There exists a large variety of techniques to detect and correct software security vulnerabilities at the source code level, including human code reviews, testing, and static anal...
The transition to multicore architectures has dramatically underscored the necessity for parallelism in software. In particular, while new gaming consoles are by and large multicor...
Micah J. Best, Alexandra Fedorova, Ryan Dickie, An...
We will evaluate electronic payment (ePayment) systems by employing a use-value analysis. The key success factors of ePayment systems are security and flexibility. Not surprisingly...
Gerald Draxler, Johannes Sametinger, Andreas Wiesa...
Abstract. We survey recent developments in an approach to the verification of higher-order computation based on game semantics. Higherorder recursion schemes are in essence (progra...
The Python programming language is typical among dynamic languages in that programs written in it are not susceptible to static analysis. This makes efficient static program compi...