Access control software must be based on a security policy model. Flaws in them may come from a lack of precision or some incoherences in the policy model or from inconsistencies ...
This paper presents a profiling plug-in for IBM’s Eclipse development environment. Our approach characterises profiling as an interactive exploration of a large virtual database...
We discuss a retrieval model in which the task is to complete a sentence, given an initial fragment, and given an application specific document collection. This model is motivate...
—Contemporary development environments do not directly and explicitly support developers in having a conversation about the code they write and maintain. This problem is aggravat...
How to extract negative information from programs is an important issue in logic programming. Here we address the problem for functional logic programs, from a proof-theoretic pers...