default search action
Scott Moore
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j4]Arash Sahebolamri, Langston Barrett, Scott Moore, Kristopher K. Micinski:
Bring Your Own Data Structures to Datalog. Proc. ACM Program. Lang. 7(OOPSLA2): 1198-1223 (2023) - [i5]Shrey Jain, Connor Spelliscy, Samuel Vance-Law, Scott Moore:
AI and Democracy's Digital Identity Crisis. CoRR abs/2311.16115 (2023) - [i4]John M. Abowd, Tamara Adams, Robert Ashmead, David Darais, Sourya Dey, Simson L. Garfinkel, Nathan Goldschlag, Daniel Kifer, Philip Leclerc, Ethan Lew, Scott Moore, Rolando A. Rodríguez, Ramy N. Tadros, Lars Vilhuber:
The 2010 Census Confidentiality Protections Failed, Here's How and Why. CoRR abs/2312.11283 (2023) - 2022
- [i3]Shiyu Xu, Scott Moore, Akansel Cosgun:
Shared-Control Robotic Manipulation in Virtual Reality. CoRR abs/2205.10564 (2022) - 2020
- [j3]Ezra Zigmond, Stephen Chong, Christos Dimoulas, Scott Moore:
Fine-Grained, Language-Based Access Control for Database-Backed Applications. Art Sci. Eng. Program. 4(2): 3 (2020)
2010 – 2019
- 2019
- [i2]Ezra Zigmond, Stephen Chong, Christos Dimoulas, Scott Moore:
Fine-Grained, Language-Based Access Control for Database-Backed Applications. CoRR abs/1909.12279 (2019) - [i1]Jennifer Paykin, Eric Mertens, Mark Tullsen, Luke Maurer, Benoît Razet, Alexander Bakst, Scott Moore:
Weird Machines as Insecure Compilation. CoRR abs/1911.00157 (2019) - 2018
- [c22]Joy Na Wang, Patricia Deutsch, Scott Moore, Bow-Nan Cheng:
Topology Algorithm Enhancements for Aerial High Capacity Directional Networks. MILCOM 2018: 273-277 - [c21]Jeffrey Wildman, Scott Moore, Leonid Veytser, Thomas Capuano, Jon Shapiro, Jason Hillger, Bow-Nan Cheng:
Towards Rapid Waveform Design and Deployment via Modular Signal Processing Frameworks. MILCOM 2018: 1031-1036 - 2016
- [j2]Abraham Isgur, Robert Lech, Scott Moore, Stephen M. Tanny, Yvon Verberne, Yifan Zhang:
Constructing New Families of Nested Recursions with Slow Solutions. SIAM J. Discret. Math. 30(2): 1128-1147 (2016) - [c20]Scott Moore, Rahul Amin, David Ripplinger, Devanshu Mehta, Bow-Nan Cheng:
Performance evaluation of a disruption tolerant network proxy for tactical edge networks. MILCOM 2016: 964-969 - [c19]Scott Moore, Christos Dimoulas, Robert Bruce Findler, Matthew Flatt, Stephen Chong:
Extensible access control with authorization contracts. OOPSLA 2016: 214-233 - 2015
- [c18]Aslan Askarov, Scott Moore, Christos Dimoulas, Stephen Chong:
Cryptographic Enforcement of Language-Based Information Erasure. CSF 2015: 334-348 - [c17]Andrew Johnson, Lucas Waye, Scott Moore, Stephen Chong:
Exploring and enforcing security guarantees via program dependence graphs. PLDI 2015: 291-302 - 2014
- [c16]Christos Dimoulas, Scott Moore, Aslan Askarov, Stephen Chong:
Declarative Policies for Capability Control. CSF 2014: 3-17 - [c15]Greg Kuperman, Lenny Veytser, Bow-Nan Cheng, Scott Moore, Aradhana Narula-Tam:
A comparison of OLSR and OSPF-MDR for large-scale airborne mobile ad-hoc networks. AIRBORNE@MobiHoc 2014: 17-22 - [c14]Scott Moore, Christos Dimoulas, Dan King, Stephen Chong:
SHILL: A Secure Shell Scripting Language. OSDI 2014: 183-199 - 2013
- [j1]Hila Etzion, Scott Moore:
Managing online sales with posted price and open-bid auctions. Decis. Support Syst. 54(3): 1327-1339 (2013) - [c13]Bow-Nan Cheng, James Wheeler, Brian Hung, Scott Moore, Prasanna Sukumar:
A comparison of IP header compression schemes in MANETs. IPCCC 2013: 1-9 - [c12]Bow-Nan Cheng, John Zuena, Jim Wheeler, Scott Moore, Brian Hung:
MANET IP Header Compression. MILCOM 2013: 494-503 - [c11]Bow-Nan Cheng, Scott Moore:
Securing Robust Header Compression (ROHC). MILCOM 2013: 1383-1390 - [c10]Scott Moore, Ashish Gehani:
Declaratively Processing Provenance Metadata. TaPP 2013 - 2012
- [c9]Scott Moore, Aslan Askarov, Stephen Chong:
Precise enforcement of progress-sensitive security. CCS 2012: 881-893 - [c8]Bow-Nan Cheng, Scott Moore:
A comparison of MANET routing protocols on airborne tactical networks. MILCOM 2012: 1-6 - 2011
- [c7]Scott Moore, Stephen Chong:
Static Analysis for Efficient Hybrid Information-Flow Control. CSF 2011: 146-160
2000 – 2009
- 2009
- [c6]Brian W. DeVries, Gopal Gupta, Kevin W. Hamlen, Scott Moore, Meera Sridhar:
ActionScript bytecode verification with co-logic programming. PLAS 2009: 9-15 - 2008
- [c5]Hila Etzion, Scott Moore:
Simulation of Online Selling with Posted-Price and Auctions: Comparison of Dual Channel's Performance under Different Auction Mechanisms. HICSS 2008: 282 - 2007
- [c4]Kurt DeMaagd, Scott Moore:
Using Classifiers to Solve Warehouse Location Problems. HICSS 2007: 57 - [c3]Kurt DeMaagd, Scott Moore:
Comparing models of IT and economic growth: An empirical investigation. ICTD 2007: 1-8 - 2006
- [c2]Kurt DeMaagd, Scott Moore:
Using IT to Open Previously Unprofitable Markets. HICSS 2006
1990 – 1999
- 1990
- [c1]Scott Moore, Ronald Curtis:
A Study of the Prather Software Metric (Abstract). ACM Conference on Computer Science 1990: 408
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint