Programs can be composed from features. We want to verify automatically that all legal combinations of features can be composed safely without errors. Prior work on this problem a...
Many safety-related and certification standards exist for developing safety-critical systems. Safety assessments are performed in practice, and system certification according to a...
Abstract. Software testing is an expensive and time-consuming activity; it is also error-prone due to human factors. But, it still is the most common effort used in the software in...
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Preference elicitation — the process of asking queries to determine parties’ preferences — is a key part of many problems in electronic commerce. For example, a shopping age...