Greg Morrisett
Affiliations: | Cornell University, Ithaca, NY, United States | ||
Harvard University, Cambridge, MA, United States |
Google:
"Greg Morrisett"Parents
Sign in to add mentorRobert Harper | grad student | 1995 | Carnegie Mellon | |
(Compiling with Types) |
Children
Sign in to add traineeDavid Walker | grad student | 2001 | Cornell |
Dan Grossman | grad student | 2003 | Cornell |
James R. Cheney | grad student | 2004 | Cornell |
Kevin Hamlen | grad student | 2006 | Cornell |
Matthew Fluet | grad student | 2007 | Cornell |
Geoffrey B. Mainland | grad student | 2011 | Harvard |
Avraham E. Shinnar | grad student | 2011 | Harvard |
Ryan Wisnesky | grad student | 2014 | Harvard |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Tan G, Morrisett G. (2018) Bidirectional Grammars for Machine-Code Decoding and Encoding Journal of Automated Reasoning. 60: 257-277 |
Petcher A, Morrisett G. (2015) The foundational cryptography framework Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9036: 53-72 |
Sun M, Tan G, Siefers J, et al. (2013) Bringing Java's wild native world under control Acm Transactions On Information and System Security. 16 |
Chiricescu S, Dehon A, Demange D, et al. (2013) SAFE: A clean-slate architecture for secure systems 2013 Ieee International Conference On Technologies For Homeland Security, Hst 2013. 570-576 |
Huang D, Morrisett G. (2013) Formalizing the SAFECode type system Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8307: 211-226 |
Siefers J, Tan G, Morrisett G. (2010) Robusta: Taming the native beast of the JVM Proceedings of the Acm Conference On Computer and Communications Security. 201-211 |
Mainland G, Morrisett G. (2010) Nikola: Embedding compiled GPU functions in Haskell Proceedings of the Acm Sigplan International Conference On Functional Programming, Icfp. 67-77 |
Malecha G, Morrisett G, Shinnar A, et al. (2010) Toward a verified relational database management system Conference Record of the Annual Acm Symposium On Principles of Programming Languages. 237-248 |
Malecha G, Morrisett G, Wisnesky R. (2010) Trace-based verification of imperative programs with I/O Journal of Symbolic Computation |
Morrisett G. (2010) Integrating types and specifications for secure software development Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6258: 32-35 |