Many of today’s software applications require a high-level of security, defined by a detailed policy and attained via mechanisms such as role-based access control (RBAC), mandat...
Jaime A. Pavlich-Mariscal, Laurent Michel, Steven ...
This paper describes two ways we have integrated algorithm animations into several computer science courses. First, we use previously existing animations during lectures to aid in...
This paper forms the substance of a course of lectures given at the International Summer School in Computer Programming at Copenhagen in August, 1967. The lectures were originally ...
When designing product behavior, the designer often needs to communicate to experts in computer software and protocols. In present-day software engineering, formal specification m...
Jun Hu, Philip Ross, Loe M. G. Feijs, Yuechen Qian
This paper describes experiences garnered while teaching a course on high integrity software using SPARK to a mix of junior and senior level undergraduates. The paper describes th...