Network and server-centric computing paradigms are quickly returning to being the dominant methods by which we use computers. Web applications are so prevalent that the role of a ...
Simon Lok, Steven Feiner, William M. Chiong, Yoav ...
An algorithm for learning a subclass of erasing regular pattern languages is presented. On extended regular pattern languages generated by patterns π of the form x0α1x1 . . . α...
Tools for analysing secure information flow are almost exclusively based on ideas going back to Denning’s work from the 70’s. This approach embodies an imperfect notion of sec...
We address the problem of reasoning about Haskell programs that use Software Transactional Memory (STM). As a motivating example, we consider Haskell code for a concurrent non-det...
The anticipated deployment of IEEE 802.16-based wireless metropolitan area networks (WMANs) will usher a new era in broadband wireless communications. The adoption of the WiMAX te...
Pedro Neves, Ricardo Matos, Bruno Sousa, Giada Lan...