Journal Article Distributed System Security via Logical Frameworks (SeLF) 2008 Bauer L, Pfenning F, Reiter M, Chaudhuri K, Garg D, Garriss S, McCune J, Ley-Wild R
Conference Imogen: Focusing the Polarized Inverse Method for Intuitionistic Propositional Logic 2008 • Lecture Notes in Computer Science • 5330:174-181 McLaughlin S, Pfenning F
Conference Linear logical algorithms 2008 • Lecture Notes in Computer Science • 5126:336-347 Simmons RJ, Pfenning F
Conference Proceedings - 23rd Annual IEEE Symposium on logic in Computer Science, LICS 2008: Foreword 2008 • Proceedings - Symposium on Logic in Computer Science • 10 Pfenning F
Journal Article Specifying Properties of Concurrent Computations in CLF 2008 • Electronic Notes in Theoretical Computer Science • 199:67-87 Watkins K, Cervesato I, Pfenning F, Walker D
Journal Article Consumable Credentials in Logic-Based Access-Control Systems 2007 • Proceedings of the Symposium on Network and Distributed System Security, NDSS 2007 Bowers KD, Bauer L, Garg D, Pfenning F, Reiter MK
Journal Article Invited talk: Subtyping and intersection types revisited 2007 • ACM Sigplan Notices • 42(9):219 Pfenning F
Conference Lecture Notes in Computer Science: Preface 2007 • Lecture Notes in Computer Science • 4603 LNAI: Pfenning F
Conference On a logical foundation for explicit substitutions 2007 • Lecture Notes in Computer Science • 4533:19-19 Pfenning F
Conference On a logical foundation for explicit substitutions 2007 • Lecture Notes in Computer Science • 4583:1-1 Pfenning F
Conference Subtyping and Intersection Types Revisited 2007 • ACM Sigplan Notices • 219-219 Pfenning F
Conference Subtyping and intersection types revisited 2007 • ACM Sigplan Notices • 42(9):219-219 Pfenning F
Conference Using constrained intuitionistic linear logic for hybrid robotic planning problems 2007 • IEEE International Conference on Robotics and Automation • 3705-+ Saranli U, Pfenning F
Conference A linear logic of authorization and knowledge 2006 • Lecture Notes in Computer Science • 4189:297-+ Garg D, Bauer L, Bowers KD, Pfenning R, Reiter MK
Conference A logical characterization of forward and backward chaining in the inverse method 2006 • Lecture Notes in Computer Science • 4130:97-111 Chaudhuri K, Pfenning F, Price G
Book Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformation): Preface 2006 • Lecture Notes in Computer Science • 4098 LNCS: Pfenning F
Conference Non-interference in constructive authorization logic 2006 • Proceedings of the Computer Security Foundations Workshop • 2006:283-293 Garg D, Pfenning F
Conference A focusing inverse method theorem prover for first-order linear logic 2005 • Lecture Notes in Computer Science • 3632:69-83 Chaudhuri K, Pfenning F
Journal Article A monadic analysis of information flow security with mutable state 2005 • Journal of Functional Programming • 15:249-291 Crary K, Kliger A, Pfenning F
Conference A probabilistic language based upon sampling functions 2005 • Conference Record of the Annual ACM Symposium on Principles of Programming Languages • 171-182 Park S, Pfenning F, Thrun S
Conference A probabilistic language based upon sampling functions 2005 • ACM Sigplan Notices • 40(1):171-182 Park S, Pfenning F, Thrun S
Conference Focusing the inverse method for linear logic 2005 • Lecture Notes in Computer Science • 3634:200-215 Chaudhuri K, Pfenning F
Conference Monadic concurrent linear logic programming 2005 • PPDP'05 - Proceedings of the Seventh ACM SIGPLAN Conference on Principles and Practice of Declarative Programming • 2005:35-46 Löpez P, Pfenning F, Polakow J, Watkins K
Journal Article On equivalence and canonical forms in the LF type theory 2005 • ACM Transactions on Computational Logic • 6(1):61-101 Harper R, Pfenning F