This paper presents a new curriculum for the Internet and e-business that has been developed at University of Redlands in Southern California with first offering in 2000. The pape...
When a computer program requires legitimate access to confidential data, the question arises whether such a program may illegally reveal sensitive information. This paper proposes...
Current taint tracking systems suffer from high overhead and a lack of generality. In this paper, we solve both of these issues with an extensible system that is an order of magni...
This paper reports on the RICA−J multiagent programming framework, which provides executable constructs for each of the organizational, ACL-based modelling abstractions of the R...
Juan Manuel Serrano, Sascha Ossowski, Sergio Sauga...
Abstract. We describe a tool that applies theorem proving technology to synthesize code fragments that use given library functions. To determine candidate code fragments, our appro...