Search results

  • 2020

    Closing the UK care home data gap - methodological challenges and solutions

    Burton, J. K., Goodman, C., Guthrie, B., Gordon, A. L., Hanratty, B. & Quinn, T. J., 15 Dec 2020, In: International Journal of Population Data Science. 5, 4, p. 1391

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • 2019

    End-User Probabilistic Programming

    Borghouts, J., Gordon, A. D., Sarkar, A. & Toronto, N., 4 Sept 2019, Quantitative Evaluation of Systems: QEST 2019. Parker, D. & Wolf, V. (eds.). Springer, p. 3-24 22 p. (Lecture Notes in Computer Science; vol. 11785).

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

    Open Access
    File
  • Probabilistic Programming with Densities in SlicStan: Efficient, Flexible, and Deterministic

    Gorinova, M. I., Gordon, A. D. & Sutton, C., 2 Jan 2019, In: Proceedings of the ACM on Programming Languages. 3, POPL, p. 35:1-35:30 30 p., 35.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    File
  • 2018

    Calculation View: multiple-representation editing in spreadsheets

    Sarkar, A., Gordon, A. D., Jones, S. P. & Toronto, N., 25 Oct 2018, 2018 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC). Lisbon, Portugal: Institute of Electrical and Electronics Engineers, p. 85-93 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2017

    Deriving Probability Density Functions from Probabilistic Functional Programs

    Bhat, S., Borgström, J., Gordon, A. & Russo, C., 3 Jul 2017, In: Logical Methods in Computer Science. 13, 2, p. 1-32 32 p., 6.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    File
  • Monitoring internet trade to inform species conservation actions

    Vaglica, V., Sajeva, M., Mcgough, H., Hutchison, D., Russo, C., Gordon, A., Ramarosandratana, A., Stuppy, W. & Smith, M., 14 Mar 2017, In: Endangered Species Research. 32, p. 223-235 13 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    File
  • POPL 2017: Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages

    Castagna, G. & Gordon, A., Jan 2017, New York, NY, USA: ACM. 922 p.

    Research output: Book/ReportAnthology

  • 2016

    Differentially Private Bayesian Programming

    Barthe, G., Farina, G. P., Gaboardi, M., Arias, E. J. G., Gordon, A., Hsu, J. & Strub, P-Y., 24 Oct 2016, 23rd ACM Conference on Computer and Communications Security CCS 2016. ACM, p. 68-79 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • A Lambda-Calculus Foundation for Universal Probabilistic Programming

    Borgstrom, J., Lago, U. D., Gordon, A. D. & Szymczak, M., 4 Sept 2016, Proceedings of the 21st ACM SIGPLAN International Conference on Functional Programming. Nara, Japan: ACM, p. 33-46 14 p. (ACM SIGPLAN Notices; vol. 51, no. 9).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • More Semantics More Robust: Improving Android Malware Classifiers

    Chen, W., Aspinall, D., Gordon, A., Sutton, C. & Muttik, I., 18 Jul 2016, 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Darmstadt, Germany: ACM, p. 147-158 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • On Robust Malware Classifiers by Verifying Unwanted Behaviours

    Chen, W., Aspinall, D., Gordon, A., Sutton, C. & Muttik, I., Jun 2016, Integrated Formal Methods: 12th International Conference, IFM 2016, Reykjavik, Iceland, June 1-5, 2016, Proceedings. Springer, p. 326-341 15 p. (Lecture Notes in Computer Science; vol. 9681).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • A Text-Mining Approach to Explain Unwanted Behaviours

    Chen, W., Aspinall, D., Gordon, A., Sutton, C. & Muttik, I., 18 Apr 2016, EuroSec '16 Proceedings of the 9th European Workshop on System Security . ACM, 6 p. 4

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Explaining Unwanted Behaviours in Context

    Chen, W., Aspinall, D., Gordon, A., Sutton, C. & Muttik, I., 6 Apr 2016, Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016). CEUR-WS.org, p. 38-45 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Fabular: regression formulas as probabilistic programming

