claim that types are the right abstraction in order to represent the interaction between elements without specifying exactly the element positions. Our claim is supported through a...
Security-typed languages (STLs) are powerful tools for provably implementing policy in applications. The programmer maps policy onto programs by annotating types with information ...
In this paper, a modified fuzzy system modelling algorithm that incorporates Type 2 fuzzy sets, which is based on intervalvalued membership degrees rather than singleton membershi...
Pointer analysis statically approximates the heap pointer structure during a program execution in order to track heap objects or to establish alias relations between references, a...
Lennart Beringer, Robert Grabowski, Martin Hofmann
After two decades of repository development, some conclusions may be drawn as to which type of repository and what kind of service best supports digital scholarly communication, a...