<?xml version="1.0"?>
<dblpperson name="Richard M. Cohen" pid="70/985" n="5">
<person key="homepages/70/985" mdate="2009-06-09">
<author pid="70/985">Richard M. Cohen</author>
</person>
<r><inproceedings key="conf/csfw/BevierCY95" mdate="2023-03-24">
<author pid="30/5078">William R. Bevier</author>
<author pid="70/985">Richard M. Cohen</author>
<author pid="10/247">William D. Young</author>
<title>Connection policies and controlled interference.</title>
<pages>167-176</pages>
<year>1995</year>
<crossref>conf/csfw/1995</crossref>
<booktitle>CSFW</booktitle>
<ee>https://doi.org/10.1109/CSFW.1995.518561</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CSFW.1995.518561</ee>
<url>db/conf/csfw/csfw1995.html#BevierCY95</url>
</inproceedings>
</r>
<r><article key="journals/sigsoft/BoyerMHCH86" mdate="2022-02-02">
<author pid="b/RobertSBoyer">Robert S. Boyer</author>
<author pid="m/JStrotherMoore">J Strother Moore</author>
<author pid="09/7554">Warren A. Hunt</author>
<author pid="70/985">Richard M. Cohen</author>
<author pid="h/RichardCHolt">Richard C. Holt</author>
<title>Abstracts in software engineering - reports.</title>
<pages>92-94</pages>
<year>1986</year>
<volume>11</volume>
<journal>ACM SIGSOFT Softw. Eng. Notes</journal>
<number>5</number>
<ee>https://doi.org/10.1145/382298.382375</ee>
<url>db/journals/sigsoft/sigsoft11.html#BoyerMHCH86</url>
</article>
</r>
<r><article key="journals/sigsoft/SmithC85" mdate="2022-02-03">
<author pid="190/8668">Michael K. Smith</author>
<author pid="70/985">Richard M. Cohen</author>
<title>Gypsy verification environment: status.</title>
<pages>5-6</pages>
<year>1985</year>
<volume>10</volume>
<journal>ACM SIGSOFT Softw. Eng. Notes</journal>
<number>4</number>
<ee>https://doi.org/10.1145/1012497.1012501</ee>
<url>db/journals/sigsoft/sigsoft10.html#SmithC85</url>
</article>
</r>
<r><inproceedings key="conf/popl/GoodC79" mdate="2026-02-19">
<author pid="55/332">Donald I. Good</author>
<author pid="70/985">Richard M. Cohen</author>
<author pid="16/4577">James G. Keeton-Williams</author>
<title>Principles of Proving Programs Correct in Gypsy.</title>
<pages>42-52</pages>
<year>1979</year>
<crossref>conf/popl/79</crossref>
<booktitle>POPL</booktitle>
<url>db/conf/popl/popl79.html#GoodC79</url>
<cdrom>POPL/00001696.PDF</cdrom>
<ee type="oa">https://doi.org/10.1145/567752.567757</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/acm/GoodCH78" mdate="2018-11-06">
<author pid="55/332">Donald I. Good</author>
<author pid="70/985">Richard M. Cohen</author>
<author pid="77/5249">Lawrence W. Hunter</author>
<title>A Report On The Development Of Gypsy.</title>
<pages>116-122</pages>
<year>1978</year>
<crossref>conf/acm/1978-1</crossref>
<booktitle>ACM Annual Conference (1)</booktitle>
<ee>https://doi.org/10.1145/800127.804078</ee>
<url>db/conf/acm/csc1978-1.html#GoodCH78</url>
</inproceedings>
</r>
<coauthors n="10" nc="1">
<co c="0"><na f="b/Bevier:William_R=" pid="30/5078">William R. Bevier</na></co>
<co c="0"><na f="b/Boyer:Robert_S=" pid="b/RobertSBoyer">Robert S. Boyer</na></co>
<co c="0"><na f="g/Good:Donald_I=" pid="55/332">Donald I. Good</na></co>
<co c="0"><na f="h/Holt:Richard_C=" pid="h/RichardCHolt">Richard C. Holt</na></co>
<co c="0"><na f="h/Hunt:Warren_A=" pid="09/7554">Warren A. Hunt</na></co>
<co c="0"><na f="h/Hunter:Lawrence_W=" pid="77/5249">Lawrence W. Hunter</na></co>
<co c="0"><na f="k/Keeton=Williams:James_G=" pid="16/4577">James G. Keeton-Williams</na></co>
<co c="0"><na f="m/Moore:J_Strother" pid="m/JStrotherMoore">J Strother Moore</na></co>
<co c="0"><na f="s/Smith:Michael_K=" pid="190/8668">Michael K. Smith</na></co>
<co c="0"><na f="y/Young:William_D=" pid="10/247">William D. Young</na></co>
</coauthors>
</dblpperson>