    Borgström, J., Gordon, A. D., Ouyang, L., Russo, C. V., Scibior, A. & Szymczak, M., 11 Jan 2016, POPL 2016 Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. Bodik, R. & Majumdar, R. (eds.). ACM, p. 271-283 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Learning and Verifying Unwanted Behaviours

    Chen, W., Aspinall, D., Gordon, A., Sutton, C. & Muttik, I., 2016, 4th Workshop on Hot Issues in Security Principles and Trust (HotSpot 2016). p. 17-32 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2015

    Verifying Anti-Security Policies Learnt from Android Malware Families

    Chen, W., Sutton, C., Aspinall, D., Gordon, A., Shen, Q. & Muttik, I., 21 Oct 2015, Fourth International Seminar on Program Verification, Automated Debugging and Symbolic Computation. 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Practical probabilistic programming with monads

    Scibior, A., Ghahramani, Z. & Gordon, A. D., 30 Aug 2015, Proceedings of the 8th ACM SIGPLAN Symposium on Haskell, Haskell 2015, Vancouver, BC, Canada, September 3-4, 2015. Lippmeier, B. (ed.). ACM, p. 165-176 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Compact Explanations of Why Malware is Bad

    Chen, W., Sutton, C., Gordon, A., Aspinall, D., Muttik, I. & Shen, Q., 10 Aug 2015, (Accepted/In press) AI4FM 2015. 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Bimodal Modelling of Source Code and Natural Language

    Allamanis, M., Tarlow, D., Gordon, A. D. & Wei, Y., 7 Jul 2015, Proceedings of the 32nd International Conference on Machine Learning. Bach, F. R. & Blei, D. M. (eds.). Lille, France: PMLR, p. 2123-2132 10 p. (Proceedings of Machine Learning Research; vol. 37).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Challenges and Trends in Probabilistic Programming: (Dagstuhl Seminar 15181)

    Barthe, G. (ed.), Gordon, A. D. (ed.), Katoen, J-P. (ed.) & McIver, A. (ed.), 2015, In: Dagstuhl Reports. 5, 4, p. 123-141 19 p.

    Research output: Contribution to journalArticle

    Open Access
    File
  • Probabilistic Programs as Spreadsheet Queries

    Gordon, A. D., Russo, C. V., Szymczak, M., Borgström, J., Rolland, N., Graepel, T. & Tarlow, D., 2015, Programming Languages and Systems: 24th European Symposium on Programming, ESOP 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015. Proceedings. Springer, Vol. 9032. p. 1-25 25 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2014

    Tabular: A Schema-driven Probabilistic Programming Language

    Gordon, A. D., Graepel, T., Rolland, N., Russo, C., Borgstrom, J. & Guiver, J., 8 Jan 2014, Proceedings of the 41st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. New York, NY, USA: ACM, p. 321-334 14 p. (ACM SIGPLAN Notices; vol. 49, no. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Guiding a general-purpose C verifier to prove cryptographic protocols

    Dupressoir, F., Gordon, A., Jürjens, J. & Naumann, D. A., 2014, In: Journal of Computer Security. 22, 5, p. 823-866 44 p.

    Research output: Contribution to journalArticlepeer-review

    File
  • Probabilistic Programming

    Gordon, A. D., Henzinger, T. A., Nori, A. V. & Rajamani, S. K., 2014, Proceedings of the on Future of Software Engineering. New York, NY, USA: ACM, p. 167-181 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    File
  • 2013

    Measure Transformer Semantics for Bayesian Machine Learning

    Borgström, J., Gordon, A. D., Greenberg, M., Margetson, J. & Gael, J. V., 9 Sept 2013, In: Logical Methods in Computer Science. 9, 3, 39 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    File
  • Constraint-based Autonomic Reconfiguration

    Hewson, J. A., Anderson, P. & Gordon, A. D., Sept 2013, Proceedings of 2013 Self-Adaptive and Self-Organizing systems conference (SASO). Institute of Electrical and Electronics Engineers, p. 101-110 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • A model-learner pattern for bayesian reasoning

