A secure timeline is a tamper-evident historic record of the states through which a system goes throughout its operational history. Secure timelines can help us reason about the t...
Large-scale attacks generated by fast-spreading or stealthy malicious mobile code, such as flash worms and e-mail viruses, demand new approaches to patch management and disinfecti...
Phoenix/App supports software components whose states are made persistent across a system crash via redo recovery, replaying logged interactions. Our initial prototype force logge...
Traditional client-server applications relegate query and persistence operations on their data to database systems. The database system operates on data in the form of rows and ta...
Interpersonal awareness is one person’s up-to-the moment knowledge about other group members, while artifact awareness is one person’s up-to-the-moment knowledge about other g...
Saul Greenberg, Stephen Voida, Nathan Stehr, Kimbe...