- Full text PDF available (5)
nd Technology ship for the Nation's ce data, proof of ductive use of strative, s for the cost-effective security and privacy of sensitive unclassified information in federal computer systems. This Special Publication 800-series reports on ITL's research, guidelines, and outreach efforts in information security, and its collaborative activities with… (More)
— We present a specification language and algorithms for the online and offline monitoring of synchronous systems including circuits and embedded systems. Such monitoring is useful not only for testing, but also under actual deployment. The specification language is simple and expressive; it can describe both correctness/failure assertions along with… (More)
This paper presents a framework designed to ease the process of building GUIs for software productivity tools in Eclipse. This framework provides a general system with which external tools may display graphs and trees within Eclipse and may link these displays to source code. In addition, our framework can retrieve information from Eclipse, passing it back… (More)
Hardware trust and security now play critical roles as computing is intimately integrated into many infrastructures that we depend on. Trusted hardware platforms make up the backbone for successful deployment and operation of these infrastructures. Research in recent years show that as tampering and reverse engineering mature in their sophistication, the… (More)
ii Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by the National Institute of Standards and Technology, nor is it intended to imply that the entities, materials, or… (More)
We present the results of a group interview of choreographers aimed at understanding their conceptions of how movement can be used to in live performance. This understanding intended to inform research into full body interaction for live performance and other more general full body interfaces. The results of the interview suggest a new way of conceiving of… (More)
In Mileena Malign, a frightened doll moves helplessly to her own destruction at the hands of the very person who should love and protect her. In this cycle of abuse, our heroine doll is destroyed repeatedly, unable to escape the consequences of abuse, even in her dreams.