Vivek Nigam
Cited by
Cited by
Algorithmic specifications in linear logic with subexponentials
V Nigam, D Miller
Proceedings of the 11th ACM SIGPLAN conference on Principles and practice of …, 2009
A selective defense for application layer ddos attacks
YG Dantas, V Nigam, IE Fonseca
2014 IEEE Joint Intelligence and Security Informatics Conference, 75-82, 2014
A framework for proof systems
V Nigam, D Miller
Journal of Automated Reasoning 45 (2), 157-188, 2010
Maintaining distributed logic programs incrementally
V Nigam, L Jia, BT Loo, A Scedrov
Computer Languages, Systems & Structures 38 (2), 158-180, 2012
FSR: Formal analysis and implementation toolkit for safe interdomain routing
A Wang, L Jia, W Zhou, Y Ren, BT Loo, J Rexford, V Nigam, A Scedrov, ...
IEEE/ACM Transactions on Networking 20 (6), 1814-1827, 2012
Incorporating tables into proofs
D Miller, V Nigam
International Workshop on Computer Science Logic, 466-480, 2007
A general proof system for modalities in concurrent constraint programming
V Nigam, C Olarte, E Pimentel
International Conference on Concurrency Theory, 410-424, 2013
An extended framework for specifying and reasoning about proof systems
V Nigam, E Pimentel, G Reis
Journal of Logic and Computation 26 (2), 539-576, 2016
Slow TCAM exhaustion DDoS attack
TA Pascoal, YG Dantas, IE Fonseca, V Nigam
IFIP International Conference on ICT Systems Security and Privacy Protection …, 2017
Abstract effects and proof-relevant logical relations
N Benton, M Hofmann, V Nigam
Proceedings of the 41st ACM SIGPLAN-SIGACT Symposium on Principles of …, 2014
Exploiting non-canonicity in the sequent calculus
V Nigam
Prova: Rule-based java scripting for distributed web applications: A case study in bioinformatics
A Kozlenkov, R Penaloza, V Nigam, L Royer, G Dawelbait, M Schroeder
International Conference on Extending Database Technology, 899-908, 2006
Towards the automated verification of cyber-physical security protocols: Bounding the number of timed intruders
V Nigam, C Talcott, AA Urquiza
European Symposium on Research in Computer Security, 450-470, 2016
Specifying proof systems in linear logic with subexponentials
V Nigam, E Pimentel, G Reis
Electronic Notes in Theoretical Computer Science 269, 109-123, 2011
Subexponential concurrent constraint programming
C Olarte, E Pimentel, V Nigam
Theoretical Computer Science 606, 98-120, 2015
Profile based scheme against DDoS attack in WSN
V Nigam, S Jain, K Burse
2014 Fourth international conference on communication systems and network …, 2014
Subexponentials in non-commutative linear logic
M Kanovich, S Kuznetsov, V Nigam, A Scedrov
arXiv preprint arXiv:1709.03607, 2017
Focusing in linear meta-logic
V Nigam, D Miller
International Joint Conference on Automated Reasoning, 507-522, 2008
A rewriting framework for activities subject to regulations
M Kanovich, T Ban Kirigin, V Nigam, A Scedrov, C Talcott, R Perovic
23rd International Conference on Rewriting Techniques and Applications (RTA'12), 2012
A dynamic logic programming based system for agents with declarative goals
V Nigam, J Leite
International Workshop on Declarative Agent Languages and Technologies, 174-190, 2006
The system can't perform the operation now. Try again later.
Articles 1–20