Martin Abadi
Martin Abadi
Principal Scientist, Google, and Professor Emeritus, UC Santa Cruz
Verified email at - Homepage
TitleCited byYear
Tensorflow: a system for large-scale machine learning.
M Abadi, P Barham, J Chen, Z Chen, A Davis, J Dean, M Devin, ...
OSDI 16, 265-283, 2016
A logic of authentication
M Burrows, M Abadi, R Needham
Proc. R. Soc. Lond. A 426 (1871), 233-271, 1989
A calculus for cryptographic protocols: The spi calculus
M Abadi, AD Gordon
Information and computation 148 (1), 1-70, 1999
A theory of objects
M Abadi, L Cardelli
Springer, 1996
The existence of refinement mappings
M Abadi, L Lamport
Theoretical Computer Science 82 (2), 253-284, 1991
Mobile values, new names, and secure communication
M Abadi, C Fournet
ACM Sigplan Notices 36 (3), 104-115, 2001
Control-flow integrity
M Abadi, M Budiu, U Erlingsson, J Ligatti
Proc. ACM Conference and Computer and Communications Security (CCS), 2005
Explicit substitutions
M Abadi, L Cardelli, PL Curien, JJ Lévy
Journal of Functional Programming 6 (2), 299-327, 1996
Authentication in distributed systems: Theory and practice
B Lampson, M Abadi, M Burrows, E Wobber
ACM Transactions on Computer Systems (TOCS) 10 (4), 265-310, 1992
Prudent engineering practice for cryptographic protocols
M Abadi, R Needham
IEEE transactions on Software Engineering, 6-15, 1996
A calculus for access control in distributed systems
M Abadi, M Burrows, B Lampson, G Plotkin
ACM Transactions on Programming Languages and Systems (TOPLAS) 15 (4), 706-734, 1993
Composing specifications
M Abadi, L Lamport
ACM Transactions on Programming Languages and Systems (TOPLAS) 15 (1), 73-132, 1993
Conjoining specifications
M Abadi, L Lamport
ACM Transactions on Programming Languages and Systems (TOPLAS) 17 (3), 507-535, 1995
Access control subsystem and method for distributed computer system using locally cached authentication credentials
E Wobber, M Abadi, A Birrell, B Lampson
US Patent 5,235,642, 1993
Naiad: a timely dataflow system
DG Murray, F McSherry, R Isaacs, M Isard, P Barham, M Abadi
Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems …, 2013
Dynamic typing in a statically typed language
M Abadi, L Cardelli, B Pierce, G Plotkin
ACM transactions on programming languages and systems (TOPLAS) 13 (2), 237-268, 1991
Reconciling two views of cryptography (the computational soundness of formal encryption)
M Abadi, P Rogaway
Journal of cryptology 15 (2), 103-127, 2002
A semantics for a logic of authentication
M Abadi, MR Tuttle
Proceedings of the tenth annual ACM symposium on Principles of distributed …, 1991
XFI: Software guards for system address spaces
U Erlingsson, M Abadi, M Vrable, M Budiu, GC Necula
Proceedings of the 7th symposium on Operating systems design and …, 2006
A core calculus of dependency
M Abadi, A Banerjee, N Heintze, JG Riecke
Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of …, 1999
The system can't perform the operation now. Try again later.
Articles 1–20