We present a programming model for building web applications with security properties that can be confidently verified during a security review. In our model, applications are d...
Akshay Krishnamurthy, Adrian Mettler, David Wagner
This paper discusses our experience in teaching an interdisciplinary general education course called Sound Thinking that is offered jointly by our Dept. of Computer Science and De...
Alex Ruthmann, Jesse M. Heines, Gena R. Greher, Pa...
In recent years, many document image retrieval algorithms have been proposed. However, most of the current approaches either need good quality images or depend on the page layout ...
Effect systems are important for reasoning about the side effects of a program. Although effect systems have been around for decades, they have not been widely adopted in practice...
Mohsen Vakilian, Danny Dig, Robert L. Bocchino Jr....
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...