    Gordon, A. D., Aizatulin, M., Borgstrom, J., Claret, G., Graepel, T., Nori, A. V., Rajamani, S. K. & Russo, C., 2013, Proceedings of the 40th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages. New York, NY, USA: ACM, p. 403-416 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Bayesian inference using data flow analysis

    Claret, G., Rajamani, S. K., Nori, A. V., Gordon, A. D. & Borgström, J., 2013, Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, ESEC/FSE'13, Saint Petersburg, Russian Federation, August 18-26, 2013. p. 92-102 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Deriving Probability Density Functions from Probabilistic Functional Programs

    Bhat, S., Borgström, J., Gordon, A. D. & Russo, C. V., 2013, Tools and Algorithms for the Construction and Analysis of Systems: 19th International Conference, TACAS 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings. Springer, Vol. 7795. p. 508-522 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • XML Web Services: The Global Computer?

    Gordon, A., 2013, Foundations of Information Technology in the Era of Network and Mobile Computing: IFIP 17th World Computer Congress — TC1 Stream / 2nd IFIP International Conference on Theoretical Computer Science (TCS 2002) August 25–30, 2002, Montréal, Québec, Canada. Springer, p. 355 1 p. (IFIP Advances in Information and Communication Technology; vol. 96).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2012

    Identification of new susceptibility loci for osteoarthritis (arcOGEN): a genome-wide association study

    arcOGEN Consortium & arcOGEN Colla, Zeggini, E., Panoutsopoulou, K., Southam, L., Rayner, N. W., Day-Williams, A. G., Lopes, M. C., Boraska, V., Esko, T., Evangelou, E., Hofman, A., Houwing-Duistermaat, J. J., Ingvarsson, T., Jonsdottir, I., Jonsson, H., Kerkhof, H. J. M., Kloppenburg, M., Bos, S. D., Mangino, M., Metrustry, S., & 31 othersSlagboom, P. E., Thorleifsson, G., Raine, E. V. A., Ratnayake, M., Ricketts, M., Beazley, C., Blackburn, H., Bumpstead, S., Elliott, K. S., Hunt, S. E., Potter, S. C., Shin, S-Y., Yadav, V. K., Zhai, G., Sherburn, K., Dixon, K., Arden, E., Aslam, N., Battley, P-K., Carluke, I., Doherty, S., Gordon, A., Joseph, J., Keen, R., Koller, N. C., Mitchell, S., O'Neill, F., Paling, E., Reed, M. R., Salter, D. & Ralston, S. H., 1 Sept 2012, In: The Lancet. 380, 9844, p. 815-823 9 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    File
  • A Declarative Approach to Automated Configuration

    Hewson, J. A., Anderson, P. & Gordon, A. D., 2012, Proceedings of the 2012 LISA Conference. USENIX Association

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Computational verification of C protocol implementations by symbolic execution

    Aizatulin, M., Gordon, A. D. & Jürjens, J., 2012, the ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012. p. 712-723 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Semantic subtyping with an SMT solver

    Bierman, G. M., Gordon, A. D., Hritcu, C. & Langworthy, D. E., 2012, In: Journal of Functional Programming. 22, 1, p. 31-105 75 p.

    Research output: Contribution to journalArticlepeer-review

  • 2011

    Refinement types for secure implementations

    Bengtson, J., Bhargavan, K., Fournet, C., Gordon, A. D. & Maffeis, S., 1 Feb 2011, In: ACM Letters on Programming Languages and Systems. 33, 2, p. 1-45 45 p., 8.

