A large class of security attacks exploit software implementation vulnerabilities such as unchecked buffers. This paper proposes Transparent Runtime Randomization (TRR), a general...
Non-interference is a high-level security property that guarantees the absence of illicit information leakages through executing programs. More precisely, non-interference for a p...
There has been much work in recent years on extending ML with recursive modules. One of the most difficult problems in the development of such an extension is the double vision pr...
Abstract. Large-scale scientific investigation often includes collaborative data exploration among geographically distributed researchers. The tools used for this exploration typi...
Abstract. Publish/subscribe model is appropriate in many push based data dissemination applications such as data dissemination services, information sharing, service discovery, etc...
Sangyoon Oh, Sangmi Lee Pallickara, Sung Hoon Ko, ...