Annika Lee Louise Peterson 2015

Formal Verification of a Controlled Flight Between Two Robots: A Case Study
Research Summary

Laxman J. Dhulipala 2014

Compressing Natural Graphs and a Practical Work-Efficient Parallel Connectivity AlgorithmResearch Summary

Adrian Trejo Nuñez 2013

Classification and Automaticity of Discrete Dynamical SystemsResearch Summary

Henry D. DeYoung 2008

An Authorization Logic with Explicit TimeResearch Summary | SCS Undergraduate Thesis

Kanat Tangwongsan2006

Active Data Structures and Applications to Dynamic and Kinetic Algorithms

Research Summary

Active Data Structures and Applications to Dynamic and Kinetic Algorithms

Research Summary

John White Heffner2002

High Bandwidth TCP Queuing

High Bandwidth TCP Queuing

Daniel Maynes-Aminzade 2001

Techniques for Interactive Audience Participation

Techniques for Interactive Audience Participation

Mark Ronald Plesko 2000

Towards Verification of a Proof-Carrying Code Architecture in a Linear Logical Framework

Towards Verification of a Proof-Carrying Code Architecture in a Linear Logical Framework

Patrick Francis Riley 1999

Multi-Agent Environment

Multi-Agent Environment

Kevin William Hamlen 1998

Proof-Carrying Code for x86 Architectures

Proof-Carrying Code for x86 Architectures

Hongsuda Tangmunarunkit 1997

Network-Award Distributed Computing

Network-Award Distributed Computing

Kevin Rathbun Walker 1996

User-Level TCP in a Flow Controlled ATM LAN

User-Level TCP in a Flow Controlled ATM LAN

Daniel R. Richards 1995

Image Analysis for Automated Genotyping

Image Analysis for Automated Genotyping

C. Lawrence Zitnick 1995

Projective Stereo Vision

Projective Stereo Vision

Sean J. Hallgren 1994

Linear Congruential Generators Over Elliptic Curves

Linear Congruential Generators Over Elliptic Curves

Karl F. Crary 1993

Typing of a Practical Programming Language with Higher Kinds and Higher-Order Modules

Typing of a Practical Programming Language with Higher Kinds and Higher-Order Modules

Erik W. Selberg 1993

Stopping a Cheater: Secret Sharing with Dishonest Participation

Stopping a Cheater: Secret Sharing with Dishonest Participation