• Publications
  • Influence
Facilitating Remote Laboratory Deployments Using a Relay Gateway Server Architecture
TLDR
This paper presents a novel remote laboratory Relay Gateway Server architecture, which further facilitates the connectivity of remote students, instructors, and experiments. Expand
  • 25
  • 1
Safe bounds check annotations
TLDR
This paper presents a framework in which thorough static range analyses can be used safely during the less‐performance‐critical compilation of Java source into machine‐independent mobile code. Expand
  • 6
  • 1
  • PDF
Security completeness: towards noninterference in composed languages
TLDR
This paper defines completeness with respect to secure computations and formally establishes conditions sufficient for a security-typed language to be complete. Expand
  • 5
  • 1
Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule
TLDR
We present a policy specification language based on a restricted subset of first order temporal logic (FOTL) which can capture the privacy requirements of HIPAA. Expand
  • 27
  • PDF
An Assessment of Remote Laboratory Experiments in Radio Communication
TLDR
This paper presented a systematic assessment of a remote radio communication lab, carried out on a dedicated remote lab system developed by the authors. Expand
  • 15
Safe bounds check annotations
TLDR
This paper presents a framework in which thorough static range analyses can be used safely during the less-performance-critical compilation of Java source into machine-independent mobile code. Expand
  • 6
Speculative improvements to verifiable bounds check elimination
TLDR
This paper presents a novel combination of two techniques to alleviate this problem. Expand
  • 6
  • PDF
A Verifiable, Control Flow Aware Constraint Analyzer for Bounds Check Elimination
TLDR
We present a new algorithm based on extended Static Single Assignment (eSSA) form that builds a constraint system representing control flow qualified, linear constraints among program variables derived from program statements. Expand
  • 7
  • PDF
Safe, multiphase bounds check elimination in Java
TLDR
This paper describes a Java implementation that utilizes a multiphase approach to identifying safe array accesses. Expand
  • 6
  • PDF
Information Flow Control with Errors
TLDR
We propose to make the handling of method-not-found errors explicit in the security type system for a functional object calculus with extension. Expand
  • 2
  • PDF