Analyzing and addressing false interactions during compiler optimization phase ordering.
A survey report of enhancements to the visitor software design pattern.
Analysis of operating system diversity for intrusion tolerance.
Performance of the most common non-cryptographic hash functions.