default search action
Andrew D. Gordon 0001
Person information
- affiliation: Microsoft Research
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c118]Shraddha Barke, Christian Pölitz, Carina Negreanu, Benjamin Zorn, José Cambronero, Andrew D. Gordon, Vu Le, Elnaz Nouri, Nadia Polikarpova, Advait Sarkar, Brian Slininger, Neil Toronto, Jack Williams:
Solving Data-centric Tasks using Large Language Models. NAACL-HLT (Findings) 2024: 626-638 - [i21]Shraddha Barke, Christian Pölitz, Carina Suzana Negreanu, Benjamin G. Zorn, José Cambronero, Andrew D. Gordon, Vu Le, Elnaz Nouri, Nadia Polikarpova, Advait Sarkar, Brian Slininger, Neil Toronto, Jack Williams:
Solving Data-centric Tasks using Large Language Models. CoRR abs/2402.11734 (2024) - [i20]Ian Drosos, Advait Sarkar, Andrew D. Gordon:
"My toxic trait is thinking I'll remember this": gaps in the learner experience of video tutorials for feature-rich software. CoRR abs/2404.07114 (2024) - [i19]Diana Robinson, Christian Cabrera, Andrew D. Gordon, Neil D. Lawrence, Lars Mennen:
Requirements are All You Need: The Final Frontier for End-User Software Engineering. CoRR abs/2405.13708 (2024) - 2023
- [c117]Michael Xieyang Liu, Advait Sarkar, Carina Negreanu, Benjamin G. Zorn, Jack Williams, Neil Toronto, Andrew D. Gordon:
"What It Wants Me To Say": Bridging the Abstraction Gap Between End-User Programmers and Code-Generating Large Language Models. CHI 2023: 598:1-598:31 - [c116]Ian Drosos, Nicholas Wilson, Andrew D. Gordon, Sruti Srinivasa Ragavan, Jack Williams:
FxD: a functional debugger for dysfunctional spreadsheets. VL/HCC 2023: 31-40 - [c115]Kasra Ferdowsi, Jack Williams, Ian Drosos, Andrew D. Gordon, Carina Negreanu, Nadia Polikarpova, Advait Sarkar, Benjamin Zorn:
COLDECO: An End User Spreadsheet Inspection Tool for AI-Generated Code. VL/HCC 2023: 82-91 - [i18]Michael Xieyang Liu, Advait Sarkar, Carina Negreanu, Ben Zorn, Jack Williams, Neil Toronto, Andrew D. Gordon:
"What It Wants Me To Say": Bridging the Abstraction Gap Between End-User Programmers and Code-Generating Large Language Models. CoRR abs/2304.06597 (2023) - [i17]Andrew D. Gordon, Carina Negreanu, José Cambronero, Rasika Chakravarthy, Ian Drosos, Hao Fang, Bhaskar Mitra, Hannah Richardson, Advait Sarkar, Stephanie Simmons, Jack Williams, Ben Zorn:
Co-audit: tools to help humans double-check AI-generated content. CoRR abs/2310.01297 (2023) - [i16]Advait Sarkar, Ian Drosos, Rob DeLine, Andrew D. Gordon, Carina Negreanu, Sean Rintel, Jack Williams, Benjamin G. Zorn:
Participatory prompting: a user-centric research method for eliciting AI assistance opportunities in knowledge workflows. CoRR abs/2312.16633 (2023) - 2022
- [j38]Maria I. Gorinova, Andrew D. Gordon, Charles Sutton, Matthijs Vákár:
Conditional Independence by Typing. ACM Trans. Program. Lang. Syst. 44(1): 4:1-4:54 (2022) - [j37]Jack Williams, Andrew D. Gordon:
Where-provenance for bidirectional editing in spreadsheets. J. Comput. Lang. 73: 101155 (2022) - [j36]Shuang Chen, Alperen Karaoglu, Carina Negreanu, Tingting Ma, Jin-Ge Yao, Jack Williams, Feng Jiang, Andy Gordon, Chin-Yew Lin:
LinkingPark: An automatic semantic table interpretation system. J. Web Semant. 74: 100733 (2022) - [c114]Sruti Srinivasa Ragavan, Zhitao Hou, Yun Wang, Andrew D. Gordon, Haidong Zhang, Dongmei Zhang:
GridBook: Natural Language Formulas for the Spreadsheet Grid. IUI 2022: 345-368 - [c113]Advait Sarkar, Carina Negreanu, Ben Zorn, Sruti Srinivasa Ragavan, Christian Pölitz, Andrew D. Gordon:
What is it like to program with artificial intelligence? PPIG 2022: 127-153 - [c112]Advait Sarkar, Sruti Srinivasa Ragavan, Jack Williams, Andrew D. Gordon:
