure hardware: its formal semantics and proof system. MEMOCODE 2017: 122-131 - 2016
- [c17]William L. Harrison, Ian Graves, Adam M. Procter, Michela Becchi, Gerard Allwein:
A programming model for reconfigurable computing based in functional concurrency. ReCoSoC 2016: 1-8 - [c16]William L. Harrison, Adam M. Procter, Gerard Allwein:
Model-driven design & synthesis of the SHA-256 cryptographic hash function in rewire. RSP 2016: 114-120 - 2015
- [c15]Ian Graves, Adam M. Procter, William L. Harrison, Michela Becchi, Gerard Allwein:
Hardware Synthesis from Functional Embedded Domain-Specific Languages: A Case Study in Regular Expression Compilation. ARC 2015: 41-52 - [c14]Ian Graves, Adam M. Procter, William L. Harrison, Gerard Allwein:
Provably Correct Development of reconfigurable hardware designs via equational reasoning. FPT 2015: 160-171 - [c13]Adam M. Procter, William L. Harrison, Ian Graves, Michela Becchi, Gerard Allwein:
Semantics Driven Hardware Design, Implementation, and Verification with ReWire. LCTES 2015: 13:1-13:10 - 2013
- [c12]Pedro N. Safier, Ira S. Moskowitz, Gerard Allwein:
Capacity of an intensity interferometry channel. CISS 2013: 1-6 - [c11]Adam M. Procter, William L. Harrison, Ian Graves, Michela Becchi, Gerard Allwein:
Semantics-directed machine architecture in ReWire. FPT 2013: 446-449 - 2012
- [c10]William L. Harrison, Adam M. Procter, Gerard Allwein:
The Confinement Problem in the Presence of Faults. ICFEM 2012: 182-197 - 2010
- [j7]Keye Martin, Ira S. Moskowitz, Gerard Allwein:
Algebraic information theory for binary channels. Theor. Comput. Sci. 411(19): 1918-1927 (2010) - [c9]Gerard Allwein, William L. Harrison:
Partially-ordered Modalities. Advances in Modal Logic 2010: 1-21
2000 – 2009
- 2009
- [c8]William L. Harrison, Adam M. Procter, Jason Agron, Garrin Kimmell, Gerard Allwein:
Model-Driven Engineering from Modular Monadic Semantics: Implementation Techniques Targeting Hardware and Software. DSL 2009: 20-44 - 2008
- [j6]J. McDermott, Gerard Allwein:
A formalism for visual security protocol modeling. J. Vis. Lang. Comput. 19(2): 153-181 (2008) - [c7]William L. Harrison, Gerard Allwein, Andy Gill, Adam M. Procter:
Asynchronous Exceptions as an Effect. MPC 2008: 153-176 - 2006
- [c6]Keye Martin, Ira S. Moskowitz, Gerard Allwein:
Algebraic Information Theory For Binary Channels. MFPS 2006: 289-306 - 2004
- [j5]Gerard Allwein, Hilmi Demir, Lee Pike:
Logics for Classes of Boolean Monoids. J. Log. Lang. Inf. 13(3): 241-266 (2004) - [j4]Nik Swoboda, Gerard Allwein:
Using DAG transformations to verify Euler/Venn homogeneous and Euler/Venn FOL heterogeneous rules of inference. Softw. Syst. Model. 3(2): 136-149 (2004) - [c5]Benedek Nagy, Gerard Allwein:
Diagrams and Non-monotonicity in Puzzles. Diagrams 2004: 82-96 - [c4]Gerard Allwein:
A qualitative framework for Shannon information theories. NSPW 2004: 23-31 - [c3]Nik Swoboda, Gerard Allwein:
Heterogeneous Reasoning with Euler/Venn Diagrams Containing Named Constants and FOL. Euler 2004: 153-187 - 2002
- [c2]Nik Swoboda, Gerard Allwein:
Modeling Heterogeneous Systems. Diagrams 2002: 131-145 - [c1]Nik Swoboda, Gerard Allwein:
Using DAG Transformations to Verify Euler/Venn Homogeneous and Euler/Venn FOL Heterogeneous Rules of Inference. GT-VMT@ICGT 2002: 78-92 - [p1]Bernd Meyer, Kim Marriott, Gerard Allwein:
Intelligent Diagrammatic Interfaces: State of the Art. Diagrammatic Representation and Reasoning 2002: 411-429 - 2001
- [j3]Gerard Allwein, Wendy MacCaull:
A Kripke Semantics for the Logic of Gelfand Quantales. Stud Logica 68(2): 173-228 (2001)
1990 – 1999
- 1999
- [j2]Giuseppe De Giacomo, Marie desJardins, Dolores Cañamero, Glenn S. Wasson, Michael L. Littman, Gerard Allwein, Kim Marriott, Bernd Meyer, Barbara Webb, Tom Con:
The AAAI Fall Symposia. AI Mag. 20(3): 87-89 (1999) - 1993
- [j1]Gerard Allwein, J. Michael Dunn:
Kripke Models for Linear Logic. J. Symb. Log. 58(2): 514-545 (1993)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint