Author: Karl N. Levitt

Publication Overview

Publication period start: 1978
Number of co-authors: 24

Co-Authors

Number of publications with favourite co-authors

Productive Colleagues

Most productive colleagues in number of publications

Publications

Bajcsy, Ruzena, Benzel, Terry, Bishop, Matt, Braden, Robert, Brodley, Carla E., Fahmy, Sonia, Floyd, Sally, Hardaker, W., Joseph, Anthony D., Kesidis, George, Levitt, Karl N., Lindell, Robert, Liu, Peng, Miller, David, Mundy, Russ, Neuman, Cliford, Ostrenga, Ron (2004): Cyber defense technology networking and evaluation. In Communications of the ACM, 47 (3) pp. 58-61. https://dl.acm.org/doi/10.1145/971617.971646
Spitzen, Jay M., Levitt, Karl N., Robinson, Lawrence (1978): An Example of Hierarchical Design and Proof. In Communications of the ACM, 21 (12) pp. 1064-1075.
Robinson, Lawrence, Levitt, Karl N. (1977): Proof Techniques for Hierarchically Structured Programs. In Communications of the ACM, 20 (4) pp. 271-283.
Levitt, Karl N., Kautz, William H. (1972): Cellular Arrays for the Solution of Graph Problems. In Communications of the ACM, 15 (9) pp. 789-801.
Heckman, Mark, Levitt, Karl N. (1998): Applying the Composition Principle to Verify a Hierarchy of Security Servers. In: HICSS 1998 , 1998, . pp. 338-347. https://csdl.computer.org/comp/proceedings/hicss/1998/8239/03/82390338abs.htm
Zhang, Cui, Becker, Brian R., Peticolas, Dave, Heckman, Mark, Levitt, Karl N., Olsson, Ronald A. (1997): Verification of a Distributed Computing. In: HICSS 1997 , 1997, . pp. 252-261. https://csdl.computer.org/comp/proceedings/hicss/1997/7734/05/7734050252abs.htm
Privacy Settings
By using this site, you accept our Cookie Policy and Terms of Use.
Customize
Accept all

Feel Stuck? Want Freedom?

Join 326,062+ designers who get one powerful email each week. Learn to design a life you love.

Next email in
0
days
21
hrs
31
mins
58
secs

Free forever. No spam. Unsubscribe anytime.