End-user encounters with lambda abstraction in spreadsheets: Apollo's bow or Achilles' heel? VL/HCC 2022: 1-11 - [c111]Carina Negreanu, Alperen Karaoglu, Jack Williams, Shuang Chen, Daniel Fabian, Andrew D. Gordon, Chin-Yew Lin:
Rows from Many Sources: Enriching row completions from Wikidata with a pre-trained Language Model. WWW (Companion Volume) 2022: 1272-1280 - [i15]Carina Negreanu, Alperen Karaoglu, Jack Williams, Shuang Chen, Daniel Fabian, Andrew D. Gordon, Chin-Yew Lin:
Rows from Many Sources: Enriching row completions from Wikidata with a pre-trained Language Model. CoRR abs/2204.07014 (2022) - [i14]Advait Sarkar, Andrew D. Gordon, Carina Negreanu, Christian Pölitz, Sruti Srinivasa Ragavan, Ben Zorn:
What is it like to program with artificial intelligence? CoRR abs/2208.06213 (2022) - 2021
- [c110]Sruti Srinivasa Ragavan, Advait Sarkar, Andrew D. Gordon:
Spreadsheet Comprehension: Guesswork, Giving Up and Going Back to the Author. CHI 2021: 181:1-181:21 - [c109]Jack Williams, Andrew D. Gordon:
Where-Provenance for Bidirectional Editing in Spreadsheets. VL/HCC 2021: 1-10 - 2020
- [j35]Matt McCutchen, Judith Borghouts, Andrew D. Gordon, Simon Peyton Jones, Advait Sarkar:
Elastic sheet-defined functions: Generalising spreadsheet functions to variable-size input arrays. J. Funct. Program. 30: e26 (2020) - [c108]Nima Joharizadeh, Advait Sarkar, Andrew D. Gordon, Jack Williams:
Gridlets: Reusing Spreadsheet Grids. CHI Extended Abstracts 2020: 1-7 - [c107]Advait Sarkar, Judith W. Borghouts, Anusha Iyer, Sneha Khullar, Christian Canton, Felienne Hermans, Andrew D. Gordon, Jack Williams:
Spreadsheet Use and Programming Experience: An Exploratory Survey. CHI Extended Abstracts 2020: 1-9 - [c106]Jack Williams, Nima Joharizadeh, Andrew D. Gordon, Advait Sarkar:
Higher-Order Spreadsheets with Spilled Arrays. ESOP 2020: 743-769 - [c105]Shuang Chen, Alperen Karaoglu, Carina Negreanu, Tingting Ma, Jin-Ge Yao, Jack Williams, Andy Gordon, Chin-Yew Lin:
LinkingPark: An Integrated Approach for Semantic Table Interpretation. SemTab@ISWC 2020: 65-74 - [c104]Jack Williams, Carina Negreanu, Andrew D. Gordon, Advait Sarkar:
Understanding and Inferring Units in Spreadsheets. VL/HCC 2020: 1-9 - [i13]Irene Vlassi Pandi, Earl T. Barr, Andrew D. Gordon, Charles Sutton:
OptTyper: Probabilistic Type Inference by Optimising Logical and Natural Constraints. CoRR abs/2004.00348 (2020) - [i12]Maria I. Gorinova, Andrew D. Gordon, Charles Sutton, Matthijs Vákár:
Conditional independence by typing. CoRR abs/2010.11887 (2020)
2010 – 2019
- 2019
- [j34]Maria I. Gorinova, Andrew D. Gordon, Charles Sutton:
Probabilistic programming with densities in SlicStan: efficient, flexible, and deterministic. Proc. ACM Program. Lang. 3(POPL): 35:1-35:30 (2019) - [c103]Alan F. Blackwell, Luke Church, Martin Erwig, James Geddes, Andy Gordon, Maria I. Gorinova, Atilim Gunes Baydin, Bradley Gram-Hansen, Tobias Kohn, Neil D. Lawrence, Vikash Mansinghka, Brooks Paige, Tomas Petricek, Diana Robinson, Advait Sarkar, Oliver Strickson:
Usability of Probabilistic Programming Languages. PPIG 2019 - [c102]Judith Borghouts, Andrew D. Gordon, Advait Sarkar, Neil Toronto:
End-User Probabilistic Programming. QEST 2019: 3-24 - [i11]Judith Borghouts, Andrew D. Gordon, Advait Sarkar, Kenton P. O'Hara, Neil Toronto:
Somewhere Around That Number: An Interview Study of How Spreadsheet Users Manage Uncertainty. CoRR abs/1905.13072 (2019) - 2018
- [c101]Advait Sarkar, Andrew D. Gordon:
How do people learn to use spreadsheets? (Work in progress). PPIG 2018 - [c100]Advait Sarkar, Andrew D. Gordon, Simon Peyton Jones, Neil Toronto:
