Dependent types provide a strong foundation for specifying and verifying rich properties of programs through type-checking. The earliest implementations combined dependency, which...
Mobile technologies, due to their ubiquitous nature, play an important role in supporting health care. However, it is not easy to design useful integrated mobile services without ...
In both the commercial and defense sectors a compelling need is emerging for highly dynamic, yet risk optimized, sharing of information across traditional organizational boundarie...
This paper describes the design, implementation, and evaluation of a Federated Array of Bricks (FAB), a distributed disk array that provides the reliability of traditional enterpr...
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...