Portable RK: A Portable Resource Kernel for Guaranteed and Enforced Timing Behavior (1999)

The Abstract is an Enemy: Alternative Perspectives to Computational Thinking

Towards High Assurance HTML5 Applications (2014)

Set Theory and Algebra in CS: Introduction to Mathematical Modeling (2013)

The Five Cognitive Distortions of People Who Get Stuff Done

Faster, Scannerless, GLR Parsing (2009)

Deterministically Deterring Timing Attacks in Deterland (2016)

Computation at the Edge of Chaos (1990)

Cognitive Networks: Brains, Internet, and Civilizations (2017)

Adopting Cleanroom Software Engineering with a Phased Approach (1994)

Implementation Techniques for Prolog [pdf]

Oral conception. Impregnation via the proximal gastrointestinal tract... (1988)

Design of the Burroughs B1700 (1972)

The Comdyna GP-6 Analog Computer: Alive but not Exactly Kicking (2005)

Design and Evaluation of FPGA-Based Gigabit Ethernet Network Card (2004)

Boosting the Permissiveness of Dynamic Information-Flow Tracking by Testing (2012)

Optimizing Paxos with batching and pipelining

UCLA Secure UNIX (1977-1979)

Formal Specification, Verification, and Implementation of Fault-Tolerant Systems (2015)

Synthesis-Based Loose Programming (2010)

Compiler Construction: The Art of Niklaus Wirth

Synthesis - An Efficient Implementation of Fundamental Operating System Services (1992)

Language Constructs for Safe, Parallel Programming on Multicores (2016)

Parasitic Computing

Certified Development Tools Implementation in Objective Caml (2008)

prom: A Flexible, Prolog-based make tool (1991)

The Intel 80x86 Process Architecture: Pitfalls for Secure Systems (1995)

Towards a User-Mode Approach to Partitioned Scheduling in seL4 Microkernel (2012)

Verification of Erlang Programs using Abstract Interpretation and Model Checking (2001)

Software Requirements Errors in Safety-Critical, Embedded Systems (1993)

More →