Follow
David Wittenberg
David Wittenberg
Unknown affiliation
Verified email at cs.brandeis.edu
Title
Cited by
Cited by
Year
System for controlling access to a secure system by verifying acceptability of proposed password by using hashing and group of unacceptable passwords
DK Wittenberg, JS Leichter
US Patent 5,204,966, 1993
1311993
Rigorous modeling of hybrid systems using interval arithmetic constraints
TJ Hickey, DK Wittenberg
International Workshop on Hybrid Systems: Computation and Control, 402-416, 2004
522004
Hardware support for safety interlocks and introspection
U Dhawan, A Kwon, E Kadric, C Hritcu, BC Pierce, JM Smith, A DeHon, ...
2012 IEEE Sixth International Conference on Self-Adaptive and Self …, 2012
302012
Safe: A clean-slate architecture for secure systems
S Chiricescu, A DeHon, D Demange, S Iyer, A Kliger, G Morrisett, ...
2013 IEEE International Conference on Technologies for Homeland Security …, 2013
232013
Using Analytic CLP to Model and Analyze Hybrid Systems.
TJ Hickey, DK Wittenberg
FLAIRS, 269-274, 2004
112004
Leveraging layout with dimensional stacking and pixelization to facilitate feature discovery and directed queries
JT Langton, AA Prinz, DK Wittenberg, TJ Hickey
Visual Information Expert Workshop, 77-91, 2006
62006
Safe security proxy
HB Reubenstein, G Sullivan, D Wittenberg
US Patent 10,193,868, 2019
52019
CLP (F) Modeling of Hybrid Systems
DK Wittenberg
Brandeis University, 2004
42004
Modeling hybrid systems using analytic constraint logic programming
TJ Hickey, DK Wittenberg
Technical Report, Dep. Computer Science, Brandeis Univ., 2002
32002
Towards a Zero-Kernel Operating System
A Thomas, J McGrath, S Chiricescu, S Iyer, D Wittenberg, B Karel, ...
22013
Validated constraint compilation
TJ Hickey, DK Wittenberg
International Conference on Principles and Practice of Constraint …, 1999
21999
Automotive Vulnerability Detection System
DK Wittenberg, J Smith, R Gray, G Eakman
ESCARVDS4. pdf, 2016
12016
Applied vulnerability detection system
J Smith, B Krikeles, DK Wittenberg, M Taveniku
2015 IEEE International Symposium on Technologies for Homeland Security (HST …, 2015
12015
Modeling Hysteresis in CLIP–The Tank Flow Problem
DK Wittenberg, TJ Hickey
RELIABLE ENGINEERING COMPUTING, 91, 2006
12006
Notes on using CLIP
DK Wittenberg, TJ Hickey
12004
On Unverifiable—Facts “
DK Wittenberg
Brandeis Graduate Journal 1 (1), 2003
12003
PERFECT case studies demonstrating order of magnitude reduction in power consumption
DK Wittenberg, E Kadric, A DeHon, J Edwards, J Smith, S Chiricescu
2016 IEEE High Performance Extreme Computing Conference (HPEC), 1-7, 2016
2016
Simple Additive LSB Steganography in Losslessly Encoded Images
AZ Lakritz, P Macko, DK Wittenberg
2007
1 Pixelization Theory-1.2 Pixelization and Multidimensional Data-Leveraging Layout with Dimensional Stacking and Pixelization to Facilitate Feature Discovery and Directed Queries
JT Langton, AA Prinz, DK Wittenberg, TJ Hickey
Lecture Notes in Computer Science 4370, 77, 2007
2007
Reducing the Randomness Requirements for Quantum Money
DK Wittenberg
1995
The system can't perform the operation now. Try again later.
Articles 1–20