To address national needs for computer security education, many universities have incorporated computer and security courses into their undergraduate and graduate curricula. In th...
We describe a monadic interface to low-level hardware features that is a suitable basis for building operating systems in Haskell. The interface includes primitives for controllin...
Thomas Hallgren, Mark P. Jones, Rebekah Leslie, An...
Abstract. Contemporary workflow management systems offer workitems to users through specific work-lists. Users select the work-items they will perform without having a specific sch...
Ronny Mans, Nick C. Russell, Wil M. P. van der Aal...
Commodity operating systems entrusted with securing sensitive data are remarkably large and complex, and consequently, frequently prone to compromise. To address this limitation, ...
Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis,...
Scientists today conduct new research via software-based experimentation and validation in a host of disciplines, including materials science, life sciences, astronomy, and physic...
David Woollard, Chris Mattmann, Daniel Popescu, Ne...