Calculation View: multiple-representation editing in spreadsheets. VL/HCC 2018: 85-93 - [i10]Maria I. Gorinova, Andrew D. Gordon, Charles Sutton:
Probabilistic Programming with Densities in SlicStan: Efficient, Flexible and Deterministic. CoRR abs/1811.00890 (2018) - 2017
- [j33]Sooraj Bhat, Johannes Borgström, Andrew D. Gordon, Claudio V. Russo:
Deriving Probability Density Functions from Probabilistic Functional Programs. Log. Methods Comput. Sci. 13(2) (2017) - [e7]Giuseppe Castagna, Andrew D. Gordon:
Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages, POPL 2017, Paris, France, January 18-20, 2017. ACM 2017, ISBN 978-1-4503-4660-3 [contents] - [i9]Sooraj Bhat, Johannes Borgström, Andrew D. Gordon, Claudio V. Russo:
Deriving Probability Density Functions from Probabilistic Functional Programs. CoRR abs/1704.00917 (2017) - 2016
- [c99]Gilles Barthe, Gian Pietro Farina, Marco Gaboardi, Emilio Jesús Gallego Arias, Andy Gordon, Justin Hsu, Pierre-Yves Strub:
Differentially Private Bayesian Programming. CCS 2016: 68-79 - [c98]Wei Chen, David Aspinall, Andrew D. Gordon, Charles Sutton, Igor Muttik:
Explaining Unwanted Behaviours in Context. IMPS@ESSoS 2016: 38-45 - [c97]Wei Chen, David Aspinall, Andrew D. Gordon, Charles Sutton, Igor Muttik:
A text-mining approach to explain unwanted behaviours. EUROSEC 2016: 4:1-4:6 - [c96]Johannes Borgström, Ugo Dal Lago, Andrew D. Gordon, Marcin Szymczak:
A lambda-calculus foundation for universal probabilistic programming. ICFP 2016: 33-46 - [c95]Wei Chen, David Aspinall, Andrew D. Gordon, Charles Sutton, Igor Muttik:
On Robust Malware Classifiers by Verifying Unwanted Behaviours. IFM 2016: 326-341 - [c94]Johannes Borgström, Andrew D. Gordon, Long Ouyang, Claudio V. Russo, Adam Scibior, Marcin Szymczak:
Fabular: regression formulas as probabilistic programming. POPL 2016: 271-283 - [c93]Wei Chen, David Aspinall, Andrew D. Gordon, Charles Sutton, Igor Muttik:
More Semantics More Robust: Improving Android Malware Classifiers. WISEC 2016: 147-158 - [i8]Gilles Barthe, Gian Pietro Farina, Marco Gaboardi, Emilio Jesús Gallego Arias, Andy Gordon, Justin Hsu, Pierre-Yves Strub:
Differentially Private Bayesian Programming. CoRR abs/1605.00283 (2016) - 2015
- [c92]Andrew D. Gordon, Claudio V. Russo, Marcin Szymczak, Johannes Borgström, Nicolas Rolland, Thore Graepel, Daniel Tarlow:
Probabilistic Programs as Spreadsheet Queries. ESOP 2015: 1-25 - [c91]Adam Scibior, Zoubin Ghahramani, Andrew D. Gordon:
Practical probabilistic programming with monads. Haskell 2015: 165-176 - [c90]Miltiadis Allamanis, Daniel Tarlow, Andrew D. Gordon, Yi Wei:
Bimodal Modelling of Source Code and Natural Language. ICML 2015: 2123-2132 - [i7]Diana Borsa, Thore Graepel, Andrew D. Gordon:
The Wreath Process: A totally generative model of geometric shape based on nested symmetries. CoRR abs/1506.03041 (2015) - [i6]Johannes Borgström, Ugo Dal Lago, Andrew D. Gordon, Marcin Szymczak:
A Lambda-Calculus Foundation for Universal Probabilistic Programming. CoRR abs/1512.08990 (2015) - [i5]Gilles Barthe, Andrew D. Gordon, Joost-Pieter Katoen, Annabelle McIver:
Challenges and Trends in Probabilistic Programming (Dagstuhl Seminar 15181). Dagstuhl Reports 5(4): 123-141 (2015) - 2014
- [j32]François Dupressoir, Andrew D. Gordon, Jan Jürjens, David A. Naumann:
Guiding a general-purpose C verifier to prove cryptographic protocols. J. Comput. Secur. 22(5): 823-866 (2014) - [c89]Andrew D. Gordon, Thomas A. Henzinger, Aditya V. Nori, Sriram K. Rajamani:
Probabilistic programming. FOSE 2014: 167-181 - [c88]Andrew D. Gordon, Thore Graepel, Nicolas Rolland, Claudio V. Russo, Johannes Borgström, John Guiver:
