JavaScript is disabled for your browser. Some features of this site may not work without it.
eCommons will become read-only at noon on May 26 for an infrastructure update. Submissions will not be accepted at this time. We anticipate that this update will be completed by June 2 at 5 p.m.
Please contact us at ecommons-admin@cornell.edu if you have questions or concerns.
Computer Science
Browse by

The Department of Computer Science at Cornell University, which was organized in 1965, is one of the oldest departments of its kind in the country. It has a full-time faculty of 36, approximately 110 resident Ph.D. graduate students, 100 M.Eng students, and the undergraduate program graduates about 200 C.S. majors each year. The department is typically ranked as one of the top five in the country.
For more information, go to the Computer Science Home Page.
Collections in this community
Recent Submissions
-
Computing the exact and approximate Pareto frontier on tree-structured networks with application to reducing the adverse impacts of hydropower expansion on ecosystem services in the Amazon Basin
Gomes-Selman, Jonathan M.; Shi, Qinru; Perez, Guillaume (2021-12-13)Multi-objective optimization plays a key role in the study of real-world problems, as they often involve multiple criteria. In multi-objective optimization, it is important to identify the so-called Pareto frontier, which ... -
Data from: Autonomous synthesis of metastable materials
Ament, Sebastian; Amsler, Maximilian; Sutherland, Duncan R.; Chang, Ming-Chiang; Guevarra, Dan; Connolly, Aine B.; Gregoire, John M.; Thompson, Michael O.; Gomes, Carla P.; van Dover, R. Bruce (2021-08-13)Autonomous experimentation enabled by artificial intelligence (AI) offers a new paradigm for accelerating scientific discovery. Non-equilibrium materials synthesis is emblematic of complex, resource-intensive experimentation ... -
Tamperproof Provenance-Aware Storage for Mobile Ad Hoc Networks
Adams, Danny; Rubambiza, Gloire; Fiori, Pablo; Wang, Xinwen; Weatherspoon, Hakim; Van Renesse, Robbert (2020-12-08)This paper presents a middleware for providing a mobile ad hoc network with tamperproof provenance-aware storage, even when some fraction of devices can be Byzantine. Important considerations include fast propagation of ... -
One-way Functions Exist iff Kt-Complexity is Hard-on-Average
Unknown author (2020-03-27) -
RIF: Reactive Information Flow Labels
Kozyri, Elisavet; Schneider, Fred B. (2019-04-08)Restrictions that a reactive information flow (RIF) label imposes on a value are determined by the sequence of operations used to derive that value. This allows declassification, endorsement, and other forms of reclassification ... -
Using Information Flow to Design an ISA that Controls Timing Channels
Zagieboylo, Drew; Suh, Gookwon Edward; Myers, Andrew C. (2019)Information-flow control (IFC) enforcing languages can provide high assurance that software does not leak information or allow an attacker to influence critical systems. IFC hardware description languages have also been ... -
Beyond Labels: Permissiveness for Dynamic Information Flow Enforcement
Kozyri, Elisavet; Schneider, Fred B.; Bedford, Andrew; Desharnais, Josée; Tawbi, Nadia (2019-02-28)Flow-sensitive labels used by dynamic enforcement mechanisms might themselves encode sensitive information, which can leak. Metalabels, employed to represent the sensitivity of labels, exhibit the same problem. This paper ... -
X-Containers: Breaking Down Barriers to Improve Performance and Isolation of Cloud-Native Containers
Shen, Zhiming; Sun, Zhen; Sela, Gur-Eyal; Bagdasaryan, Eugene; Delimitrou, Christina; Van Renesse, Robbert; Weatherspoon, Hakim (2018-08-29)“Cloud-native” container platforms, such as Kubernetes, have become an integral part of production cloud environments. One of the principles in designing cloud-native applications is called “Single Concern Principle”, which ... -
Security Results for SIRRTL, A Hardware Description Language for Information Flow Security
Ferraiuolo, Andrew (2017-12)This document establishes security results for SIRRTL, a secure variant of the FIRRTL intermediate language. We developed ChiselFlow, a variant of the Chisel hardware design language [1] for information flow security. ... -
HyperFlow: A Processor Architecture for Timing-Safe Information-Flow Security
Ferraiuolo, Andrew; Zhao, Yuqi; Suh, G. Edward; Myers, Andrew C. (2018-05-01)This paper presents HyperFlow, a processor that enforces secure information flow, including control over timing channels. The design and implementation of HyperFlow offer security assurance because it is implemented ...