With the emergence of multicore network processors in support of high-performance computing and networking applications, power consumption has become a problem of increasing signi...
A well-known bad code smell in refactoring and software maintenance is duplicated code, or code clones. A code clone is a code fragment that is identical or similar to another. Un...
This paper presents the behaviour-based control architecture iB2C (integrated Behaviour-Based Control) used for the development of complex robotic systems. The specification of be...
Aspect-oriented programming (AOP) has been proposed as a technique for improving the separation of concerns in software design and implementation. The field of AOP has, so far, f...
The three main assertion-based verification approaches are: Design by Contract (DBC), Extended Static Checking (ESC) and Verified Design by Contract (VDBC). Each approach offers a...