Tabular: a schema-driven probabilistic programming language. POPL 2014: 321-334 - 2013
- [j31]Johannes Borgström, Andrew D. Gordon, Michael Greenberg, James Margetson, Jurgen Van Gael:
Measure Transformer Semantics for Bayesian Machine Learning. Log. Methods Comput. Sci. 9(3) (2013) - [c87]Andrew D. Gordon, Mihhail Aizatulin, Johannes Borgström, Guillaume Claret, Thore Graepel, Aditya V. Nori, Sriram K. Rajamani, Claudio V. Russo:
A model-learner pattern for bayesian reasoning. POPL 2013: 403-416 - [c86]John A. Hewson, Paul Anderson, Andrew D. Gordon:
Constraint-Based Autonomic Reconfiguration. SASO 2013: 101-110 - [c85]Guillaume Claret, Sriram K. Rajamani, Aditya V. Nori, Andrew D. Gordon, Johannes Borgström:
Bayesian inference using data flow analysis. ESEC/SIGSOFT FSE 2013: 92-102 - [c84]Sooraj Bhat, Johannes Borgström, Andrew D. Gordon, Claudio V. Russo:
Deriving Probability Density Functions from Probabilistic Functional Programs. TACAS 2013: 508-522 - [i4]François Dupressoir, Andrew D. Gordon, Jan Jürjens, David A. Naumann:
Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols. CoRR abs/1312.6532 (2013) - 2012
- [j30]Gavin M. Bierman, Andrew D. Gordon, Catalin Hritcu, David E. Langworthy:
Semantic subtyping with an SMT solver. J. Funct. Program. 22(1): 31-105 (2012) - [c83]Mihhail Aizatulin, Andrew D. Gordon, Jan Jürjens:
Computational verification of C protocol implementations by symbolic execution. CCS 2012: 712-723 - [c82]John A. Hewson, Paul Anderson, Andrew D. Gordon:
A Declarative Approach to Automated Configuration. LISA 2012: 51-66 - 2011
- [j29]Johannes Borgström, Andrew D. Gordon, Riccardo Pucella:
Roles, stacks, histories: A triple for Hoare. J. Funct. Program. 21(2): 159-207 (2011) - [j28]Jesper Bengtson, Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Sergio Maffeis:
Refinement types for secure implementations. ACM Trans. Program. Lang. Syst. 33(2): 8:1-8:45 (2011) - [c81]Mihhail Aizatulin, Andrew D. Gordon, Jan Jürjens:
Extracting and verifying cryptographic models from C protocol code by symbolic execution. CCS 2011: 331-340 - [c80]François Dupressoir, Andrew D. Gordon, Jan Jürjens, David A. Naumann:
Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols. CSF 2011: 3-17 - [c79]Ioannis G. Baltopoulos, Johannes Borgström, Andrew D. Gordon:
Maintaining Database Integrity with Refinement Types. ECOOP 2011: 484-509 - [c78]Johannes Borgström, Andrew D. Gordon, Michael Greenberg, James Margetson, Jurgen Van Gael:
Measure Transformer Semantics for Bayesian Machine Learning. ESOP 2011: 77-96 - [c77]Cédric Fournet, Karthikeyan Bhargavan, Andrew D. Gordon:
Cryptographic Verification by Typing for a Sample Protocol Implementation. FOSAD 2011: 66-100 - [c76]Mihhail Aizatulin, François Dupressoir, Andrew D. Gordon, Jan Jürjens:
Verifying Cryptographic Code in C: Some Experience and the Csec Challenge. Formal Aspects in Security and Trust 2011: 1-20 - [c75]Andrew D. Gordon, Robert Harper, John Harrison, Alan Jeffrey, Peter Sewell:
Robin Milner 1934--2010: verification, languages, and concurrency. POPL 2011: 473-474 - [i3]Mihhail Aizatulin, Andrew D. Gordon, Jan Jürjens:
Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution. CoRR abs/1107.1017 (2011) - 2010
- [j27]Moritz Y. Becker, Cédric Fournet, Andrew D. Gordon:
SecPAL: Design and semantics of a decentralized authorization language. J. Comput. Secur. 18(4): 619-665 (2010) - [c74]Gavin M. Bierman, Andrew D. Gordon, Catalin Hritcu, David E. Langworthy:
Semantic subtyping with an SMT solver. ICFP 2010: 105-116 - [c73]Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon:
Modular verification of security protocol code by typing. POPL 2010: 445-456 - [p2]Johannes Borgström, Andrew D. Gordon, Riccardo Pucella:
