Follow
Vivek Nigam
Title
Cited by
Cited by
Year
Algorithmic specifications in linear logic with subexponentials
V Nigam, D Miller
Proceedings of the 11th ACM SIGPLAN conference on Principles and practice of …, 2009
1142009
A selective defense for application layer ddos attacks
YG Dantas, V Nigam, IE Fonseca
2014 IEEE Joint Intelligence and Security Informatics Conference, 75-82, 2014
902014
Slow TCAM exhaustion DDoS attack
TA Pascoal, YG Dantas, IE Fonseca, V Nigam
ICT Systems Security and Privacy Protection: 32nd IFIP TC 11 International …, 2017
792017
A framework for proof systems
V Nigam, D Miller
Journal of Automated Reasoning 45, 157-188, 2010
602010
FSR: Formal analysis and implementation toolkit for safe interdomain routing
A Wang, L Jia, W Zhou, Y Ren, BT Loo, J Rexford, V Nigam, A Scedrov, ...
IEEE/ACM Transactions on Networking 20 (6), 1814-1827, 2012
532012
Slow denial-of-service attacks on software defined networks
TA Pascoal, IE Fonseca, V Nigam
Computer Networks 173, 107223, 2020
522020
Maintaining distributed logic programs incrementally
V Nigam, L Jia, B Thau Loo, A Scedrov
Proceedings of the 13th international ACM SIGPLAN symposium on Principles …, 2011
522011
TSNSCHED: Automated schedule generation for time sensitive networking
ACT dos Santos, B Schneider, V Nigam
2019 Formal Methods in Computer Aided Design (FMCAD), 69-77, 2019
512019
An extended framework for specifying and reasoning about proof systems
V Nigam, E Pimentel, G Reis
Journal of Logic and Computation 26 (2), 539-576, 2016
482016
Subexponentials in non-commutative linear logic
M Kanovich, S Kuznetsov, V Nigam, A Scedrov
Mathematical Structures in Computer Science 29 (8), 1217-1249, 2019
462019
Abstract effects and proof-relevant logical relations
N Benton, M Hofmann, V Nigam
Proceedings of the 41st ACM SIGPLAN-SIGACT Symposium on Principles of …, 2014
422014
Incorporating tables into proofs
D Miller, V Nigam
International workshop on computer science logic, 466-480, 2007
422007
Towards the automated verification of cyber-physical security protocols: Bounding the number of timed intruders
V Nigam, C Talcott, A Aires Urquiza
Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016
392016
A general proof system for modalities in concurrent constraint programming
V Nigam, C Olarte, E Pimentel
International Conference on Concurrency Theory, 410-424, 2013
382013
Prova: Rule-based java scripting for distributed web applications: A case study in bioinformatics
A Kozlenkov, R Penaloza, V Nigam, L Royer, G Dawelbait, M Schroeder
Current Trends in Database Technology–EDBT 2006: EDBT 2006 Workshops PhD …, 2006
312006
Exploiting non-canonicity in the sequent calculus
V Nigam
Ecole Polytechnique X, 2009
292009
A framework for analyzing adaptive autonomous aerial vehicles
IA Mason, V Nigam, C Talcott, A Brito
Software Engineering and Formal Methods: SEFM 2017 Collocated Workshops …, 2018
272018
Subexponential concurrent constraint programming
C Olarte, E Pimentel, V Nigam
Theoretical Computer Science 606, 98-120, 2015
262015
Bounded memory Dolev–Yao adversaries in collaborative systems
M Kanovich, TB Kirigin, V Nigam, A Scedrov
Information and computation 238, 233-261, 2014
262014
Specifying proof systems in linear logic with subexponentials
V Nigam, E Pimentel, G Reis
Electronic Notes in Theoretical Computer Science 269, 109-123, 2011
262011
The system can't perform the operation now. Try again later.
Articles 1–20