Professor of Computer Science at Stevens Institute of Technology. Here's contact info and resume.
Fall 2010 none: on sabbatical leave
Spring 2010 CS 135 Discrete Structures
Fall 2009 CS 135 Discrete Structures
Spring 2009 CS 115 Introduction to Computer Science
Fall 2008 CS 115 Introduction to Computer Science and PhD Fall School on Logics & Semantics of State, IT University of Copenhagen
Spring 2008 CS 182 Introduction to Computer Science, Honors II and CS 496/510 Principles of Programming Languages
Seeking a PhD research assistant for work on programming methodology; requires background in automated theorem proving. For graduate students already attending Stevens: the normal process is to distinguish yourself in a course before seeking a position.
For undergrad and MS students: Scholarships for Service.
Undergraduate summer research: Contact me in Spring semester for projects. Here's my project for summer 2010. Some previous projects: 2005, 2006, 2008, and Dustin Long's honors thesis. Supported by the National Science Foundation as well as the Stevens Scholars program.
I'm affiliated with CASSIA, the Center for the Advancement of Secure Systems and Information Assurance.
My focus is on formal methods and software security, including: ad hoc network application security; fine-grained confidentiality/integrity policies; program analysis, verification, and transformation; correctness by construction; and methodology for formal specification of system components. For details see publications and items below.
Current and past PhD students: Stan Rosenberg; Chunyu Tang; Andrey Chudnov; Qi Sun (graduated Fall 2007).
With NSF support I'm working with Gary Leavens and others on the Java Modeling Language (JML), formal verification technology, methodology, and teaching. (NSF awards CNS-0708330 and CCF-0915611). Representative paper at the 22d ACM Symposium on Object-Oriented Programming, Systems, Languages, and Applications, 2007.
With support from the NSF Cyber Trust program I'm working with Anindya Banerjee on Access control and downgrading in information flow assurance. Our work includes collaboration with Marco Pistoia at IBM and researchers at INRIA. Representative papers appear in the 27th, 28th and 29th IEEE Symposia on Security and Privacy, May 2006, 2007, and 2008. See our Secure Information Flow Inferencer.
Collaborator on the Spec#/Boogie software specification/verification project (Microsoft Research, Foundations of Software Engineering group).
With support from Telcordia I'm working with Susanne Wetzel on high assurance for security in wireless networking
I co-chaired (with Stephen Chong) the 4th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security associated with PLDI 2009 in Dublin. I co-chaired (with Peter O'Hearn) the 2008 Theory Workshop of the Second IFIP Working Conference on Verified Software: Theories, Tools, Experiments and I'm co-chairing the Theory Workshop for 2010. I chaired the Theory Panel of the Verified Software Initiative and am a Corresponding Member of the Verified Software Repository Network.
My stylish home page, Lore-El Center for Women in Engineering and Science, air quality, life above 20 kHz, my Capoeira Angola master, news for nerds, quanta, the African diaspora, my Smyrneika, sax, and voice teachers, things musical, an ocean thereof, pop record ageing fan, Pandora's locked box, cry of the imaginary cuica.