Certified software consists of a machine-executable program plus a formal machine-checkable proof that the software is free of bugs with respect to a claim of dependability. The c...
Where do most vulnerabilities occur in software? Our Vulture tool automatically mines existing vulnerability databases and version archives to map past vulnerabilities to componen...
Stephan Neuhaus, Thomas Zimmermann, Christian Holl...
In this paper we present a method for automatically testing interactive multimodal systems1 . The proposed approach was originally dedicated to synchronous programming which is ma...
Laya Madani, Catherine Oriat, Ioannis Parissis, Ju...
A key objective for ubiquitous environments is to enable system interoperability between system’s components that are highly heterogeneous. In particular, the challenge is to emb...
The POEMS project is creating an environment for end-to-end performance modeling of complex parallel and distributed systems, spanning the domains of application software, runti...