Roles, Stacks, Histories: A Triple for Hoare. Reflections on the Work of C. A. R. Hoare 2010: 71-99 - [p1]Andrew D. Gordon, Cédric Fournet:
Principles and Applications of Refinement Types. Logics and Languages for Reliability and Security 2010: 73-104 - [e6]Andrew D. Gordon:
Programming Languages and Systems, 19th European Symposium on Programming, ESOP 2010, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2010, Paphos, Cyprus, March 20-28, 2010. Proceedings. Lecture Notes in Computer Science 6012, Springer 2010, ISBN 978-3-642-11956-9 [contents]
2000 – 2009
- 2009
- [c72]Johannes Borgström, Karthikeyan Bhargavan, Andrew D. Gordon:
A compositional theory for STM Haskell. Haskell 2009: 69-80 - [c71]Aybek Mukhamedov, Andrew D. Gordon, Mark Ryan:
Towards a Verified Reference Implementation of a Trusted Platform Module. Security Protocols Workshop 2009: 69-81 - [c70]Ioannis G. Baltopoulos, Andrew D. Gordon:
Secure compilation of a multi-tier web language. TLDI 2009: 27-38 - 2008
- [j26]Luca Aceto, Mario Bravetti, Wan J. Fokkink, Andrew D. Gordon:
Guest Editors' Foreword. J. Log. Algebraic Methods Program. 75(1): 1-2 (2008) - [j25]Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon:
Verifying policy-based web services security. ACM Trans. Program. Lang. Syst. 30(6): 30:1-30:59 (2008) - [j24]Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Stephen Tse:
Verified interoperable implementations of security protocols. ACM Trans. Program. Lang. Syst. 31(1): 5:1-5:61 (2008) - [c69]Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Nikhil Swamy:
Verified implementations of the information card federated identity-management protocol. AsiaCCS 2008: 123-135 - [c68]Karthikeyan Bhargavan, Andrew D. Gordon, Iman Narasamdya:
Service Combinators for Farming Virtual Machines. COORDINATION 2008: 33-49 - [c67]Jesper Bengtson, Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Sergio Maffeis:
Refinement Types for Secure Implementations. CSF 2008: 17-32 - [c66]Sergio Maffeis, Martín Abadi, Cédric Fournet, Andrew D. Gordon:
Code-Carrying Authorization. ESORICS 2008: 563-579 - [c65]Andrew D. Gordon, Hans Hüttel, René Rydhof Hansen:
Type Inference for Correspondence Types. SecCo@CONCUR 2008: 21-36 - 2007
- [j23]Luca Aceto, Mario Bravetti, Wan J. Fokkink, Andrew D. Gordon:
Guest Editors' Foreword. J. Log. Algebraic Methods Program. 70(2): 119-120 (2007) - [j22]Luca Aceto, Mario Bravetti, Wan J. Fokkink, Andrew D. Gordon:
Guest Editors' Foreword. J. Log. Algebraic Methods Program. 72(1): 1-2 (2007) - [j21]Karthikeyan Bhargavan, Ricardo Corin, Cédric Fournet, Andrew D. Gordon:
Secure sessions for Web services. ACM Trans. Inf. Syst. Secur. 10(2): 8 (2007) - [j20]Cédric Fournet, Andrew D. Gordon, Sergio Maffeis:
A type discipline for authorization policies. ACM Trans. Program. Lang. Syst. 29(5): 25 (2007) - [c64]Moritz Y. Becker, Cédric Fournet, Andrew D. Gordon:
Design and Semantics of a Decentralized Authorization Language. CSF 2007: 3-15 - [c63]Cédric Fournet, Andy Gordon, Sergio Maffeis:
A Type Discipline for Authorization in Distributed Systems. CSF 2007: 31-48 - [c62]Karthikeyan Bhargavan, Andrew D. Gordon, Iman Narasamdya:
Service Combinators for Farming Virtual Machines. TGC 2007: 22 - [c61]Johannes Borgström, Andrew D. Gordon, Andrew Phillips:
A Chart Semantics for the Pi-Calculus. EXPRESS 2007: 3-29 - 2006
- [c60]Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Stephen Tse:
Verified Interoperable Implementations of Security Protocols. CSFW 2006: 139-152 - [c59]Andrew D. Gordon:
Provable Implementations of Security Protocols. LICS 2006: 345-346 - [c58]Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon:
