An important challenge in constraint programming is to rewrite constraint models into executable programs calculating the solutions. This phase of constraint processing may requir...
Communication systems, along with database systems, have attracted a lot of attention in software engineering research. Encouraged by the success of SQL systems, some early effort...
A variety of compilers, static analyses, and testing frameworks rely heavily on path frequency information. Uses for such information range from optimizing transformations to bug ...
Policy testing and analysis are important techniques for high assurance of correct specification of access control policies. We propose a set of testing and analysis techniques fo...
Target expansion is a pointing facilitation technique where the users target, typically an interface widget, is dynamically enlarged to speed pointing in interfaces. However, with...