Data for Good: Ensuring the Responsible Use of Data to Benefit Society | 0 | 0.34 | 2020 |
Transforming Probabilistic Programs for Model Checking | 0 | 0.34 | 2020 |
Ensuring Fairness Beyond the Training Data | 0 | 0.34 | 2020 |
Data for Good: Abstract. | 0 | 0.34 | 2018 |
Societal Impact of Data Science and Artificial Intelligence. | 0 | 0.34 | 2018 |
Embracing Uncertainty. | 0 | 0.34 | 2017 |
Progress in computational thinking, and expanding the HPC community. | 3 | 0.44 | 2016 |
Inverse Privacy. | 0 | 0.34 | 2016 |
Bootstrapping Privacy Compliance in Big Data Systems | 17 | 0.70 | 2014 |
A Methodology for Information Flow Experiments | 1 | 0.35 | 2014 |
Encouraging IT usage in future healthcare, quality in CS education | 0 | 0.34 | 2013 |
Formal methods: an industrial perspective. | 0 | 0.34 | 2013 |
Purpose Restrictions on Information Use. | 4 | 0.43 | 2013 |
Formalizing and Enforcing Purpose Restrictions in Privacy Policies | 24 | 0.86 | 2012 |
Jeannette M. Wing @ PCAST; Barbara Liskov keynote | 7 | 0.58 | 2011 |
On the Semantics of Purpose Requirements in Privacy Policies | 3 | 0.39 | 2011 |
Reviewing peer review. | 1 | 0.37 | 2011 |
Towards a theory of trust in networks of humans and computers | 16 | 1.22 | 2011 |
Computational thinking | 445 | 158.33 | 2011 |
Computational thinking | 445 | 158.33 | 2011 |
NSF funding advice: 21st century innovation | 11 | 0.59 | 2010 |
An ICT research agenda, HPC and innovation, and why only the developed world lacks women in computing | 3 | 0.40 | 2009 |
Report: Measuring the Attack Surfaces of Enterprise Software | 7 | 0.74 | 2009 |
CS woes: deadline-driven research, academic inequality | 1 | 0.35 | 2009 |
Extracting Conditional Confidentiality Policies | 3 | 0.41 | 2008 |
Five deep questions in computing | 11 | 3.66 | 2008 |
Software Security | 1 | 0.37 | 2007 |
Measuring the attack surfaces of two FTP daemons | 36 | 3.59 | 2006 |
Attack graph generation and analysis | 1 | 0.36 | 2006 |
Ranking Attack Graphs | 53 | 2.52 | 2006 |
Towards an algebra for security policies | 3 | 0.57 | 2005 |
Tools for Generating and Analyzing Attack Graphs | 80 | 4.62 | 2003 |
Platitudes and attitudes | 0 | 0.34 | 2003 |
A Call to Action: Look Beyond the Horizon | 8 | 0.60 | 2003 |
Vulnerability Analysis of Networked Systems | 2 | 0.41 | 2002 |
Automated generation and analysis of attack graphs | 509 | 35.10 | 2002 |
Survivability Analysis Of Networked Systems | 51 | 6.49 | 2001 |
Lightweight Formal Methods | 50 | 4.27 | 2001 |
Respectful Type Converters | 13 | 1.64 | 2000 |
The First World Congress on Formal Methods in the Development of Computing Systems | 0 | 0.34 | 2000 |
Invited Talk: Weaving Formal Methods into the Undergraduate Computer Science Curriculum | 10 | 0.69 | 2000 |
NSF workshop on a software research program for the 21st century | 1 | 0.64 | 1999 |
A Nitpick Analysis of Mobile IPv6 | 8 | 3.53 | 1999 |
FM'99 - Formal Methods, World Congress on Formal Methods in the Development of Computing Systems, Toulouse, France, September 20-24, 1999, Proceedings, Volume II | 47 | 13.97 | 1999 |
Proving Correctness of a Controller Algorithm for the RAID Level 5 System | 0 | 0.34 | 1998 |
Formal Methods: Past, Present, and Future (Abstract) | 0 | 0.34 | 1998 |
Temporal Query Processing and Optimization in Object-Oriented Databases | 1 | 0.36 | 1997 |
A Uniform Framework for Processing Temporal Object Queries | 0 | 0.34 | 1997 |
Formal Methods Light | 11 | 0.90 | 1996 |
Tools and partial analysis | 4 | 0.89 | 1996 |