1. Enhanced Instruction Set Randomization Design Space Exploration Tarek, Mohammed Ibn Zaid; Sethumadhavan, Simha 2019 Reports Computer scienceComputer securityHeterogeneous computing
2. Introduction to Security for Computer Architecture Students Sethumadhavan, Simha; Hastings, Adam K.; Tarek, Mohammed Ibn Zaid 2019 Reports Computer scienceComputer architectureComputer security
3. Analysis of Super Fine-Grained Program Phases Bui, Van; Kim, Martha Allen 2017 Reports Computer sciencePhase detectorsParallel programming (Computer science)
4. Searching for Meaning in RNNs using Deep Neural Inspection Lin, Kevin; Wu, Eugene 2017 Reports Neural networks (Computer science)Computer scienceNeurons
5. Further Information on Miller's 1882 One-Time Pad Bellovin, Steven Michael 2016 Reports CryptographersData encryption (Computer science)CryptographyComputer science
6. Grandet: A Unified, Economical Object Store for Web Applications Tang, Yang; Hu, Gang; Yuan, Xinhao; Weng, Lingmei; Yang, Junfeng 2016 Reports Computer scienceCloud computingComputers--Economic aspectsWeb applications
7. Identifying Functionally Similar Code in Complex Codebases Su, Fang-Hsiang; Bell, Jonathan; Kaiser, Gail E.; Sethumadhavan, Simha 2016 Reports Software engineeringComputer softwareComputer software--DevelopmentComputer programmingComputer science
8. Software Engineering Methodologies and Life Lennon, Scott 2016 Reports Open source softwareAgile software developmentSoftware engineeringComputer scienceLinux
9. Understanding and Detecting Concurrency Attacks Gu, Rui; Gan, Bo; Ning, Yi; Cui, Heming; Yang, Junfeng 2016 Reports Computer scienceCyberterrorismSoftware engineering
10. User Study: Programming Understanding from Similar Code Sivasankar, Anush Ramsurat Ganapathi Agraharam 2016 Reports Computer programmingProgramming languages (Electronic computers)Programming languages (Electronic computers)--SemanticsComputer science--Study and teachingComputer science