Northeastern University

Results: 1569



#Item
281

Northeastern University Systems Security Lab Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces 35th IEEE Symposium on Security and Privacy

Add to Reading List

Source URL: www.mulliner.org

Language: English - Date: 2014-05-20 14:31:13
    282

    Whole Page Optimization: How Page Elements Interact with the Position Auction PAVEL METRIKOV, Northeastern University FERNANDO DIAZ, Microsoft Research ´ SEBASTIEN

    Add to Reading List

    Source URL: ciir.cs.umass.edu

    Language: English - Date: 2014-04-21 10:32:34
      283

      Statement of Dr. Andrea M. Matwyshyn Microsoft Visiting Professor, Center for Information Technology Policy, Princeton University/ Professor of Law, Northeastern University/ Affiliate Scholar, Center for Internet and Soc

      Add to Reading List

      Source URL: docs.house.gov

      Language: English - Date: 2015-07-27 17:21:03
        284

        ETHICAL ISSUES FOR THE TWENTY-FIRST CENTURY EQUALITY, SUFFICIENCY, DECENCY: THREE CRITERIA OF ECONOMIC JUSTICE STEPHEN NATHANSON NORTHEASTERN UNIVERSITY

        Add to Reading List

        Source URL: usbig.net

        Language: English - Date: 2012-07-02 09:31:37
          285

          Note: A version of this article has been published in Catching A Wave: Reclaiming Feminism for the Twenty-First Century (2003, Northeastern University Press), ed. by Rory Dicker and Alison Piepmeier. For citation, use th

          Add to Reading List

          Source URL: www.confluere.com

          Language: English - Date: 2013-06-21 00:55:11
            286Logic / Theoretical computer science / Automated theorem proving / Logic programming / Logical truth / Propositional calculus / Substitution / Mathematical logic / Security type system / Symbol

            Verifying an Open Compiler Using Multi-Language Semantics James T. Perconti and Amal Ahmed Northeastern University Abstract. Existing verified compilers are proved correct under a closed-world assumption, i.e., that the

            Add to Reading List

            Source URL: www.ccs.neu.edu

            Language: English - Date: 2014-01-17 22:16:49
            287

            Partial Quantifier Elimination Eugene Goldberg, Panagiotis Manolios Northeastern University, USA {eigold,pete}@ccs.neu.edu Abstract. We consider the problem of Partial Quantifier Elimination (PQE). Given formula ∃X[F (

            Add to Reading List

            Source URL: eigold.tripod.com

            Language: English - Date: 2014-11-20 15:57:44
              288

              Discovering our models Trevor Muñoz University of Maryland @trevormunoz

              Add to Reading List

              Source URL: www.wwp.northeastern.edu

              Language: English - Date: 2014-05-22 13:45:25
                289

                Pushdown Flow Analysis of First-Class Control Dimitris Vardoulakis Olin Shivers Northeastern University

                Add to Reading List

                Source URL: dimvar.github.io

                Language: English - Date: 2015-03-02 02:45:18
                  290

                  Toward Robust Hidden Volumes Using Write-Only Oblivious RAM Erik-Oliver Blass, Travis Mayberry, Guevara Noubir, Kaan Onarlioglu College of Computer and Information Science Northeastern University, Boston, MA Email: {blas

                  Add to Reading List

                  Source URL: www.onarlioglu.com

                  Language: English - Date: 2014-11-11 22:43:43
                    UPDATE