Abstract. Software is often governed by and thus adapts to phenomena that occur at runtime. Unlike traditional decision problems, where a decision-making model is determined for re...
Guoxin Su, Taolue Chen, Yuan Feng, David S. Rosenb...
Abstract. Unifying similar model transformation rules into variabilitybased ones can improve both the maintainability and the performance of a model transformation system. Yet, man...
Lacking the presence of human and social elements is claimed one major weakness that is hindering the growth of e-commerce. The emergence of social commerce (SC) might help amelio...
After a software system is compromised, it can be difficult to understand what vulnerabilities attackers exploited. Any information residing on that machine cannot be trusted as ...
A program subject to a Return-Oriented Programming (ROP) attack usually presents an execution trace with a high frequency of indirect branches. From this observation, several rese...
For C programs, flow-sensitivity is important to enable pointer analysis to achieve highly usable precision. Despite significant recent advances in scaling flow-sensitive point...
Static and dynamic power constraints are steering chip manufacturers to build single-ISA Asymmetric Multicore Processors (AMPs) with big and small cores. To deliver on their energ...
Ivan Jibaja, Ting Cao, Stephen M. Blackburn, Kathr...