We address the problem of controlling information leakage in a concurrent declarative programming setting. Our aim is to define verification tools in order to distinguish betwee...
Abstract. In the past thirty years, cryptology has evolved from a secret art to a modern science. Weaker algorithms and algorithms with short keys are disappearing, political contr...
A typical software development team leaves behind a large amount of information. This information takes different forms, such as mail messages, software releases, version control ...
Avoiding architectural erosion helps extend the lifetime of an evolving software system. Erosion can be reduced by ensuring that (i) developers share a good understanding of a sys...
Ciaran O'Reilly, Philip J. Morrow, David W. Bustar...
When new technology is adopted to everyday life, existing patterns of behavior relevant to the application are transferred to this new media. In this process, some things will als...