Takip et
David Wittenberg
David Wittenberg
Bilinmeyen bağlantı
cs.brandeis.edu üzerinde doğrulanmış e-posta adresine sahip
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
System for controlling access to a secure system by verifying acceptability of proposed password by using hashing and group of unacceptable passwords
DK Wittenberg, JS Leichter
US Patent 5,204,966, 1993
1321993
Rigorous modeling of hybrid systems using interval arithmetic constraints
TJ Hickey, DK Wittenberg
International Workshop on Hybrid Systems: Computation and Control, 402-416, 2004
522004
Hardware support for safety interlocks and introspection
U Dhawan, A Kwon, E Kadric, C Hritcu, BC Pierce, JM Smith, A DeHon, ...
2012 IEEE Sixth International Conference on Self-Adaptive and Self …, 2012
302012
Safe: A clean-slate architecture for secure systems
S Chiricescu, A DeHon, D Demange, S Iyer, A Kliger, G Morrisett, ...
2013 IEEE International Conference on Technologies for Homeland Security …, 2013
232013
Using Analytic CLP to Model and Analyze Hybrid Systems.
TJ Hickey, DK Wittenberg
FLAIRS, 269-274, 2004
112004
Leveraging layout with dimensional stacking and pixelization to facilitate feature discovery and directed queries
JT Langton, AA Prinz, DK Wittenberg, TJ Hickey
Visual Information Expert Workshop, 77-91, 2006
62006
Safe security proxy
HB Reubenstein, G Sullivan, D Wittenberg
US Patent 10,193,868, 2019
52019
CLP (F) Modeling of Hybrid Systems
DK Wittenberg
Brandeis University, 2004
42004
Modeling hybrid systems using analytic constraint logic programming
TJ Hickey, DK Wittenberg
Technical Report, Dep. Computer Science, Brandeis Univ., 2002
32002
Towards a Zero-Kernel Operating System
A Thomas, J McGrath, S Chiricescu, S Iyer, D Wittenberg, B Karel, ...
22013
Validated constraint compilation
TJ Hickey, DK Wittenberg
International Conference on Principles and Practice of Constraint …, 1999
21999
Automotive Vulnerability Detection System
DK Wittenberg, J Smith, R Gray, G Eakman
ESCARVDS4. pdf, 2016
12016
Applied vulnerability detection system
J Smith, B Krikeles, DK Wittenberg, M Taveniku
2015 IEEE International Symposium on Technologies for Homeland Security (HST …, 2015
12015
Modeling Hysteresis in CLIP–The Tank Flow Problem
DK Wittenberg, TJ Hickey
RELIABLE ENGINEERING COMPUTING, 91, 2006
12006
Notes on using CLIP
DK Wittenberg, TJ Hickey
12004
On Unverifiable—Facts “
DK Wittenberg
Brandeis Graduate Journal 1 (1), 2003
12003
PERFECT case studies demonstrating order of magnitude reduction in power consumption
DK Wittenberg, E Kadric, A DeHon, J Edwards, J Smith, S Chiricescu
2016 IEEE High Performance Extreme Computing Conference (HPEC), 1-7, 2016
2016
Simple Additive LSB Steganography in Losslessly Encoded Images
AZ Lakritz, P Macko, DK Wittenberg
2007
1 Pixelization Theory-1.2 Pixelization and Multidimensional Data-Leveraging Layout with Dimensional Stacking and Pixelization to Facilitate Feature Discovery and Directed Queries
JT Langton, AA Prinz, DK Wittenberg, TJ Hickey
Lecture Notes in Computer Science 4370, 77, 2007
2007
Reducing the Randomness Requirements for Quantum Money
DK Wittenberg
1995
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20