427 results on '"Shriram Krishnamurthi"'
Search Results
102. Combining Form and Function: Static Types for JQuery Programs.
103. Teaching garbage collection without implementing compiler or interpreters.
104. TeJaS: retrofitting type systems for JavaScript.
105. Whalesong: running racket in the browser.
106. Participatory networking: an API for application control of SDNs.
107. A balance of power: expressive, analyzable controller programming.
108. Verifying Web Browser Extensions' Compliance with Private-Browsing Mode.
109. Toward a More Complete Alloy.
110. Progressive types.
111. Features and object capabilities: reconciling two visions of modularity.
112. Modeling and Reasoning about DOM Events.
113. A tested semantics for getters, setters, and eval in JavaScript.
114. Hierarchical policies for software defined networks.
115. Mind your language: on novices' interactions with error messages.
116. WeScheme: the browser is your programming environment.
117. Measuring the effectiveness of error messages designed for novice programmers.
118. Typing Local Control and State Using Flow Analysis.
119. Do values grow on trees?: expression integrity in functional programming.
120. Oops, I did it again: mitigating repeated access control errors on facebook.
121. From Spreadsheets to Programs: Data Science and CS1 in Pyret (Abstract Only).
122. A model of triangulating environments for policy authoring.
123. The Essence of JavaScript.
124. Towards an Operational Semantics for Alloy.
125. Using static analysis for Ajax intrusion detection.
126. Flapjax: a programming language for Ajax applications.
127. Trusted Multiplexing of Cryptographic Protocols.
128. Preference aggregation in group recommender systems for committee decision-making.
129. A functional I/O system or, fun for freshman kids.
130. Typed-based verification of Web sandboxes.
131. Scripting Languages and Frameworks: Analysis and Verification (Dagstuhl Seminar 14271).
132. Alchemy: transmuting base alloy specifications into implementations.
133. Minimal backups of cryptographic protocol runs.
134. Cryptographic Protocol Explication and End-Point Projection.
135. Compiling cryptographic protocols for deployment on the web.
136. Lowering: a static optimization technique for transparent functional reactivity.
137. Relationally-parametric polymorphic contracts.
138. Obligations and Their Interaction with Programs.
139. Crossing State Lines: Adapting Object-Oriented Frameworks to Functional Reactive Languages.
140. Towards reasonability properties for access-control policy languages.
141. Specifying and Reasoning About Dynamic Access-Control Policies.
142. Abstract shade trees.
143. Embedding Dynamic Dataflow in a Call-by-Value Language.
144. Verification and change-impact analysis of access-control policies.
145. Web Verification: Perspective and Challenges.
146. Decomposing Verification Around End-User Features.
147. Continuations from generalized stack inspection.
148. The real software crisis: repeatability as a core value.
149. Validating the Unit Correctness of Spreadsheet Programs.
150. Verifying aspect advice modularly.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.