Verified Reference Implementations of WS-Security Protocols. WS-FM 2006: 88-106 - [e5]Luca Aceto, Andrew D. Gordon:
Proceedings of the Workshop "Essays on Algebraic Process Calculi", APC 25, Bertinoro, Italy, August 1-5, 2005. Electronic Notes in Theoretical Computer Science 162, Elsevier 2006 [contents] - [e4]Marianne Winslett, Andrew D. Gordon, David Sands:
Proceedings of the 2006 ACM workshop on Formal methods in security engineering, FMSE 2006, Alexandria, VA, USA, November 3, 2006. ACM 2006, ISBN 1-59593-550-9 [contents] - 2005
- [j19]Andrew D. Gordon, Riccardo Pucella:
Validating a web service security abstraction by typing. Formal Aspects Comput. 17(3): 277-318 (2005) - [j18]Luca Cardelli, Giorgio Ghelli, Andrew D. Gordon:
Secrecy and group creation. Inf. Comput. 196(2): 127-155 (2005) - [j17]Cristiano Calcagno, Luca Cardelli, Andrew D. Gordon:
Deciding validity in a spatial logic for trees. J. Funct. Program. 15(4): 543-572 (2005) - [j16]Andrew D. Gordon:
Preface for the Special Issue: Foundations of Software Science and Computation Structures. Theor. Comput. Sci. 333(1-2): 1 (2005) - [j15]Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon:
A semantics for web services authentication. Theor. Comput. Sci. 340(1): 102-153 (2005) - [c57]Andrew D. Gordon, Alan Jeffrey:
Secrecy Despite Compromise: Types, Cryptography, and the Pi-Calculus. CONCUR 2005: 186-201 - [c56]Cédric Fournet, Andrew D. Gordon, Sergio Maffeis:
A Type Discipline for Authorization Policies. ESOP 2005: 141-156 - [c55]Andrew D. Gordon:
From Typed Process Calculi to Source-Based Security. SAS 2005: 2 - [c54]Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Greg O'Shea:
An advisor for web services security policies. SWS 2005: 1-9 - [c53]Luca Aceto, Andrew D. Gordon:
Preface. APC 25 2005: 1-2 - [c52]Andrew D. Gordon:
V for Virtual. APC 25 2005: 177-181 - 2004
- [j14]Andrew D. Gordon, Alan Jeffrey:
Types and effects for asymmetric cryptographic protocols. J. Comput. Secur. 12(3-4): 435-483 (2004) - [c51]Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon:
Verifying policy-based security for web services. CCS 2004: 268-277 - [c50]Frédéric Besson, Tomasz Blanc, Cédric Fournet, Andrew D. Gordon:
From Stack Inspection to Access Control: A Security Analysis for Libraries. CSFW 2004: 61- - [c49]Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon:
A semantics for web services authentication. POPL 2004: 198-209 - [c48]Karthikeyan Bhargavan, Ricardo Corin, Cédric Fournet, Andrew D. Gordon:
Secure sessions for web services. SWS 2004: 56-66 - [i2]Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Riccardo Pucella:
TulaFale: A Security Tool for Web Services. CoRR abs/cs/0412044 (2004) - [i1]Andrew D. Gordon, Riccardo Pucella:
Validating a Web Service Security Abstraction by Typing. CoRR abs/cs/0412045 (2004) - 2003
- [j13]Andrew D. Gordon, Alan Jeffrey:
Authenticity by Typing for Security Protocols. J. Comput. Secur. 11(4): 451-520 (2003) - [j12]Andrew D. Gordon, Luca Cardelli:
Equational Properties Of Mobile Ambients. Math. Struct. Comput. Sci. 13(3): 371-408 (2003) - [j11]Andrew D. Gordon, Alan Jeffrey:
Typing correspondence assertions for communication protocols. Theor. Comput. Sci. 300(1-3): 379-409 (2003) - [j10]Witold Charatonik, Silvano Dal-Zilio, Andrew D. Gordon, Supratik Mukhopadhyay, Jean-Marc Talbot:
Model checking mobile ambients. Theor. Comput. Sci. 308(1-3): 277-331 (2003) - [j9]Cédric Fournet, Andrew D. Gordon:
Stack inspection: Theory and variants. ACM Trans. Program. Lang. Syst. 25(3): 360-399 (2003) - [c47]Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Riccardo Pucella:
