Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Pushdown systems provide a natural model of software with recursive procedure calls. We provide a tool implementing an algorithm for computing the winning regions of a pushdown par...
Abstract—We investigate the design of declarative, domain-specific languages for constructing interactive visualizations. By separating specification from execution, declarativ...
Abstract--The proliferation of Data as a Service (DaaS) available on the Internet and offered by cloud service providers indicates an increasing trend in providing data under Web s...
Clinicians have determined that continuous ambulatory monitoring provides significant preventative and diagnostic benefit, especially to the aged population. In this paper we descr...
Mark A. Hanson, Harry C. Powell Jr., Adam T. Barth...