We describe an methodology for testing a software system for possible security flaws. Based on the observation that most security flaws are caused by the program’s inappropria...
We present lessons learned from developing Alice, a 3D graphics programming environment designed for undergraduates with no 3D graphics or programming experience. Alice is a Windo...
Matthew Conway, Steve Audia, Tommy Burnette, Denni...
This paper describes an architecture for supporting interface attuchments- small interactive programs which are designed to augment the functionality of other applications. This a...
Dan R. Olsen, Scott E. Hudson, Thom Verratti, Jere...
Krylov-subspace based methods for generating low-order models of complicated interconnect are extremely effective, but there is no optimality theory for the resulting models. Alte...
An important practical problem in fault diagnosis is discriminating between permanent faults and transient faults. In many computer systems, the majority of errors are due to tran...
M. Pizza, Lorenzo Strigini, Andrea Bondavalli, Fel...