We describe a method for finding security flaws in source code by way of static analysis. The method is notable because it allows a user to specify a wide range of security proper...
This paper aims at contributing to the evaluation of web accessibility and thus promoting design for all, considering the design process as an iterative process containing evaluati...
Maria Kapsi, Evangelos Vlachogiannis, Jenny S. Dar...
This paper presents the concept of pluggable parallelisation that allows scientists to develop “sequential like” codes that can take advantage of multi-core, cluster and grid ...
Conventional high-level synthesis uses the worst case delay to relate all inputs to all outputs of an operation. This is a very conservative approximation of reality, especially i...
When software products are assembled from pre-defined components, performance prediction should be based on the components also. This supports rapid model-building, using previous...