Computer Security Johan Agat: Transforming out timing leaks Proc. of the 27th Symposium on Principles of programming languages Boston, MA, USA pp 40 - 53, 2000 http://doi.acm.org/10.1145/325694.325702 Dennis Volpano, Cynthia Irvine, GeoffreySmith: A sound type system for secure flow analysis Journal of Computer Secururity, Vol 4, 2-3 pp: 167--187, 1996 http://users.cis.fiu.edu/~smithg/papers/ Michele Boreale Quantifying Information Leakage in Process Calculi. Proc. of Automata, Languages and Programming (ICALP) Lecture Notes in Computer Science, Volume 4052, pp 119-131, 2006 http://rap.dsi.unifi.it/~boreale/research/publications.html Obfuscation and Watermarking Boaz Barak, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit Sahai, Salil Vadhan, Ke Yang: On the (Im)possibility of Obfuscating Programs Proc. of Advances in Cryptology - CRYPTO `01 Lecture Notes in Computer Science, Volume 2139 pp. 1-18, 2001. http://www.math.ias.edu/~boaz/Papers/obfuscate.html Christian Collberg, Tapas Ranjan Sahoo: Software watermarking in the frequency domain: Implementation, analysis, and attacks Journal of Computer Security, Volume 13, Issue 5 Special issue on security track at ACM symposium on applied computing 2004 Pages: 721 - 755, 2005 http://iospress.metapress.com/content/4m5d4q72wlabc9cl/ Roberto Giacobazzi and Isabella Mastroeni: Abstract Non-Interference: Parameterizing Non-Interference by Abstract Interpretation. Proc. of the 31st Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'04). pages 186-197. 2004. http://profs.sci.univr.it/~giaco/papers.html Patrick Cousot and Radhia Cousot. An Abstract Interpretation-Based Framework for Software Watermarking. Proc. of the 31st Symposium on Principles of Programming Languages (POPL'04), pp. 173—185, 2004 http://www.di.ens.fr/~cousot/COUSOTpapers/POPL04.shtml Quantum Computation and Automata Vincent Danos, Elham Kashefi, Prakash Panangaden: The measurement calculus Journal of the ACM (JACM) Volume 54, Issue 2 (April 2007), 2007 http://doi.acm.org/10.1145/1219092.1219096 Cristopher Moore, James P. Crutchfield: Quantum automata and quantum grammars Theoretical Computer Science Volume 237, Issue 1-2, pp 275-306 2000 http://dx.doi.org/10.1016/S0304-3975(98)00191-1 Christel Baier, Nathalie Bertrand, Marcus Grösser: The Effect of Tossing Coins in Omega-Automata Proc. of the 20th International Conference on Concurrency Theory (CONCUR '09), Lecture Notes in Computer Science, Volume 5710 pp. 15-29, 2009 http://doi.acm.org/10.1007/978-3-642-04081-8 Dynamic Instruction Reuse - Sodani & Sohi, 1997 - ftp://ftp.cs.wisc.edu/sohi/papers/1997/isca.inst-reuse.pdf Producing Wrong data without doing anything obviously wrong - Diwan, Hauswirth & Sweeney 2009 - http://www-plan.cs.colorado.edu/diwan/asplos09.pdf Unmodified Device Driver Reuse and Improved System Dependability via Virtual Machines - LeVasseur, Uhlig, Stoess, and Gotz, 2004 -http://l4ka.org/publications/2004/LeVasseur04UnmodifiedDriverReuse.pdf A Dynamic logical perspective on quantum behaviour - Baltag and Smets, 2008 - http://www.springerlink.com/content/5733821v37674231/ Hart, McKenney, and Demke Brown (2006). /Making Lockless Synchronization Fast: Performance Implications of Memory Reclamation / An IPDPS 2006 Best Paper comparing RCU's performance to that of other lockless synchronization mechanisms. /Journal version / (including Walpole as author). A Survey on Hair Modeling: Styling, Simulation, and Rendering (IEEE TVCG 2007) or similar by Ming Lin Zonal methods for the parallel execution of range-limited N-body simulations Kevin J. Bowers a, Ron O. Dror a, David E. Shaw Camilla Schwind: Causality in Action Theories. Electronic Transactions on Artificial Intelligence, Vol. 3 (1999), Section A, pp. 27-50. http://www.ep.liu.se/ej/etai/1999/007/. See discussion at http://www.ida.liu.se/ext/etai/ra/rac/018/rppf.html Aseem Agarwala, Mira Dontcheva, Maneesh Agrawala, Steven Drucker, Alex Colburn, Brian Curless, David Salesin, Michael Cohen. Interactive Digital Photomontage. ACM Transactions on Graphics (Proceedings of SIGGRAPH 2004), 2004. http://grail.cs.washington.edu/projects/photomontage/ Does the h index have predictive power? J. E. Hirsch. Proceedings of the National Academy of Science, December 4, 2007 vol. 104 no. 49 19193-19198 http://www.pnas.org/content/104/49/19193.abstract A Scalable Content-Addressable Network Paper Talk Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, Scott Shenker In Proceedings of ACM SIGCOMM 2001 http://www.icir.org/sylvia/ Existence of collisional trajectories of Mercury, Mars and Venus with the Earth. J. Laskar & M. Gastineau Nature 459, 817-819 (11 June 2009) | doi:10.1038/nature08096; Schroter, Sara, Black, Nick, Evans, Stephen, Godlee, Fiona, Osorio, Lyda, Smith, Richard What errors do peer reviewers detect, and does training improve their ability to detect them? J R Soc Med 2008 101: 507-514 Algorithms for Singleton Attractor Detection in Planar and Nonplanar AND/OR Boolean Networks Takeyuki Tamura and Tatsuya Akutsu Other papers (perhaps not for reviewing): S. Keshav. How to read a paper. ACM SIGCOMM Computer Communication Review, 37(3):83–84, July 2007. Timothy Roscoe. Writing reviews for systems conferences, March 2007. http://people.inf.ethz.ch/troscoe/pubs/ review-writing.pdf. Isaacs, R. 2008. Report on the 2007 SOSP shadow program committee. SIGOPS Oper. Syst. Rev. 42, 3 (Apr. 2008), 127-131. DOI= http://doi.acm.org/10.1145/1368506.1368524