    Research output: Contribution to journalArticlepeer-review

  • Cryptographic Verification by Typing for a Sample Protocol Implementation

    Fournet, C., Bhargavan, K. & Gordon, A. D., 2011, Foundations of Security Analysis and Design VI: FOSAD Tutorial Lectures. Springer, Vol. 6858. p. 66-100 35 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Extracting and verifying cryptographic models from C protocol code by symbolic execution

    Aizatulin, M., Gordon, A. D. & Jürjens, J., 2011, Proceedings of the 18th ACM conference on Computer and communications security. New York, NY, USA: ACM, p. 331-340 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols

    Dupressoir, F., Gordon, A. D., Jürjens, J. & Naumann, D. A., 2011, Proceedings of the 24th IEEE Computer Security Foundations Symposium, CSF 2011, Cernay-la-Ville, France, 27-29 June, 2011. Institute of Electrical and Electronics Engineers, p. 3-17 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Maintaining Database Integrity with Refinement Types

    Baltopoulos, I. G., Borgström, J. & Gordon, A. D., 2011, ECOOP 2011 - Object-Oriented Programming: 25th European Conference, Lancaster, UK, July 25-29, 2011 Proceedings. Springer, Vol. 6813. p. 484-509 26 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Measure Transformer Semantics for Bayesian Machine Learning

    Borgstrom, J., Gordon, A. D., Greenberg, M., Margetson, J. & Van Gael, J., 2011, Programming Languages and Systems: 20th European Symposium on Programming, ESOP 2011, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2011, Saarbrücken, Germany, March 26–April 3, 2011. Proceedings. Barthe, G. (ed.). Springer, p. 77-96 20 p. (Lecture Notes in Computer Science; vol. 6602).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Roles, stacks, histories: A triple for Hoare

    Borgström, J., Gordon, A. D. & Pucella, R., 2011, In: Journal of Functional Programming. 21, 2, p. 159-207 49 p.

    Research output: Contribution to journalArticlepeer-review

  • Verifying Cryptographic Code in C: Some Experience and the Csec Challenge

    Aizatulin, M., Dupressoir, F., Gordon, A. D. & Jürjens, J., 2011, Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers. Springer, Vol. 7140. p. 1-20 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2010

    SecPAL: Design and semantics of a decentralized authorization language

    Becker, M. Y., Fournet, C. & Gordon, A. D., 1 Jan 2010, In: Journal of Computer Security. 18, 4, p. 619-665 47 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    File
  • Modular verification of security protocol code by typing

    Bhargavan, K., Fournet, C. & Gordon, A. D., 2010, Proceedings of the 37th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages. New York, NY, USA: ACM, p. 445-456 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Principles and Applications of Refinement Types

    Gordon, A. D. & Fournet, C., 2010, Logics and Languages for Reliability and Security. IOS Press, Vol. 25. p. 73-104 32 p. (NATO Science for Peace and Security Series - D: Information and Communication Security; vol. 45).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Semantic subtyping with an SMT solver

    Bierman, G. M., Gordon, A. D., Hritcu, C. & Langworthy, D. E., 2010, Proceeding of the 15th ACM SIGPLAN international conference on Functional programming, ICFP 2010, Baltimore, Maryland, USA, September 27-29, 2010. ACM, p. 105-116 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2009

    A compositional theory for STM Haskell

    Borgström, J., Bhargavan, K. & Gordon, A. D., 2009, Proceedings of the 2nd ACM SIGPLAN Symposium on Haskell, Haskell 2009, Edinburgh, Scotland, UK, 3 September 2009. ACM, p. 69-80 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Secure compilation of a multi-tier web language

    Baltopoulos, I. G. & Gordon, A. D., 2009, Proceedings of TLDI'09: 2009 ACM SIGPLAN International Workshop on Types in Languages Design and Implementation, Savannah, GA, USA, January 24, 2009. p. 27-38 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Towards a Verified Reference Implementation of a Trusted Platform Module

    Mukhamedov, A., Gordon, A. D. & Ryan, M., 2009, Security Protocols XVII: 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers. Springer, Vol. 7028. p. 69-81 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Type Inference for Correspondence Types

    Gordon, A. D., Hüttel, H. & Hansen, R. R., 2009, In: Electronic Notes in Theoretical Computer Science. 242, 3, p. 21-36 16 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    File