Find us on
Past Programs
![]() |
Keynote: Securing IT in Healthcare: Part III |
![]() |
Keynote: SITH3, Technology-Enabled Remote Monitoring and Support |
![]() |
Intersection of mHealth and Behavioral Health |
Newsletter
ISTS Information Pamphlet
The distance between executable code and the source from which it was supposedly generated is almost invariably large. The object of the current research is to provide a closed-loop check of the deployed product against the original source.
Note: This effort was a subproject that began in 2000. It was last mentioned in the December 2000 six-month report. It appears that no funds were actually expended on behalf of this subproject. Nonetheless, work along these lines continued as the Ph.D. dissertation topic chosen by Michael Fromberger, with Doug McIlroy and Sean Smith as mentors.