Constraint programming can definitely be seen as a model-driven paradigm. The users write programs for modeling problems. These programs are mapped to executable models to calcula...
This paper describes a didactical Computer Aided Software Engineering (CASE)-tool that was developed for use within the context of a course in object-oriented domain modelling. In...
Monique Snoeck, Raf Haesen, Herman Buelens, Manu D...
User-input validators play an essential role in guarding a web application against application-level attacks. Hence, the security of the web application can be compromised by defe...
Kunal Taneja, Nuo Li, Madhuri R. Marri, Tao Xie, N...
Verified compilers, such as Leroy's CompCert, are accompanied by a fully checked correctness proof. Both the compiler and proof are often constructed with an interactive proo...
This paper describes a research project concentrating on improving requirements management. We started this research by identifying the problems companies face with respect to req...