emeryblogger.com
ACM Queue article: “Software Needs Seatbelts and Airbags” | Emery Blogger
https://emeryblogger.com/2012/07/24/acm-queue-article-software-needs-seatbelts-and-airbags
ACM Queue article: “Software Needs Seatbelts and Airbags”. July 24, 2012. Based on an earlier blog post. ACM Queue, July 2012 – http:/ queue.acm.org/detail.cfm? Software Needs Seatbelts and Airbags. Finding and fixing bugs in deployed software is difficult and time-consuming. Here are some alternatives. Software Needs Seatbelts and Airbags. Most Influential Paper of OOPSLA 2002: “Reconsidering Custom Memory Allocation”. Emery Berger's Blog. Professor of Computer Science. Join 1,217 other followers. Build...
polylogblog.wordpress.com
CPM 2015 | the polylogblog
https://polylogblog.wordpress.com/2015/01/22/cpm-2015
January 22, 2015 in Uncategorized. Asked me to remind everyone that the deadline for the 26th Annual Symposium on Combinatorial Pattern Matching. Is fast approaching. You have until 2nd February to match your combinatorial pattern. A research blog about data streams and related topics. I'd have enjoyed #StrangerThings. A lot more had I not seen youtu.be/Avp9aUkM5g0. When someone dies who you never knew but whose work was helpful in your research. Thanks! A CS Professor's blog. Ernie's 3D Pancakes. We def...
web.eecs.umich.edu
Kevin Fu
https://web.eecs.umich.edu/~kevinfu
20613;佳偉. Associate Professor, Sloan Research Fellow. Computer Science and Engineering. Electrical Engineering and Computer Science. 8212; PGP Key. My research aims to make embedded computer systems smarter: better security and safety, reduced energy consumption, faster performance. As part of my 164-year research plan to improve the trustworthiness of medical device software. I direct the Archimedes Research Center for Medical Device Security. And the Security and Privacy Research (SPQR). Program chair ...
emeryblogger.com
Most Influential Paper of OOPSLA 2002: “Reconsidering Custom Memory Allocation” | Emery Blogger
https://emeryblogger.com/2012/10/28/most-influential-oopsla2012
Most Influential Paper of OOPSLA 2002: “Reconsidering Custom Memory Allocation”. October 28, 2012. Our paper, Reconsidering Custom Memory Allocation. Was just granted the Most Influential OOPSLA Paper. Award (given ten years after the paper appeared). Here’s the citation for the award. I am grateful to OOPSLA not only for the check for $333.33. But also for giving me the chance to publicly stand up and thank my wonderful co-authors: my excellent colleague Ben Zorn. And my awesome advisor, Kathryn McKinley.
emeryblogger.com
Security | Emery Blogger
https://emeryblogger.com/category/security
Me on PBS, Explaining Cyberattacks on Banks. December 4, 2012. Me on PBS, Explaining Cyberattacks on Banks. My latest appearance on our local PBS affiliate WGBY’s program Connecting Point, this time explaining cyberattacks on banks (not a how-to! 8212; first segment. May 8, 2012. Scary, but probably should check your computer just in case: me on WGBY. Explaining about the DNS Changer Trojan Horse. Me on PBS: “Cyberterrorism” Interview. February 29, 2012. January 18, 2012. Cybersecurity interview on PBS.
emeryblogger.com
Me on PBS, Explaining Cyberattacks on Banks | Emery Blogger
https://emeryblogger.com/2012/12/04/me-on-wgby-explaining-cyberattacks-on-banks
Me on PBS, Explaining Cyberattacks on Banks. December 4, 2012. Me on PBS, Explaining Cyberattacks on Banks. My latest appearance on our local PBS affiliate WGBY’s program Connecting Point, this time explaining cyberattacks on banks (not a how-to! 8212; first segment. Most Influential Paper of OOPSLA 2002: “Reconsidering Custom Memory Allocation”. New Scientist coverage of our AutoMan project. Emery Berger's Blog. Professor of Computer Science. At the University of Massachusetts Amherst. Post was not sent...
emeryblogger.com
Link | Format | Emery Blogger
https://emeryblogger.com/type/link
Me on PBS, Explaining Cyberattacks on Banks. December 4, 2012. Me on PBS, Explaining Cyberattacks on Banks. My latest appearance on our local PBS affiliate WGBY’s program Connecting Point, this time explaining cyberattacks on banks (not a how-to! 8212; first segment. Emery Berger's Blog. Professor of Computer Science. At the University of Massachusetts Amherst. Enter your email address to subscribe to this blog and receive notifications of new posts by email. Join 1,217 other followers.
emeryblogger.com
Washington Post, Take Down This Article! | Emery Blogger
https://emeryblogger.com/2014/08/31/washington-post-take-down-this-article
Washington Post, Take Down This Article! August 31, 2014. The Washington Post just published an article from a kid claiming he graduated at the top of his class at Penn State in Computer Science but couldn’t find a job. And a previous version of the article. From Sept. 2013. Washington Post, Take Down This Article! This was initially publicly posted on Facebook here:. Https:/ www.facebook.com/EmeryBerger/posts/10102236661609092. Ark also fails to mention that he attended a satellite campus rather than th...
emeryblogger.com
Miscellaneous | Emery Blogger
https://emeryblogger.com/category/miscellaneous
A Guide for Session Chairs. June 8, 2016. I just sent this message as a guide to the program committee members who will be chairing sessions for PLDI 2016 (I figure it’s the first time for some of them). A few people suggested I post it, so here it is (lightly edited). Additions or other suggestions welcome. Before the session begins. You will have to talk to them about some stuff – see below. Find out how to pronounce their names. Find out i f they are on the market next year. Keep track of time. For PL...
emeryblogger.com
Software Needs Seatbelts and Airbags | Emery Blogger
https://emeryblogger.com/2012/05/31/software-needs-seatbelts-and-airbags
Software Needs Seatbelts and Airbags. May 31, 2012. This post is a draft version of an article slated to appear in ACM Queue.). Finding and fixing bugs in deployed software is difficult and time-consuming: here are some alternatives. Death, Taxes, and Bugs. Safe Languages: No Panacea. Writing new applications in memory-safe languages like Java instead of C/C would go some way towards mitigating these problems. For example, because Java uses garbage collection, Java programs are not susceptible to use...