Powerpoint slides
Lec1 Intro
Distributed computing presentation
CO522 2009/1075 Recursion on linked lists All the linked list examples we have seen so far use iteration when they need to work through the nodes of a.
Improving Integer Security for Systems with KINT Xi Wang, Haogang Chen, Zhihao Jia, Nickolai Zeldovich, Frans Kaashoek MIT CSAIL Tsinghua IIIS.
Inheritance
A topology of memory leaks on the JVM
Strategies For Making Friends
Automatic Identification of Bug-Introducing Changes
Software to the slaughter
Buffer Overflow & Return Address Attack