TulaFale: A Security Tool for Web Services. FMCO 2003: 197-222 - [c46]Cristiano Calcagno, Luca Cardelli, Andrew D. Gordon:
Deciding validity in a spatial logic for trees. TLDI 2003: 62-73 - [e3]Andrew D. Gordon:
Foundations of Software Science and Computational Structures, 6th International Conference, FOSSACS 2003 Held as Part of the Joint European Conference on Theory and Practice of Software, ETAPS 2003, Warsaw, Poland, April 7-11, 2003, Proceedings. Lecture Notes in Computer Science 2620, Springer 2003, ISBN 3-540-00897-7 [contents] - 2002
- [j8]Luca Cardelli, Giorgio Ghelli, Andrew D. Gordon:
Types for the Ambient Calculus. Inf. Comput. 177(2): 160-194 (2002) - [j7]Silvano Dal-Zilio, Andrew D. Gordon:
Region analysis and a pi-calculus with groups. J. Funct. Program. 12(3): 229-292 (2002) - [c45]Andrew D. Gordon:
Types for Cryptographic Protocols. CONCUR 2002: 99-100 - [c44]Andrew D. Gordon, Alan Jeffrey:
Types and Effects for Asymmetric Cryptographic Protocols. CSFW 2002: 77-91 - [c43]Witold Charatonik, Andrew D. Gordon, Jean-Marc Talbot:
Finite-Control Mobile Ambients. ESOP 2002: 295-313 - [c42]Andy Gordon:
Authenticity Types for Cryptographic Protocols. FASec 2002: 3 - [c41]Andrew D. Gordon:
XML Web Services: The Global Computer? IFIP TCS 2002: 355 - [c40]Andrew D. Gordon, Alan Jeffrey:
Typing One-to-One and One-to-Many Correspondences in Security Protocols. ISSS 2002: 263-282 - [c39]Don Syme, Andrew D. Gordon:
Automating Type Soundness Proofs via Decision Procedures and Guided Reductions. LPAR 2002: 418-434 - [c38]Cédric Fournet, Andrew D. Gordon:
Stack inspection: theory and variants. POPL 2002: 307-318 - [c37]Andrew D. Gordon, Riccardo Pucella:
Validating a Web service security abstraction by typing. XML Security 2002: 18-29 - 2001
- [c36]Andrew D. Gordon, Alan Jeffrey:
Authenticity by Typing for Security Protocols. CSFW 2001: 145-159 - [c35]Witold Charatonik, Silvano Dal-Zilio, Andrew D. Gordon, Supratik Mukhopadhyay, Jean-Marc Talbot:
The Complexity of Model Checking Mobile Ambients. FoSSaCS 2001: 152-167 - [c34]Andrew D. Gordon, Don Syme:
Typing a multi-language intermediate code. POPL 2001: 248-260 - [c33]Andrew D. Gordon:
Types for Cyphers: Thwarting Mischief and Malice with Type Theory. PPDP 2001: 136 - [c32]Andrew D. Gordon, Alan Jeffrey:
A Type and Effect Analysis of Security Protocols. SAS 2001: 432-432 - [c31]Luca Cardelli, Andrew D. Gordon:
Logical Properties of Name Restriction. TLCA 2001: 46-60 - [c30]Andrew D. Gordon, Alan Jeffrey:
Typing Correspondence Assertions for Communication Protocols. MFPS 2001: 119-140 - 2000
- [j6]Luca Cardelli, Andrew D. Gordon:
Mobile ambients. Theor. Comput. Sci. 240(1): 177-213 (2000) - [c29]Luca Cardelli, Giorgio Ghelli, Andrew D. Gordon:
Secrecy and Group Creation. CONCUR 2000: 365-379 - [c28]Andrew D. Gordon:
Notes on Nominal Calculi for Security and Mobility. FOSAD 2000: 262-330 - [c27]Luca Cardelli, Giorgio Ghelli, Andrew D. Gordon:
Ambient Groups and Mobility Types. IFIP TCS 2000: 333-347 - [c26]Silvano Dal-Zilio, Andrew D. Gordon:
Region Analysis and a pi-Calculus wiht Groups. MFCS 2000: 1-20 - [c25]Luca Cardelli, Andrew D. Gordon:
Anytime, Anywhere: Modal Logics for Mobile Ambients. POPL 2000: 365-377 - [c24]Luca Cardelli, Andy Gordon, Giorgio Ghelli:
Secrecy, Group Creation. MFCSIT 2000: 7
1990 – 1999
- 1999
- [j5]Martín Abadi, Andrew D. Gordon:
A Calculus for Cryptographic Protocols: The spi Calculus. Inf. Comput. 148(1): 1-70 (1999) - [j4]Andrew D. Gordon, Paul D. Hankin, Søren B. Lassen:
Compilation and Equivalence of Imperative Objects. J. Funct. Program. 9(4): 373-426 (1999) - [j3]Roy L. Crole, Andrew D. Gordon:
