In this paper we describe NaCIN, an Eclipse plug-in that records a developer’s code navigation activity and produces sets of elements potentially implementing different concerns...
Abstract. This paper studies how to verify the conformity of a program with its specification and proposes a novel constraint-programming framework for bounded program verification...
Abstract. The study of deterministic public-key encryption was initiated by Bellare et al. (CRYPTO '07), who provided the "strongest possible" notion of security for...
Abstract. The notion of graph polynomials definable in Monadic Second Order Logic, MSOL, was introduced in [Mak04]. It was shown that the Tutte polynomial and its generalization, a...
We delineate an integrative view of interorganizational knowledge transfer (IOKT) in the upstream supply chain relationship from a buyer’s perspective. For this purpose, we sugg...