Michael C. Martin

Learn More
A number of effective error detection tools have been built in recent years to check if a program conforms to certain design rules. An important class of design rules deals with sequences of events asso-ciated with a set of related objects. This paper presents a language called PQL (Program Query Language) that allows programmers to express such questions(More)
Component-based software design is a popular and effective approach to designing large systems. While components typically have well-defined interfaces, sequencing information---which calls must come in which order---is often not formally specified.This paper proposes using multiple finite statemachine (FSM) submodels to model the interface of a class. A(More)
This article describes the design rationale, a C implementation, and conformance testing of a subset of the new Standard for the BLAS (Basic Linear Algebra Subroutines): Extended and Mixed Precision BLAS. Permitting higher internal precision and mixed input/output types and precisions allows us to implement some algorithms that are simpler, more accurate,(More)
Plasmons describe collective oscillations of electrons. They have a fundamental role in the dynamic responses of electron systems and form the basis of research into optical metamaterials. Plasmons of two-dimensional massless electrons, as present in graphene, show unusual behaviour that enables new tunable plasmonic metamaterials and, potentially,(More)
Program analysis has been increasingly used in softwareengineering tasks such as auditing programs for securityvulnerabilities and finding errors in general. Such tools oftenrequire analyses much more sophisticated than those traditionallyused in compiler optimizations. In particular, context-sensitivepointer alias information is a prerequisite for any(More)
Cross-site scripting (XSS) and SQL injection errors are two prominent examples of taint-based vulnerabilities that have been responsible for a large number of security breaches in recent years. This paper presents QED, a goal-directed model-checking system that automatically generates attacks exploiting taint-based vulnerabilities in large Java web(More)
SQL injection and cross-site scripting are two of the most common security vulnerabilities that plague web applications today. These and many others result from having unchecked data input reach security-sensitive operations. This paper describes a language called PQL (Program Query Language) that allows users to declare to specify information flow patterns(More)
The role of humic acid (HA) in the biodegradation of toxic polycyclic aromatic hydrocarbons (PAHs) has been the subject of controversy, particularly in unsaturated environments. By utilizing an infrared spectromicroscope and a very bright, nondestructive synchrotron photon source, we monitored in situ and, over time, the influence of HA on the progression(More)
The electronic bandgap is an intrinsic property of semiconductors and insulators that largely determines their transport and optical properties. As such, it has a central role in modern device physics and technology and governs the operation of semiconductor devices such as p-n junctions, transistors, photodiodes and lasers. A tunable bandgap would be(More)
Synchrotron radiation based Fourier transform IR (SR-FTIR) spectromicroscopy allows the study of individual living cells with a high signal to noise ratio. Here we report the use of the SR-FTIR technique to investigate changes in IR spectral features from individual human lung fibroblast (IMR-90) cells in vitro at different points in their cell cycle. Clear(More)