A number of programming languages use rich type systems to verify security properties of code. Some of these languages are meant for source programming, but programs written in th...
In order to support the verification of programs, verification tools such as ACL2 or Isabelle try to extract suitable induction axioms from the definitions of terminating, recursiv...
High-Level music descriptors are key ingredients for music information retrieval systems. Although there is a long tradition in extracting information from acoustic signals, the f...
Business rules are operational rules that business organizationsfollow to peq%rm various activities. Over time, business rules evolve and the software that implemented them are al...
Hai Huang, Wei-Tek Tsai, Sourav Bhattacharya, Xiao...
A modeling process is presented for extracting timingaccurate simulation models from complex embedded realtime systems. The process is supported by two complementary methods for t...
Johan Andersson, Joel Huselius, Christer Norstr&ou...