Programs trusted with secure information should not release that information in ways contrary to system policy. However, when a program contains an illegal flow of information, cu...
Dave King 0002, Trent Jaeger, Somesh Jha, Sanjit A...
I have been designing and building applications, including the databases used by those applications, for several decades now. I have seen similar problems approached by different d...
1 We have constructed a team of intelligent agents that perform the tasks of an attack helicopter company for a synthetic battlefield environment used for running largescale milita...
Randall W. Hill Jr., Johnny Chen, Jonathan Gratch,...
During the past decade, object-orientation (OO) has become the dominant software development methodology, accompanied by a number of modeling notations, programming languages, and...
Drawing on recent theoretical efforts, a three dimensional model of anonymity in computer-supported group discussion is developed. Applying this model to a review of empirical lit...