There has been little research on end-user program development beyond the programming phase. Devising ways to address additional phases may be critical, because research shows tha...
Christine Wallace, Curtis R. Cook, Jay Summet, Mar...
Certified code is a general mechanism for enforcing security properties. In this paradigm, untrusted mobile code carries annotations that allow a host to verify its trustworthine...
In many applications, such as decision support, negotiation, planning, scheduling, etc., one needs to express requirements that can only be partially satisfied. In order to expres...
useful for optimizing compilers [15], partial evaluators [11], abstract debuggers [1], models-checkers [2], formal verifiers [13], etc. The difficulty of the task comes from the fa...
— We present an interface for controlling mobile robots that combines aspects of graphical trajectory specification and state-based programming. This work is motivated by common...
Junaed Sattar, Anqi Xu, Gregory Dudek, Gabriel Cha...