Often the code regions that are assigned for a maintenance task do not follow the modularization of the original application program, but instead include parts of code from many d...
Grammars, especially context-free grammars, are widely used within and even outside the field of computer science. In this paper, we present a systematic framework for grammar te...
- In this paper we experiment with two optimization techniques we are considering implementing in a parallelizing compiler that generates parallel code for a distributed-memory sys...
Supply chain risk evaluation is a multi-criteria decision making problem under fuzzy environments. To tackle the problem, this paper firstly identifies and discusses some of the im...
In the last years several attempts to define identity-related properties such as identifiability, pseudonymity and anonymity have been made to analyze the privacy offered by inform...