CMU

biblio

Visible to the public Detecting Insider Threats in Software Systems using Graph Models of Behavioral Paths

biblio

Visible to the public A Course-Based Usability Analysis of Cilk Plus and OpenMP

biblio

Visible to the public Searching the State Space: A Qualitative Study of API Protocol Usability

biblio

Visible to the public A Theory of Tagged Objects.

biblio

Visible to the public Delegation vs Inheritance for Typestate Analysis

biblio

Visible to the public Evaluating the Flexibility of the Java Sandbox