Completely handling SQL injection consists of two activities: properly protecting the system from malicious input, and preventing any resultant error messages caused by SQL injecti...
—Memory accesses form an important source of timing unpredictability. Timing analysis of real-time embedded software thus requires bounding the time for memory accesses. Multipro...
Yan Li, Vivy Suhendra, Yun Liang, Tulika Mitra, Ab...
Abstract. This paper addresses the problem of consistency preservation in model-driven software development. Software models typically embody many different views that need to be ...
Ragnhild Van Der Straeten, Viviane Jonckers, Tom M...
In this paper, we describe the Architecture Description Language (ADL) that we are defining for the design of agentbased systems. This aims at filing the gap between the analysis ...
This paper uses a long term ethnographic study of the design and implementation of an electronic patient records (EPR) system in a UK hospital Trust to consider issues arising in ...
David Martin, Mark Rouncefield, Jacki O'Neill, Mar...