Jacob West

Learn More
Software model checking has become a popular tool for verifying programs' behavior. Recent results suggest that it is viable for finding and eradicating security bugs quickly. However, even state-of-the-art model checkers are limited in use when they report an overwhelming number of false positives, or when their lengthy running time dwarfs other software(More)
Realizing the theoretical promise of quantum computers will require overcoming decoherence. Here we demonstrate numerically that high fidelity quantum gates are possible within a framework of quantum dynamical decoupling. Orders of magnitude improvement in the fidelities of a universal set of quantum gates, relative to unprotected evolution, is achieved(More)
S its publication more than 50 years ago, “The Ecology of Medical Care” (1) has provided a framework for understanding how persons seek and receive health care. Drawing on diary studies and other data from the United States and the United Kingdom, White and colleagues (1) found that only 2 in 5 persons who are ill consider seeking care and among those, only(More)
We begin by describing the system Fortify uses for ranking vulnerabilities and our method for assigning a program an over-all score. We then consider another popular vulnerability ranking system (CVSS) and explain why it is less useful for ranking static analysis results. We use the second half of the paper to explain the motivation and method behind our(More)
  • 1