Memory leaks and memory corruption are two major forms of software bugs that severely threaten system availability and security. According to the US-CERT Vulnerability Notes Datab...
This paper describes the development of an experience factory in an Australian organization involved in the field of telecommunications. Faced with improvement needs, in 1998 the ...
Abstract. Large information spaces and complex functionality of contemporary systems together with the advent of the Semantic Web are big challenges for the design of simple yet po...
We present CSIsat, an interpolating decision procedure for the quantifier-free theory of rational linear arithmetic and equality with uninterpreted function symbols. Our implementa...
Background: Genomics and proteomics analyses regularly involve the simultaneous test of hundreds of hypotheses, either on numerical or categorical data. To correct for the occurre...
Anyela Camargo, Francisco Azuaje, Haiying Wang, Hu...