We address the verification problem of finite-state concurrent programs running under weak memory models. These models capture the reordering of program (read and write) operation...
Ahmed Bouajjani, Madanlal Musuvathi, Mohamed Faouz...
The origin of the study described here is the experiment performed by Basili and Selby, further replicated by Kamsties and Lott, and once again by Wood et al. These experiments inv...
This paper presents a novel web-oriented writing environment that helps users describe their opinions on topics/events through weblogs, by showing facts related to the objects. Ou...
Security is gaining increasing relevance in the development of embedded devices. Towards a secure system at each level of design, this paper addresses the security aspects related...
Many readers annotate passages that are important to their work. If we understand the relationship between the types of marks on a passage and the passage’s ultimate utility in a...
Frank M. Shipman III, Morgan N. Price, Catherine C...