"Three dimensional scene analysis has reached a turning point. Though researchers have been investigating object recognition and scene understanding since the late 1960’s, a...
Language-based information flow methods offer a principled way to enforce strong security properties, but enforcing noninterference is too inflexible for realistic applications. Se...
We report on a study of novice programmers’ object oriented class designs. These designs were analysed to discover what faults they displayed. The two most common faults related...
Are computing systems trustworthy? To answer this, we need to know three things: what the systems are supposed to do, what they are not supposed to do, and what they actually do. A...
Implementing an extension of a legacy operating system requires knowing what functionalities the extension should provide and how the extension should be integrated with the legac...
Gilles Muller, Julia L. Lawall, Jean-Marc Menaud, ...