We explore the extent to which newly available CPU-based security technology can reduce the Trusted Computing Base (TCB) for security-sensitive applications. We find that although...
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Mi...
Over the past seven years, we have been conducting a variety of participatory design activities with research biologists, programmers, and bioinformaticians at the Institut Pasteu...
-- The Fourth (4th ) Annual Student Research Symposium (SRS) for graduate and undergraduate students majoring in science, engineering, and mathematics will be conducted at Texas Ch...
James R. Comer, Tom Nute, Billy Farmer, Lisa J. Bu...
This report investigates the relationships between design patterns and programming languages. A comparison is carried out between the usual track of programming languages developme...
This paper presents a novel placement algorithm for timing optimization based on a new and powerful concept, which we term differential timing analysis. Recognizing that accurate ...
Amit Chowdhary, Karthik Rajagopal, Satish Venkates...