Abstract: In order to fulfil sets of similar user requirements within a specific application domain, one typically uses software product line engineering. In this paper, we investi...
There would seem to be a natural connection between graphs and information security. This is particularly so in the arena of access control and authorization. Research on applying ...
We believe that for developing applications in a specific domain, the best kindofsoftwarecomponent model touseis adomain-specificone. Wealso believe that current component models i...
Abstract—Several successful approaches to software verificabased on the construction and analysis of an abstract reachability tree (ART). The ART represents unwindings of the co...
Dirk Beyer, Alessandro Cimatti, Alberto Griggio, M...
The transition from single-core to multi-core processors has made multi-threaded software an important subject in computer aided verification. Here, we describe and evaluate an ex...