Web application testers need automated, effective approaches to validate the test results of complex, evolving web applications. In previous work, we developed a suite of automate...
A logic program strongly quasi-terminates when only a finite number of distinct atoms (modulo variable renaming) are derivable from any given query and computation rule. This noti...
Role-Based Access Control (RBAC) is increasingly used for ensuring security and privacy in complex organizations such as healthcare institutions. In RBAC, access permissions are g...
Design by contract is a practical methodology for developing code together with its specification. The contract consists of class invariants and method preand postconditions. As ...
Maayan Goldstein, Yishai A. Feldman, Shmuel S. Tys...
Wearable technology is omnipresent to the user. Thus, it has the potential to be significantly disruptive to the user’s daily life. Context awareness and intuitive device interf...
Lucy E. Dunne, Sarah Brady, Richard Tynan, Kim Lau...