Verifying an I/O-concurrent, File System (2017)

Model Based Reasoning – Troubleshooting (1988)

The Strong Story Hypothesis and the Directed Perception Hypothesis

A Symbolic Analysis of Relay and Switching Circuits (1936)

Faster algorithms for Linear Programming, Graph Sparsification and other problems [2016] [PDF] (via r/math)

The Connection Machine (1985)

Riffle: an efficient communication system with strong anonymity

Techniques for Data Hiding in Audio Files (1995)

Leading a Child to a Computer Culture (1975)

Keys Under Doormats (2015)

FPGA-based hardware acceleration for a key-value store database (2014)

Keys Under Doormats: Mandating insecurity by requiring government access

Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications

The Art of the Propagator (2009)

Loop perforation transforms loops to skip some of the iterations (2009)

Keys Under Doormats

Intelligence Without Reason (1991) [pdf]

Design of Lisp-Based Processors Or, LAMBDA: The Ultimate Opcode [pdf]

Multi-Person Motion Tracking via RF Body Reflections