— In this paper we present analytical techniques that can be used to better understand the behavior of malware, a generic term that refers to all kinds of malicious software prog...
This paper presents a critical view of existing models of user experience. These models view experience as the subjective response in the individual's mind. While designers a...
: This paper describes a method aiming to support the design of interactive-safety critical systems. The method proposes an original integration of approaches usually considered se...
Developing an optimizing compiler for a newly proposed architecture is extremely difficult when there is only a simulator of the machine available. Designing such a compiler requ...
John Cavazos, Christophe Dubach, Felix V. Agakov, ...
We propose a new technique for hardware synthesis from higherorder functional languages with imperative features based on Reynolds's Syntactic Control of Interference. The re...