Travelled to:
1 × Cyprus
6 × USA
Collaborated with:
A.Prakash D.King S.Jha S.A.Seshia Xinyang Ge Weidong Cui V.Ganapathy J.H.Lee G.Wu S.Jha D.Muthukumaran X.Zhang L.Koved M.Pistoia S.Weber G.Marceau L.Zeng
Talks about:
analysi (3) system (2) inform (2) secur (2) multi (2) flow (2) use (2) transform (1) represent (1) processor (1)
Person: Trent Jaeger
DBLP: Jaeger:Trent
Contributed to:
Wrote 8 papers:
- ESOP-2010-KingJMJJS #automation #security
- Automating Security Mediation Placement (DK, SJ, DM, TJ, SJ, SAS), pp. 327–344.
- FSE-2008-KingJJS #data flow #effectiveness
- Effective blame for information-flow violations (DK, TJ, SJ, SAS), pp. 250–260.
- ICSE-2007-GanapathyKJJ #concept analysis #legacy #mining #using
- Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis (VG, DK, TJ, SJ), pp. 458–467.
- ISSTA-2006-ZhangKPWJMZ #analysis
- The case for analysis preserving language transformation (XZ, LK, MP, SW, TJ, GM, LZ), pp. 191–202.
- CSCW-1996-LeePJW #multi
- Supporting Multi-User, Multi-Applet Workspaces in CBE (JHL, AP, TJ, GW), pp. 344–353.
- SEKE-1995-JaegerP #adaptation #coordination #representation
- Representation and Adaptation of Organization Coordination Knowledge for Autonomous Agent Systems (TJ, AP), pp. 103–105.
- SEKE-1993-JaegerP #analysis #information management #named #specification
- BIZSPEC: A Business-Oriented Model for Specification and Analysis of Office Information Systems (TJ, AP), pp. 191–198.
- ASPLOS-2017-GeCJ #control flow #named #using
- GRIFFIN: Guarding Control Flows Using Intel Processor Trace (XG, WC, TJ), pp. 585–598.