System for controlling access to a secure system by verifying acceptability of proposed password by using hashing and group of unacceptable passwords DK Wittenberg, JS Leichter US Patent 5,204,966, 1993 | 131 | 1993 |
Rigorous modeling of hybrid systems using interval arithmetic constraints TJ Hickey, DK Wittenberg International Workshop on Hybrid Systems: Computation and Control, 402-416, 2004 | 52 | 2004 |
Hardware support for safety interlocks and introspection U Dhawan, A Kwon, E Kadric, C Hritcu, BC Pierce, JM Smith, A DeHon, ... 2012 IEEE Sixth International Conference on Self-Adaptive and Self …, 2012 | 30 | 2012 |
Safe: A clean-slate architecture for secure systems S Chiricescu, A DeHon, D Demange, S Iyer, A Kliger, G Morrisett, ... 2013 IEEE International Conference on Technologies for Homeland Security …, 2013 | 23 | 2013 |
Using Analytic CLP to Model and Analyze Hybrid Systems. TJ Hickey, DK Wittenberg FLAIRS, 269-274, 2004 | 11 | 2004 |
Leveraging layout with dimensional stacking and pixelization to facilitate feature discovery and directed queries JT Langton, AA Prinz, DK Wittenberg, TJ Hickey Visual Information Expert Workshop, 77-91, 2006 | 6 | 2006 |
Safe security proxy HB Reubenstein, G Sullivan, D Wittenberg US Patent 10,193,868, 2019 | 5 | 2019 |
CLP (F) Modeling of Hybrid Systems DK Wittenberg Brandeis University, 2004 | 4 | 2004 |
Modeling hybrid systems using analytic constraint logic programming TJ Hickey, DK Wittenberg Technical Report, Dep. Computer Science, Brandeis Univ., 2002 | 3 | 2002 |
Towards a Zero-Kernel Operating System A Thomas, J McGrath, S Chiricescu, S Iyer, D Wittenberg, B Karel, ... | 2 | 2013 |
Validated constraint compilation TJ Hickey, DK Wittenberg International Conference on Principles and Practice of Constraint …, 1999 | 2 | 1999 |
Automotive Vulnerability Detection System DK Wittenberg, J Smith, R Gray, G Eakman ESCARVDS4. pdf, 2016 | 1 | 2016 |
Applied vulnerability detection system J Smith, B Krikeles, DK Wittenberg, M Taveniku 2015 IEEE International Symposium on Technologies for Homeland Security (HST …, 2015 | 1 | 2015 |
Modeling Hysteresis in CLIP–The Tank Flow Problem DK Wittenberg, TJ Hickey RELIABLE ENGINEERING COMPUTING, 91, 2006 | 1 | 2006 |
Notes on using CLIP DK Wittenberg, TJ Hickey | 1 | 2004 |
On Unverifiable—Facts “ DK Wittenberg Brandeis Graduate Journal 1 (1), 2003 | 1 | 2003 |
PERFECT case studies demonstrating order of magnitude reduction in power consumption DK Wittenberg, E Kadric, A DeHon, J Edwards, J Smith, S Chiricescu 2016 IEEE High Performance Extreme Computing Conference (HPEC), 1-7, 2016 | | 2016 |
Simple Additive LSB Steganography in Losslessly Encoded Images AZ Lakritz, P Macko, DK Wittenberg | | 2007 |
1 Pixelization Theory-1.2 Pixelization and Multidimensional Data-Leveraging Layout with Dimensional Stacking and Pixelization to Facilitate Feature Discovery and Directed Queries JT Langton, AA Prinz, DK Wittenberg, TJ Hickey Lecture Notes in Computer Science 4370, 77, 2007 | | 2007 |
Reducing the Randomness Requirements for Quantum Money DK Wittenberg | | 1995 |