Author: Karl N. Levitt
Publications
Co-authors
Productive Colleagues
- David Miller
- Peng Liu
- Ruzena Bajcsy
- 7
- 11
- 12
Publications
Bajcsy, Ruzena, Benzel, Terry, Bishop, Matt, Braden, Robert, Brodley, Carla E., Fahmy, Sonia, Floyd, Sally, Hardaker, W., Joseph, Anthony D., Kesidis, George, Levitt, Karl N., Lindell, Robert, Liu, Peng, Miller, David, Mundy, Russ, Neuman, Cliford, Ostrenga, Ron (2004): Cyber defense technology networking and evaluation. In Communications of the ACM, 47 (3) pp. 58-61. https://dl.acm.org/doi/10.1145/971617.971646
Spitzen, Jay M., Levitt, Karl N., Robinson, Lawrence (1978): An Example of Hierarchical Design and Proof. In Communications of the ACM, 21 (12) pp. 1064-1075.
Robinson, Lawrence, Levitt, Karl N. (1977): Proof Techniques for Hierarchically Structured Programs. In Communications of the ACM, 20 (4) pp. 271-283.
Levitt, Karl N., Kautz, William H. (1972): Cellular Arrays for the Solution of Graph Problems. In Communications of the ACM, 15 (9) pp. 789-801.
Heckman, Mark, Levitt, Karl N. (1998): Applying the Composition Principle to Verify a Hierarchy of Security Servers. In: HICSS 1998 , 1998, . pp. 338-347. https://csdl.computer.org/comp/proceedings/hicss/1998/8239/03/82390338abs.htm
Zhang, Cui, Becker, Brian R., Peticolas, Dave, Heckman, Mark, Levitt, Karl N., Olsson, Ronald A. (1997): Verification of a Distributed Computing. In: HICSS 1997 , 1997, . pp. 252-261. https://csdl.computer.org/comp/proceedings/hicss/1997/7734/05/7734050252abs.htm