Formal Requirements for Virtualizable Third Generation Architectures (1974)

Eight Early Encyclopedia Projects and the Mechanisms of Collective Action (2013)

An Integrating, Transformation-Oriented Approach to Concurrency Control and Undo in Group Editors

Tombstone Transformation Functions for Ensuring Consistency in Collaborative Editing Systems

The Cartesian Product Algorithm (Type Inference) (1995)

High-resolution electromagnetic calorimetry with noble liquids (1998)

Hard-Coding Bottom-Up Code Generation Tables to Save Time and Space (1991)

Notes on the Plan 9 3rd Edition Kernel Source

Language as an intellectual tool: From hieroglyphics to APL (1991)

The 12 Commandments of Synchronization [2011]

Thin Locks: Featherweight Synchronization for Java (1998)

Narwhals or Unicorns? Exotic Animals in Medieval Europe (2004)

Automatic review of abstract state machines by meta property verification (2010)

Slim Binaries (1997)

From Hieroglyphics to APL (1991)

Evaluating Combinatorial vs Exhaustive Testing of DOM Events (2013)

Xz-ordering: A space-filling curve for objects with spatial extension

Steganography for Radio Amateurs– A DSSS Based Approach for Slow Scan Television

Implementing the Reliable Data Protocol (RDP) (1987)

Closing the Gap Between Specification and Programming: VDM++ and Scala

Interpreting Programs in Static Single Assignment Form (2004)

Reverse-Engineering and Implementation of the RDP 5 Protocol (2004)

A Distributed, Secure System (Extended Abstract) (1983)

A VLSI Analog Computer / Math Co-processor for a Digital Computer

Engineering a Sort Function [1993]

A Beginner’s Guide to the Mathematics of Neural Networks (1998)

Runtime Analysis of the M-to-N Schedulling Model (1996)

The Boom Hierarchy (1993)

Formally-Verified, Decentralized, Key-Management Architecture for Wireless Sensor Networks

Secure Browser Architecture Based on Hardware Virtualization

More →