Publications

Export 383 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is H  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
H
Hicks MW, Foster JS.  2010.  SCORE: agile research group management. Commun. ACM. 53(10):30-31.
Hicks MW, Foster JS.  2010.  Viewpoint Adapting agile software development methodology toward more efficient management of academic research groups.. Communications of the ACM. 53(10):30-30.
Hicks MW, Kakkar P, Moore JT, Gunter CA, Nettles S.  1998.  PLAN: a packet language for active networks. SIGPLAN Not.. 34(1):86-93.
Hicks MW, Swamy N, Tsang S.  2007.  Toward Specifying and Validating Cross-Domain Policies. Technical Reports from UMIACS.
Hicks MW, Moore J, Nettles S.  2001.  Compiling PLAN to SNAP. Active NetworksActive Networks. 2207:134-151.
Hicks MW, Foster JS, Pratikakis P.  2006.  Lock inference for atomic sections. Proceedings of the First ACM SIGPLAN Workshop on Languages, Compilers, and Hardware Support for Transactional Computing.
Hicks MW, Morrisett G, Grossman D, Jim T.  2003.  Safe and flexible memory management in Cyclone. Technical Reports from UMIACS.
Hicks MW, Nagarajan A, van Renesse R.  2003.  User-specified adaptive scheduling in a streaming media network. 2003 IEEE Conference on Open Architectures and Network Programming. :87-96.
Hicks MW, Hornof L, Moore JT, Nettles SM.  1998.  A study of large object spaces. Proceedings of the 1st international symposium on Memory management. :138-145.
Hicks MW.  1999.  PLAN Service Programmer's Guide for PLAN version 3.2. University of Pennsylvania.
Hicks MW, Kakkar P, Moore JT, Gunter CA, Alexander DS, Nettles S.  1998.  The PLAN system for building Active Networks. University of Pennsylvania (February 27, 1998).
Hicks MW.  2007.  Analyzing information flow. Conference on Programming Language Design and Implementation: Proceedings of the 2007 workshop on Programming languages and analysis for security.
Hicks MW, Moore JT, Wetherall D, Nettles S.  2002.  Experiences with capsule-based active networking. DARPA Active NEtworks Conference and Exposition, 2002. Proceedings. :16-24.
Hicks MW, Weirich S, Crary K.  2001.  Safe and Flexible Dynamic Linking of Native Code. Types in Compilation. 2071:147-176.
Hicks MW.  1998.  Types and intermediate representations. Technical Reports (CIS). :796-796.
Hicks MW, Keromytis AD, Smith JM.  2002.  A secure PLAN (extended version). DARPA Active NEtworks Conference and Exposition, 2002. Proceedings. :224-237.
Hicks MW, Tse S, Hicks B, Zdancewic S.  2005.  Dynamic updating of information-flow policies. Proceedings of the International Workshop on Foundations of Computer Security (FCS).
Hierons RM, Krause P, Lüttgen G, Simons AJH, Vilkomir S, Woodward MR, Zedan H, Bogdanov K, Bowen JP, Cleaveland R et al..  2009.  Using formal specifications to support testing. ACM Computing Surveys. 41:1-76.
Higham NJ, Stewart G.W.  1997.  Accuracy and Stability of Numerical Algorithms. SIAM Review. 39(1):164-165.
Hilke J, Lohn J, Reggia JA, Navarro R.  1994.  A modified cellular automata model of nucleotide interactions and DNA replication.
Hilke J, Reggia JA, Navarro-Gonzalez R, Lohn J.  1995.  A modified cellular automata model of nucleotide interactions and non-enzymatic transcription of DNA. inbs. :136-136.
Hill VR, Humphrys MS, Kahler AM, Boncy J, Tarr CL, Huq A, Chen A, Katz LS, Mull BJ, Derado G et al..  2015.  Environmental Surveillance for Toxigenic Vibrio cholerae in Surface Waters of Haiti. The American Journal of Tropical Medicine and Hygiene. 92(1):118-125.
Hill JH, Schmidt DC, Porter A, Slaby JM.  2008.  CiCUTS: Combining System Execution Modeling Tools with Continuous Integration Environments. Engineering of Computer-Based Systems, IEEE International Conference on the. :66-75.
Hinsch H, Hannenhalli S.  2006.  Recurring genomic breaks in independent lineages support genomic fragility. BMC Evolutionary Biology. 6(1):90-90.
Hjaltason GR, Samet H.  2003.  Improved search heuristics for the sa-tree. Pattern Recognition Letters. 24(15):2785-2795.

Pages