default search action
Glenn Bruns
Person information
- affiliation: Bell Labs
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c26]Glenn Bruns, Michael Haidar:
Neural Bookmarks: Information Retrieval with Deep Learning and EEG Data. AAAI 2024: 22864-22870 - 2023
- [i3]Glenn Bruns, Mauricio Cortes:
A Logical Way to Negotiate Services. CoRR abs/2307.02703 (2023) - [i2]Glenn Bruns, Michael Haidar, Federico Rubino:
Neural Memory Decoding with EEG Data and Representation Learning. CoRR abs/2307.13181 (2023) - [i1]Glenn Bruns:
User-Driven Abstraction for Model Checking. CoRR abs/2307.15820 (2023)
2010 – 2019
- 2019
- [c25]Jose Mijangos, Glenn Bruns:
Assessing Wireless Data Services with Machine Learning and Geostatistics. ICMLA 2019: 549-554 - 2014
- [j8]Matthew Andrews, Glenn Bruns, Mustafa K. Dogru, Hyoseop Lee:
Understanding Quota Dynamics in Wireless Networks. ACM Trans. Internet Techn. 14(2-3): 14:1-14:17 (2014) - [c24]Matthew Andrews, Glenn Bruns, Hyoseop Lee:
Calculating the benefits of sponsored data for an individual content provider. CISS 2014: 1-6 - 2012
- [c23]Glenn Bruns, Philip W. L. Fong, Ida Sri Rejeki Siahaan, Michael Huth:
Relationship-based access control: its expression and enforcement through hybrid logic. CODASPY 2012: 117-124 - 2011
- [j7]Glenn Bruns, Michael Huth:
Access control via belnap logic: Intuitive, expressive, and analyzable policy composition. ACM Trans. Inf. Syst. Secur. 14(1): 9:1-9:27 (2011) - [c22]Glenn Bruns, Mauricio Cortes:
A Hierarchical Approach to Service Negotiation. ICWS 2011: 460-467 - [c21]Glenn Bruns, Michael Huth, Kumar Avijit:
Program synthesis in administration of higher-order permissions. SACMAT 2011: 41-50
2000 – 2009
- 2008
- [c20]Glenn Bruns, Michael Huth:
Access-Control Policies via Belnap Logic: Effective and Efficient Composition and Analysis. CSF 2008: 163-176 - 2007
- [c19]Glenn Bruns, Daniel S. Dantas, Michael Huth:
A simple and expressive semantic framework for policy composition in access control. FMSE 2007: 12-21 - 2006
- [c18]Michael Benedikt, Philip Bohannon, Glenn Bruns:
Data Cleaning for Decision Support. CleanDB 2006 - 2005
- [c17]Glenn Bruns:
Foundations for Features. FIW 2005: 3-11 - 2004
- [c16]Michael Benedikt, Glenn Bruns:
On Guard: Producing Run-Time Checks from Integrity Constraints. AMAST 2004: 27-41 - [c15]Glenn Bruns, Radha Jagadeesan, Alan Jeffrey, James Riely:
µABC: A Minimal Aspect Calculus. CONCUR 2004: 209-224 - [c14]Glenn Bruns, Patrice Godefroid:
Model Checking with Multi-valued Logics. ICALP 2004: 281-293 - 2003
- [j6]Glenn Bruns, Satish Chandra:
Searching for Points-To Analysis. IEEE Trans. Software Eng. 29(10): 883-897 (2003) - 2002
- [c13]Glenn Bruns, Satish Chandra:
Searching for points-to analysis. SIGSOFT FSE 2002: 61-70 - 2001
- [c12]Glenn Bruns, Patrice Godefroid:
Temporal Logic Query Checking. LICS 2001: 409-417 - 2000
- [j5]Glenn Bruns, Alan E. Frey, Peter Mataga, Susan J. Tripp:
Automated software development with XML and the Java* language. Bell Labs Tech. J. 5(2): 32-43 (2000) - [c11]Glenn Bruns, Patrice Godefroid:
Generalized Model Checking: Reasoning about Partial State Spaces. CONCUR 2000: 168-182
1990 – 1999
- 1999
- [j4]David L. Atkins, Thomas Ball, Glenn Bruns, Kenneth C. Cox:
Mawl: A Domain-Specific Language for Form-Based Services. IEEE Trans. Software Eng. 25(3): 334-346 (1999) - [c10]Glenn Bruns, Patrice Godefroid:
Model Checking Partial State Spaces with 3-Valued Temporal Logics. CAV 1999: 274-287 - 1998
- [c9]Glenn Bruns, Peter Mataga, Ian Sutherland:
Features as Service Transformations. FIW 1998: 85-97 - [c8]Glenn Bruns, Mark G. Staskauskas:
Applying Formal Methods to a Protocol Standard and its Implementations. PDSE 1998: 198- - 1997
- [j3]Glenn Bruns:
An Industrial Application of Modal Process Logic. Sci. Comput. Program. 29(1-2): 3-22 (1997) - [c7]Glenn Bruns, Ian Sutherland:
Model Checking and Fault Tolerance. AMAST 1997: 45-59 - [c6]David L. Atkins, Thomas Ball, Michael Benedikt, Glenn Bruns, Kenneth C. Cox, Peter Mataga, Kenneth Rehor:
Experience with a Domain Specific Language for Form-based Services. DSL 1997: 37-50 - 1996
- [j2]Javier Esparza, Glenn Bruns:
Trapping Mutual Exclusion in the Box Calculus. Theor. Comput. Sci. 153(1&2): 95-128 (1996) - 1994
- [j1]Glenn Bruns, Stuart Anderson:
The Formalization and Analysis of a Communications Protocol. Formal Aspects Comput. 6(1): 92-112 (1994) - 1993
- [c5]Glenn Bruns:
A Practical Technique for Process Abstraction. CONCUR 1993: 37-49 - [c4]Glenn Bruns, Stuart Anderson:
Validating Safety Models with Fault Trees. SAFECOMP 1993: 21-30 - 1992
- [c3]Glenn Bruns:
A Case Study in Safety-Critical Design. CAV 1992: 220-233
1980 – 1989
- 1989
- [c2]Paul C. Attie, Glenn Bruns, Michael Evangelist, Charles Richter, Vincent Y. Shen:
Vanna: a visual environment for the design of distributed systems. TRI-Ada 1989: 546-553 - 1988
- [c1]Colin Potts, Glenn Bruns:
Recording the Reasons for Design Decisions. ICSE 1988: 418-427
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-10 21:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint