Vivek Nigam
TitleCited byYear
Algorithmic specifications in linear logic with subexponentials
V Nigam, D Miller
Proceedings of the 11th ACM SIGPLAN conference on Principles and practice of …, 2009
772009
A selective defense for application layer ddos attacks
YG Dantas, V Nigam, IE Fonseca
2014 IEEE Joint Intelligence and Security Informatics Conference, 75-82, 2014
442014
A framework for proof systems
V Nigam, D Miller
Journal of Automated Reasoning 45 (2), 157-188, 2010
422010
Maintaining distributed logic programs incrementally
V Nigam, L Jia, BT Loo, A Scedrov
Computer Languages, Systems & Structures 38 (2), 158-180, 2012
412012
FSR: Formal analysis and implementation toolkit for safe interdomain routing
A Wang, L Jia, W Zhou, Y Ren, BT Loo, J Rexford, V Nigam, A Scedrov, ...
IEEE/ACM Transactions on Networking (ToN) 20 (6), 1814-1827, 2012
372012
Incorporating tables into proofs
D Miller, V Nigam
International Workshop on Computer Science Logic, 466-480, 2007
372007
An extended framework for specifying and reasoning about proof systems
V Nigam, E Pimentel, G Reis
Journal of Logic and Computation 26 (2), 539-576, 2016
272016
A general proof system for modalities in concurrent constraint programming
V Nigam, C Olarte, E Pimentel
International Conference on Concurrency Theory, 410-424, 2013
252013
Exploiting non-canonicity in the sequent calculus
V Nigam
252009
Prova: Rule-based java scripting for distributed web applications: A case study in bioinformatics
A Kozlenkov, R Penaloza, V Nigam, L Royer, G Dawelbait, M Schroeder
International Conference on Extending Database Technology, 899-908, 2006
242006
Abstract effects and proof-relevant logical relations
N Benton, M Hofmann, V Nigam
ACM SIGPLAN Notices 49 (1), 619-631, 2014
232014
Specifying proof systems in linear logic with subexponentials
V Nigam, E Pimentel, G Reis
Electronic Notes in Theoretical Computer Science 269, 109-123, 2011
202011
Towards the automated verification of cyber-physical security protocols: Bounding the number of timed intruders
V Nigam, C Talcott, AA Urquiza
European Symposium on Research in Computer Security, 450-470, 2016
192016
Profile based scheme against DDoS attack in WSN
V Nigam, S Jain, K Burse
2014 Fourth international conference on communication systems and network …, 2014
182014
Subexponential concurrent constraint programming
C Olarte, E Pimentel, V Nigam
Theoretical Computer Science 606, 98-120, 2015
162015
A rewriting framework for activities subject to regulations
M Kanovich, T Ban Kirigin, V Nigam, A Scedrov, C Talcott, R Perovic
23rd International Conference on Rewriting Techniques and Applications (RTA'12), 2012
162012
Focusing in linear meta-logic
V Nigam, D Miller
International Joint Conference on Automated Reasoning, 507-522, 2008
162008
Slow TCAM exhaustion DDoS attack
TA Pascoal, YG Dantas, IE Fonseca, V Nigam
IFIP International Conference on ICT Systems Security and Privacy Protection …, 2017
152017
A dynamic logic programming based system for agents with declarative goals
V Nigam, J Leite
International Workshop on Declarative Agent Languages and Technologies, 174-190, 2006
152006
On the complexity of linear authorization logics
V Nigam
Proceedings of the 2012 27th Annual IEEE/ACM Symposium on Logic in Computer …, 2012
132012
The system can't perform the operation now. Try again later.
Articles 1–20