Two computer science professors and a doctoral student in computer science in the School of Engineering are members of a technical team that has received a 2011 Associate Administrator Award from the Aeronautics Research Mission Directorate of the National Aeronautics and Space Administration.
Jim Cooper, U. S. Congressman for Tennessee's 5th District will be visiting ISIS on Monday, April 2, 2012. Congressman Cooper serves on the Committee on Armed Services and the Tactical Air and Land Forces Subcommittee.
IDEAS: Time to step-up local university-industry collaboration in Information Technologies, an article recently published in Venture Nashville Connections by Doug Schmidt, discusses the IT industry and the difficulty in finding, training, and retaining talented IT professionals in this region. But, there are some opportunities to find local talent when collaborating with universities and industry leaders. Dr.
According to Popular Mechanics, DARPA, the defense research group, wants better vehicles. They want them faster and cheaper. In order to accomplish this feat, they are looking to computer circuit builders.
According to the Wall Street Journal, GE will announce a $1 billion investment in software development over three years as it seeks to use software to make many of its products smarter and more profitable, as well as developing products capable of solving problems for customers.
At the heart of the investment is a new global software headquarters the company is building in northern California. The facility, slated to be opened by the middle of next year in San Ramon, Calif., will hire 400 software engineers and centralize its world-wide efforts.
State violation attacks towards web applications exploit logic flaws and allow restrictive functions and sensitive information to be accessed at inappropriate states. Since application logic flaws are specific to the intended functionality of a particular web application, it is difficult to develop a general approach that addresses state violation attacks. To date, existing approaches all require web application source code for analysis or instrumentation in order to detect state violations. In this paper, we present BLOCK, a Black-box approach for detecting state violation attacks.