Model-Driven Engineering: a bottom-up approach based on meta-programming (ELA-ES'2013)
"To trust or not to trust?" Telle est la question
Digital Responsibility: towards a new world order ?
hashdays 2011: Jean-Philippe Aumasson - Cryptanalysis vs. Reality
Profiling and optimizing RAM and CPU use in RMG-Py
Reinstating Trust in the Digital Age
Refractoring
Ivan E. Sutherland ACM Turing Award Winner 1988 Biographical Information ¤General Background ¤Education ¤Early Work and Teaching ¤Sun Microsystems ¤Summary.
1 Part 2: Attacks and Countermeasures u Vulnerabilities u System Attacks Virus, Trojan, Worm Buffer overflow Rootkit Zombies Web based attacks.
Review COMPSCI 210 Recitation 7th Dec 2012 Vamsi Thummala.
Various graphics re ’50 years of Computing’ April 12th.
The 50th Anniversary of Algol 60