Relating operational and denotational semantics for input/output effects. Math. Struct. Comput. Sci. 9(2): 125-158 (1999) - [j2]Andrew D. Gordon:
Bisimilarity as a Theory of Functional Programming. Theor. Comput. Sci. 228(1-2): 5-47 (1999) - [c23]Andrew D. Gordon, Luca Cardelli:
Equational Properties of Mobile Ambients. FoSSaCS 1999: 212-226 - [c22]Luca Cardelli, Andrew D. Gordon, Giorgio Ghelli:
Mobility Types for Mobile Ambients. ICALP 1999: 230-239 - [c21]Luca Cardelli, Andrew D. Gordon:
Types for Mobile Ambients. POPL 1999: 79-92 - [c20]Andrew D. Gordon, Andrew M. Pitts:
Preface. HOOTS 1999: 1-2 - [e2]Andrew D. Gordon, Andrew M. Pitts:
Third Workshop on Higher-Order Operational Techniques in Semantics, HOOTS 1999, Paris, France, September 30 - October 1, 1999. Electronic Notes in Theoretical Computer Science 26, Elsevier 1999 [contents] - 1998
- [j1]Martín Abadi, Andrew D. Gordon:
A Bisimulation Method for Cryptographic Protocols. Nord. J. Comput. 5(4): 267- (1998) - [c19]Martín Abadi, Andrew D. Gordon:
A Bisimulation Method for Cryptographic Protocols. ESOP 1998: 12-26 - [c18]Luca Cardelli, Andrew D. Gordon:
Mobile Ambients. FoSSaCS 1998: 140-155 - [c17]Andrew D. Gordon, Paul D. Hankin:
A Concurrent Object Calculus: Reduction and Typing. HLCL 1998: 248-264 - 1997
- [c16]Martín Abadi, Andrew D. Gordon:
A Calculus for Cryptographic Protocols: The Spi Calculus. CCS 1997: 36-47 - [c15]Martín Abadi, Andrew D. Gordon:
Reasoning about Cryptographic Protocols in the Spi Calculus. CONCUR 1997: 59-73 - [c14]Andrew D. Gordon, Paul D. Hankin, Søren B. Lassen:
Compilation and Equivalence of Imperative Objects. FSTTCS 1997: 74-87 - [c13]Andrew D. Gordon, Andrew M. Pitts, Carolyn L. Talcott:
Preface. HOOTS 1997: 1 - [c12]Luca Cardelli, Andrew D. Gordon:
Mobile Ambients. HOOTS 1997: 198-201 - [e1]Andrew D. Gordon, Andrew M. Pitts, Carolyn L. Talcott:
Second Workshop on Higher-Order Operational Techniques in Semantics, HOOTS 1997, Stanford, CA, USA, December 8-12, 1997. Electronic Notes in Theoretical Computer Science 10, Elsevier 1997 [contents] - 1996
- [c11]Simon L. Peyton Jones, Andrew D. Gordon, Sigbjørn Finne:
Concurrent Haskell. POPL 1996: 295-308 - [c10]Andrew D. Gordon, Gareth D. Rees:
Bisimilarity for a First-Order Calculus of Objects with Subtyping. POPL 1996: 386-395 - [c9]Andrew D. Gordon, Thomas F. Melham:
Five Axioms of Alpha-Conversion. TPHOLs 1996: 173-190 - 1995
- [c8]Andrew D. Gordon:
Bisimilarity as a theory of functional programming. MFPS 1995: 232-252 - 1994
- [c7]Roy L. Crole, Andrew D. Gordon:
A Sound Metalogical Semantics for Input/Output Effects. CSL 1994: 339-353 - [c6]Andrew D. Gordon:
A Tutorial on Co-induction and Functional Programming. Functional Programming 1994: 78-95 - 1993
- [c5]Roy L. Crole, Andrew D. Gordon:
Factoring an Adequacy Proof (Preliminary Report). Functional Programming 1993: 9-25 - [c4]Andrew D. Gordon:
An Operational Semantics for I/O in a Lazy Functional Language. FPCA 1993: 136-145 - [c3]Andrew D. Gordon:
A Mechanisation of Name-Carrying Syntax up to Alpha-Conversion. HUG 1993: 413-425 - 1992
- [b1]Andrew Donald Gordon:
Functional programming and input/output. University of Cambridge, UK, 1992 - [c2]Andrew D. Gordon:
The Formal Definition of a Synchronous Hardware-Description Language in Higher Order Logic. ICCD 1992: 531-534 - [c1]Richard J. Boulton, Andrew D. Gordon, Michael J. C. Gordon, John Harrison, John Herbert, John Van Tassel:
Experience with Embedding Hardware Description Languages in HOL. TPCD 1992: 129-156
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-21 21:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint